5,701 Hits in 4.3 sec

Visual cryptographic steganography in images

Piyush Marwaha, Paresh Marwaha
2010 2010 Second International conference on Computing, Communication and Networking Technologies  
It is most commonly implemented in image files. However embedding data into image  ...  In this paper we propose an advanced system of encrypting data that combines the features of cryptography, steganography along with multimedia data hiding.  ...  To overcome this predictability, we propose the concept of multiple cryptography where the data will be encrypted into a cipher and the cipher will be hidden into a multimedia image file in encrypted format  ... 
doi:10.1109/icccnt.2010.5591730 fatcat:6bjn6crbxzdcbpznisamd5errq

Robust coding of encrypted images via structural matrix

Yushu Zhang, Kwok-Wo Wong, Leo Yu Zhang, Wenying Wen, Jiantao Zhou, Xing He
2015 Signal processing. Image communication  
Experimental results show that the proposed coder can be considered as an efficient multiple description coder with a number of descriptions against packet loss.  ...  In particular, Alice first encrypts an image using globally random permutation and then sends the encrypted image to Charlie who samples the encrypted image using a structural matrix.  ...  A multiple description coder especially designed for encrypted images is rarely reported so far.  ... 
doi:10.1016/j.image.2015.09.001 fatcat:q2aag3qqr5fenn3tzeyorkyeqm


2012 International Journal of Image Processing and Vision Science  
For image encryption a symmetric key cryptography multiplicative cipher is used. Similarly for compression Discrete Cosine Transform is used.  ...  In this paper a simultaneous image compression and encryption scheme is discussed.  ...  CLASSIFICATION AND DESCRIPTION OF RELATED WORK The work on image compression and encryption performed by various researchers can be categorized in any of the following categories. A.  ... 
doi:10.47893/ijipvs.2012.1027 fatcat:myslxrxokrbthmz7lozdt3nhry

A Metaheuristic Approach to Secure Multimedia Big Data for IoT-Based Smart City Applications

Harsimranjit Singh Gill, Tarandip Singh, Baldeep Kaur, Gurjot Singh Gaba, Mehedi Masud, Mohammed Baz, Celestine Iwendi
2021 Wireless Communications and Mobile Computing  
In this paper, a cryptographic algorithm, Advanced Encryption Standard, is used to conceal the information from malicious intruders.  ...  The introduction of various compression algorithms can further increase the encryption time of one frame.  ...  A similar technique of joint image compression and encryption using the properties of integer wavelet transform (IWT) and SPHIT was presented where multiple methods were exploited such as hyperchaotic  ... 
doi:10.1155/2021/7147940 fatcat:7t5mud5sojgazfosbfjqmsdxne

Efficient joint encryption and data hiding algorithm for medical images security

Hiba Abdel-Nabi, Ali Al-Haj
2017 2017 8th International Conference on Information and Communication Systems (ICICS)  
The proposed algorithm uses standard encryption methods and reversible watermarking techniques to provide security to the transmitted medical images as well as to control access privileges at the receiver  ...  The authenticity and integrity of medical images can be verified in the spatial domain, the encrypted domain, or in both domains.  ...  THE PROPOSED JOINT ALGORITHM The proposed algorithm described in this section achieves reversible and separable data hiding in the spatial and encrypted domains using partial encryption and multiple watermark  ... 
doi:10.1109/iacs.2017.7921962 fatcat:qmw7y2n4gjhwpll44kxexskbsq

A novel compressive optical encryption via single-pixel imaging

Chenggong Zhang, Bennian Han, Wenqi He, X. Peng, Chen Xu
2019 IEEE Photonics Journal  
A novel compressive optical cryptosystem based on single-pixel imaging is proposed.  ...  By using random sparse sampling in the encryption process, the plaintext is encrypted and compressed into a noise-like intensity sequence.  ...  For moderating the demands of alignment and recording in DRPE, Nomura and Javidi adopted a joint transform correlator architecture to encrypt an image into the joint power spectrum, a real-valued distribution  ... 
doi:10.1109/jphot.2019.2924457 fatcat:s7spmvq3gnfe5jonbfqkj6a6iy

Reversible Data Hiding in Encrypted Images Based on Bit-plane Compression of Prediction Error [article]

Youqing Wu, Wenjing Ma, Yinyin Peng, Ruiling Zhang, Zhaoxia Yin
2021 arXiv   pre-print
As a technology that can prevent the information from being disclosed, the reversible data hiding in encrypted images (RDHEI) acts as an important role in privacy protection and information security.  ...  Then, the content owner rearranges the bit-plane of prediction error by block and compresses the bitstream with the joint encoding algorithm to reserve room.  ...  A joint encoding algorithm is introduced in Section 2 to compress the bit-plane of prediction error.  ... 
arXiv:2007.04057v3 fatcat:nnmmov5lnrcgfdkh6vgzz4pl4q

Image Encryption using Fractional Integral transforms: Vulnerabilities, Threats and Future scope [article]

