A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit the original URL.
The file type is application/pdf
.
Filters
Visual cryptographic steganography in images
2010
2010 Second International conference on Computing, Communication and Networking Technologies
It is most commonly implemented in image files. However embedding data into image ...
In this paper we propose an advanced system of encrypting data that combines the features of cryptography, steganography along with multimedia data hiding. ...
To overcome this predictability, we propose the concept of multiple cryptography where the data will be encrypted into a cipher and the cipher will be hidden into a multimedia image file in encrypted format ...
doi:10.1109/icccnt.2010.5591730
fatcat:6bjn6crbxzdcbpznisamd5errq
Robust coding of encrypted images via structural matrix
2015
Signal processing. Image communication
Experimental results show that the proposed coder can be considered as an efficient multiple description coder with a number of descriptions against packet loss. ...
In particular, Alice first encrypts an image using globally random permutation and then sends the encrypted image to Charlie who samples the encrypted image using a structural matrix. ...
A multiple description coder especially designed for encrypted images is rarely reported so far. ...
doi:10.1016/j.image.2015.09.001
fatcat:q2aag3qqr5fenn3tzeyorkyeqm
AN APPROACH TO IMAGE COMPRESSION AND ENCRYPTION
2012
International Journal of Image Processing and Vision Science
For image encryption a symmetric key cryptography multiplicative cipher is used. Similarly for compression Discrete Cosine Transform is used. ...
In this paper a simultaneous image compression and encryption scheme is discussed. ...
CLASSIFICATION AND DESCRIPTION OF RELATED WORK The work on image compression and encryption performed by various researchers can be categorized in any of the following categories.
A. ...
doi:10.47893/ijipvs.2012.1027
fatcat:myslxrxokrbthmz7lozdt3nhry
A Metaheuristic Approach to Secure Multimedia Big Data for IoT-Based Smart City Applications
2021
Wireless Communications and Mobile Computing
In this paper, a cryptographic algorithm, Advanced Encryption Standard, is used to conceal the information from malicious intruders. ...
The introduction of various compression algorithms can further increase the encryption time of one frame. ...
A similar technique of joint image compression and encryption using the properties of integer wavelet transform (IWT) and SPHIT was presented where multiple methods were exploited such as hyperchaotic ...
doi:10.1155/2021/7147940
fatcat:7t5mud5sojgazfosbfjqmsdxne
Efficient joint encryption and data hiding algorithm for medical images security
2017
2017 8th International Conference on Information and Communication Systems (ICICS)
The proposed algorithm uses standard encryption methods and reversible watermarking techniques to provide security to the transmitted medical images as well as to control access privileges at the receiver ...
The authenticity and integrity of medical images can be verified in the spatial domain, the encrypted domain, or in both domains. ...
THE PROPOSED JOINT ALGORITHM The proposed algorithm described in this section achieves reversible and separable data hiding in the spatial and encrypted domains using partial encryption and multiple watermark ...
doi:10.1109/iacs.2017.7921962
fatcat:qmw7y2n4gjhwpll44kxexskbsq
A novel compressive optical encryption via single-pixel imaging
2019
IEEE Photonics Journal
A novel compressive optical cryptosystem based on single-pixel imaging is proposed. ...
By using random sparse sampling in the encryption process, the plaintext is encrypted and compressed into a noise-like intensity sequence. ...
For moderating the demands of alignment and recording in DRPE, Nomura and Javidi adopted a joint transform correlator architecture to encrypt an image into the joint power spectrum, a real-valued distribution ...
doi:10.1109/jphot.2019.2924457
fatcat:s7spmvq3gnfe5jonbfqkj6a6iy
Reversible Data Hiding in Encrypted Images Based on Bit-plane Compression of Prediction Error
[article]
2021
arXiv
pre-print
As a technology that can prevent the information from being disclosed, the reversible data hiding in encrypted images (RDHEI) acts as an important role in privacy protection and information security. ...
Then, the content owner rearranges the bit-plane of prediction error by block and compresses the bitstream with the joint encoding algorithm to reserve room. ...
A joint encoding algorithm is introduced in Section 2 to compress the bit-plane of prediction error. ...
arXiv:2007.04057v3
fatcat:nnmmov5lnrcgfdkh6vgzz4pl4q
Image Encryption using Fractional Integral transforms: Vulnerabilities, Threats and Future scope
[article]
2022
arXiv
pre-print
This paper presents a review on various image encryption schemes based on fractional transforms for security consideration of image communication. ...
