Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2000, Signal Processing, IEEE Transactions on
…
34 pages
1 file
The increased popularity of multimedia applications places a great demand on e cient data storage and transmission techniques. Network communication, especially over a wireless network, can easily be intercepted and must be protected from eavesdroppers. Unfortunately, encryption and decryption are slow and it is often di cult, if not impossible, to carry out real-time secure image and video communication and processing. Methods have been proposed to combine compression and encryption together to reduce the overall processing time 3, 4, 12, 18, 20], but they are either insecure or too computationally intensive.
Problem statement: When we send any video data over the network it consumes more time. This is due to the huge size of the video file when compared to text file. Therefore, video data should be compressed before sending to the destination. Another important factor during data transfer is security. Joint compression and encryption is employed to enable faster and secured transmission of video data. Approach: Compression and encryption algorithms can be classified into two main categories: Independent encryption technique and joint compression and encryption technique. Independent encryption techniques can further be classified as heavy weight and light weight encryption algorithms. There are many algorithms available in the joint compression and encryption technique. Comparative study of the above mentioned algorithms is done in this study. Results: Based on our study, found joint compression and encryption algorithms reduced 40% of the memory storage size and they increased executio...
The traffic of digital images and video has grown rapidly in the internet. Security becomes important for several applications like military image database, confidential video conferencing. Real-time secure image and video communication is challenging due to the processing time and computational requirement for encryption and decryption. Also the speed of most internet connections is very limited so the amount of data to be transmitted must be reduced. In this research, we shall introduce partial encryption technique on compressed images and videos. Another algorithm decomposes images into several different parts. We apply encryption algorithm to encrypt only the crucial parts, which are considerably smaller than original image, which result in significant reduction in processing time and computational requirement for encryption and decryption as well as reduce the bit rate and bandwidth requirement.
Multimedia is one of the most popular data shared in the Web, and the protection of it via encryption techniques is of vast interest. In this paper, a secure and computationally feasible Algorithm called Optimized Multiple Huffman Tables (OMHT) technique is proposed. OMHT depends on using statistical-model-based compression method to generate different tables from the same data type of images or videos to be encrypted leading to increase compression efficiency and security of the used tables. A systematic study on how to strategically integrate different atomic operations to build a multimedia encryption system is presented. The resulting system can provide superior performance over other techniques by both its generic encryption and its simple adaptation to multimedia in terms of a joint consideration of security, and bitrate overhead. The effectiveness and robustness of this scheme is verified by measuring its security strength and comparing its computational cost against other techniques. The proposed technique guarantees security, and fastness without noticeable increase in encoded image size.
In digital signal processing, the general problem of image compression involves encoding using fewer bits than the original representation. Compression can be either lossy or lossless. Image encryption is hiding image from unauthorized access with the help of secret key. Even though Compression-then-Encryption (CTE) paradigm meets the requirements in many secure transmission scenarios, the order of applying the compression and encryption needs to be reversed in situations without compromising the compression performance. In this paper we analyze various techniques emerged for Encryption then Compression process for image data security.
International Journal of Computer Applications, 2012
To send multimedia data over an insecure communicational network with limited bandwidth, we need an organized management for creating and sending information. So far, there have been a few methods proposed from the combination of compression with symmetric encryption, for sending these files. In this paper, using pipeline compression with implementation upon Huffman algorithm, instead of usual compression, is proposed. Moreover, instead of utilizing symmetric encryption algorithms with a low level of security, the public key encryption algorithms are used. The chosen asymmetric encryption algorithm, for implementing some operations on multimedia data, is similar to RSA encryption and uses the a b mod m expression to generate the key. Moreover, in this paper there has been a circuit proposed with the goal of increasing the speed of the located multiplier in this mathematical expression. Also, considering the existence of the adder in encryption multiplication circuit, and compression circuit, the use of an special adder is recommended for improving the speed of these parallel multimedia computations.
International Journal of Image Processing and Vision Science, 2012
Image compression scheme proposed by researchers have no consideration of security. Similarly image encryption scheme proposed by the authors have no consideration of image size. In this paper a simultaneous image compression and encryption scheme is discussed. The order of the two processes viz. compression and encryption is EC i.e. image encryption is performed first then the image compression is applied. For image encryption a symmetric key cryptography multiplicative cipher is used. Similarly for compression Discrete Cosine Transform is used. Image Compression is concerned with minimizing the number of bit required to represent an image. The compression can be lossless or lossy. Image Encryption is hiding image from unauthorized access with the help of secret key that key can be private or public.
Research Journal of Applied Sciences, Engineering and Technology
Issues of security and compression of transmitted data have become an important concern in multimedia technology. In this study, we propose an efficient approach to secure video sequences in real time using the method of choosing reference images that is based on the Faber-schauder Multi-scale Transform to reduce the data flow. The encryption step is based on the principle of affine encryption to achieve transposition and to perform some manipulations such as puzzle to reduce the amount of bits to be processed on the image. Testing this approach on video sequences revealed an improvement in data flow and provides a stronger security and a good encryption time.
2008
Abstract Fast lightweight encryption algorithms must be developed to satisfy the level of security and the real time constraints. However the proposed lightweight MPEG video encryption algorithms that have been proposed in the past suffer from certain drawbacks. While some of them require hardware support, the others are weak or reduce the MPEG compression ratio. The lightweight encryption algorithm called VEA is fast, satisfies the real time constraint and does not reduce the MPEG compression ratio.
ijmer.com
The traffic of digital images and video has grown rapidly in the internet. Security becomes important for several applications like military image database, confidential video conferencing, medical images, etc. Several techniques have been developed for textual data but are not appropriate for images and video with huge amount of file size. Partial encryption is a recent approach to reduce the encryption time of images and video in distributed network. Partial encryption scheme encrypts a portion of compressed bit stream. In this paper we compare and classified various proposed partial encryption schemes for images and video.
2012
Existing methods when describe Compression there is no consideration of security, similarly when it describe encryption there is no consideration of size i.e. compression. Image Compression is concerned with minimizing the number of bit required to represent an image. Image Encryption is hiding image from unauthorized access with the help of secret key that key can be private or public. In this paper the simultaneous image compression and encryption algorithm used by different researchers are categorised and analysed with reference to the performance evaluation parameters.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
IEEE Transactions on Consumer Electronics, 2013
International Journal of Computer Network and Information Security, 2016
International Journal of computing Algorithm, 2018
INNOVATIONS IN COMPUTATIONAL AND COMPUTER TECHNIQUES: ICACCT-2021
Int. J. Comput. Theory Eng, 2010
World Review of Science, Technology and Sustainable Development