Gurpreet Kaur, Rekha Agarwal, Vinod Patidar
2022 arXiv   pre-print
This paper presents a review on various image encryption schemes based on fractional transforms for security consideration of image communication.  ...  Such a narrative review on encryption algorithm based on various fractional integral transforms in various architectural schematics is not presented before at one place.  ...  a multiple layer security for image encryption algorithm will lead to increase in key space.  ... 
arXiv:2203.02881v1 fatcat:abt35lynvrfbfmqq56fob2slru

A Parallel Processing Technique Based on GMO and BCS for Medical Image Encryption

The binary bit values of pixels of the initial Image are rotated circularly to generate a new binary bit value of pixels encrypted image.  ...  The enhancement of this GMO and BCS based encryption are also given here by using the parallel implementation of the algorithm.  ...  Manoj Kumar, Indian Medicine, SSH, BHU who has provided medical images with description for their guidance and directions as required time to time.  ... 
doi:10.35940/ijitee.c9044.019320 fatcat:sm7kvyydlzhilkevs7isynjuc4

Joint SPIHT compression and selective encryption

Tao Xiang, Jinyu Qu, Di Xiao
2014 Applied Soft Computing  
JCSE-SPIHT, an algorithm of joint compression and selective encryption based on set partitioning in hierarchical trees (SPIHT), is proposed to achieve image encryption and compression simultaneously.  ...  It can protect SPIHT compressed images by only fast scrambling a tiny portion of crucial data during the coding process while keeping all the virtues of SPIHT intact.  ...  The proposed algorithm We propose JCSE-SPIHT, a joint SPIHT compression and selective encryption algorithm based on the preceding statements in this subsection.  ... 
doi:10.1016/j.asoc.2014.03.009 fatcat:4zrc6ui6ynfijib6kvrfb75skm

Analysis of Pixel Merging for Multi Image Integration for Security Enhancement

A. D., T. S., Ranganath Muthu
2017 International Journal of Computer Applications  
This process involves applying Joint Photographic Experts Group compression for RGB layers, encrypting the images with Elliptic Curve Encryption Algorithm and block based interleaving followed by pixel  ...  This paper focus on image security based on compressing the image with encryption and pixel integration.  ...  INTRODUCTION Digital image is a description of a real-world natural or a visual scene, which sampled temporally and spatially, whereas video coding is compression and decompression process.  ... 
doi:10.5120/ijca2017915915 fatcat:zlomscnpibaphbnx7n3cck5mx4

A Novel Approach based on Compressive Sensing and Fractional Wavelet Transform for Secure Image Transmission

Anil Chatamoni, Osmania University, Rajendra Bhukya, Praneet Jeripotula, Osmania University, Osmania University
2021 International Journal of Intelligent Engineering and Systems  
Therefore, it provides a simultaneous compression and encryption.  ...  In this paper, a novel scheme for secure image transmission based on compressive sensing (CS) and Fractional Wavelet Transform (FrWT) is proposed.  ...  Further, Galois field multiplication based diffusion algorithm is designed to obtain final encryption.  ... 
doi:10.22266/ijies2021.0831.02 fatcat:d5qr3bw2ljh7zdmgykgxpru4eu

Survey on JPEG compatible joint image compression and encryption algorithms

Peiya Li, Kwok-Tung Lo
2020 IET Signal Processing  
Since a large proportion of images on Internet are compressed, and JPEG is the most widely adopted standards for image compression, a variety of joint image compression and encryption algorithms have been  ...  From this perspective of classification, the authors give a comprehensive survey on representative image encryption algorithms of each type, and show their properties and limitations.  ...  A brief description of these selected algorithms is given in Table 1 . These algorithms are all block-based encryption schemes with the processing unit being 8 × 8 size block or 16 × 16 size block.  ... 
doi:10.1049/iet-spr.2019.0276 fatcat:yvyacm47nreotccprjqdcp53b4

Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography

K.S. Seethalakshmi
2016 IOSR Journal of Computer Engineering  
Hence, after applying encryption, image steganography embeds the secret message in a cover, such as a digital image file.  ...  In order to achieve a better level of secrecy, a message is encrypted before being hidden in a message.  ...  Section 4 contains description of algorithms. Finally paper would be concluded. II.  ... 
doi:10.9790/0661-15010010157-61 fatcat:kbgewr7dhzgfvgab4342hpw3fu

Research on Scene Understanding-Based Encrypted Image Retrieval Algorithm

Shuang Jia, Lin Ma, Danyang Qin
2019 IEEE Access  
Aiming to improve the precision and security, and reduce complexity of the encrypted image retrieval algorithm, a scene understanding-based encrypted image retrieval algorithm is proposed in this paper  ...  Finally, the optimal encrypted matching image is obtained by the homography-based image matching algorithm, and the plaintext image is also obtained by the decryption algorithm.  ...  As shown in Fig. 5, 5(a) is an original image of the image 1, and 5(b) is an encrypted image obtained by encrypting the original image using the encryption algorithm proposed in this paper. 5(c) is the  ... 
doi:10.1109/access.2018.2889323 fatcat:eslg3hfrw5b4fpcnnw5wo5rklm
« Previous Showing results 1 — 15 out of 5,701 results