2020
DOI: 10.24996/ijs.2020.61.4.25
|View full text |Cite
|
Sign up to set email alerts
|

Selective Image Encryption Based on DCT, Hybrid Shift Coding and Randomly Generated Secret Key

Abstract: Most of today’s techniques encrypt all of the image data, which consumes a tremendous amount of time and computational payload. This work introduces a selective image encryption technique that encrypts predetermined bulks of the original image data in order to reduce the encryption/decryption time and thecomputational complexity of processing the huge image data. This technique is applying a compression algorithm based on Discrete Cosine Transform (DCT). Two approaches are implemented based on color space conv… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
2

Relationship

2
7

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 18 publications
0
9
0
Order By: Relevance
“…Delta Modulation (DM) DM is a special and simple form of differential pulse code modulation (DPCM), in which the difference between two adjacent samples is calculated to reduce the signal values using Eq. ( 5) and ( 6) [11]:…”
Section: Non-uniform Quantizationmentioning
confidence: 99%
See 1 more Smart Citation
“…Delta Modulation (DM) DM is a special and simple form of differential pulse code modulation (DPCM), in which the difference between two adjacent samples is calculated to reduce the signal values using Eq. ( 5) and ( 6) [11]:…”
Section: Non-uniform Quantizationmentioning
confidence: 99%
“…Hashim & Ali [10], proposed another shift coding optimizer to find the optimal two code word sizes vital to represent the small and large sequence values in their compression system. George et al [11], encoded the data of a selective image encryption system using a proposed hybrid shift. Ibrahim et al [12], proposed an improved entropy encoder for a new high-performance lossy compression system.…”
Section: Introductionmentioning
confidence: 99%
“…Because processing the block in one-dimension manner is faster than when processed in two dimensions, and therefore accelerating the compression and decompression process. The resultant DCT transformed coefficients in each block is arranged in a way where the coefficient that holds the most significant information is called DC component and it resides in the upper left corner of the block, the rest of the coefficients holds the less important information in the block which is called AC [11]. 1D-DCT can be obtained by applying the equation 10to transform the images and reverse the transformation by applying the equation (11) to obtain the reconstructed image [12]:…”
Section: Horizontal Scanning Ordermentioning
confidence: 99%
“…To obtain secure sensitive information, frequency transform methods like Discrete Cosine Transform (DCT), DWT based methods, machine learning and chaos theory can be used as encryption techniques [2,3]. Before further processing, it is constantly necessary to transform each value of every pixel into confirmed frequency components in the frequency domain encryption.…”
Section: Introductionmentioning
confidence: 99%