Such a narrative review on encryption algorithm based on various fractional integral transforms in various architectural schematics is not presented before at one place. ...
a multiple layer security for image encryption algorithm will lead to increase in key space. ...
arXiv:2203.02881v1
fatcat:abt35lynvrfbfmqq56fob2slru
A Parallel Processing Technique Based on GMO and BCS for Medical Image Encryption
2020
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
The binary bit values of pixels of the initial Image are rotated circularly to generate a new binary bit value of pixels encrypted image. ...
The enhancement of this GMO and BCS based encryption are also given here by using the parallel implementation of the algorithm. ...
Manoj Kumar, Indian Medicine, SSH, BHU who has provided medical images with description for their guidance and directions as required time to time. ...
doi:10.35940/ijitee.c9044.019320
fatcat:sm7kvyydlzhilkevs7isynjuc4
Joint SPIHT compression and selective encryption
2014
Applied Soft Computing
JCSE-SPIHT, an algorithm of joint compression and selective encryption based on set partitioning in hierarchical trees (SPIHT), is proposed to achieve image encryption and compression simultaneously. ...
It can protect SPIHT compressed images by only fast scrambling a tiny portion of crucial data during the coding process while keeping all the virtues of SPIHT intact. ...
The proposed algorithm We propose JCSE-SPIHT, a joint SPIHT compression and selective encryption algorithm based on the preceding statements in this subsection. ...
doi:10.1016/j.asoc.2014.03.009
fatcat:4zrc6ui6ynfijib6kvrfb75skm
Analysis of Pixel Merging for Multi Image Integration for Security Enhancement
2017
International Journal of Computer Applications
This process involves applying Joint Photographic Experts Group compression for RGB layers, encrypting the images with Elliptic Curve Encryption Algorithm and block based interleaving followed by pixel ...
This paper focus on image security based on compressing the image with encryption and pixel integration. ...
INTRODUCTION Digital image is a description of a real-world natural or a visual scene, which sampled temporally and spatially, whereas video coding is compression and decompression process. ...
doi:10.5120/ijca2017915915
fatcat:zlomscnpibaphbnx7n3cck5mx4
A Novel Approach based on Compressive Sensing and Fractional Wavelet Transform for Secure Image Transmission
2021
International Journal of Intelligent Engineering and Systems
Therefore, it provides a simultaneous compression and encryption. ...
In this paper, a novel scheme for secure image transmission based on compressive sensing (CS) and Fractional Wavelet Transform (FrWT) is proposed. ...
Further, Galois field multiplication based diffusion algorithm is designed to obtain final encryption. ...
doi:10.22266/ijies2021.0831.02
fatcat:d5qr3bw2ljh7zdmgykgxpru4eu
Survey on JPEG compatible joint image compression and encryption algorithms
2020
IET Signal Processing
Since a large proportion of images on Internet are compressed, and JPEG is the most widely adopted standards for image compression, a variety of joint image compression and encryption algorithms have been ...
From this perspective of classification, the authors give a comprehensive survey on representative image encryption algorithms of each type, and show their properties and limitations. ...
A brief description of these selected algorithms is given in Table 1 . These algorithms are all block-based encryption schemes with the processing unit being 8 × 8 size block or 16 × 16 size block. ...
doi:10.1049/iet-spr.2019.0276
fatcat:yvyacm47nreotccprjqdcp53b4
Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography
2016
IOSR Journal of Computer Engineering
Hence, after applying encryption, image steganography embeds the secret message in a cover, such as a digital image file. ...
In order to achieve a better level of secrecy, a message is encrypted before being hidden in a message. ...
Section 4 contains description of algorithms. Finally paper would be concluded.
II. ...
doi:10.9790/0661-15010010157-61
fatcat:kbgewr7dhzgfvgab4342hpw3fu
Research on Scene Understanding-Based Encrypted Image Retrieval Algorithm
2019
IEEE Access
Aiming to improve the precision and security, and reduce complexity of the encrypted image retrieval algorithm, a scene understanding-based encrypted image retrieval algorithm is proposed in this paper ...
Finally, the optimal encrypted matching image is obtained by the homography-based image matching algorithm, and the plaintext image is also obtained by the decryption algorithm. ...
As shown in Fig. 5, 5(a) is an original image of the image 1, and 5(b) is an encrypted image obtained by encrypting the original image using the encryption algorithm proposed in this paper. 5(c) is the ...
doi:10.1109/access.2018.2889323
fatcat:eslg3hfrw5b4fpcnnw5wo5rklm
« Previous
Showing results 1 — 15 out of 5,701 results