Review of Image Compression and Encryption Techniques

In line with a growing need for data and information transmission in a safe and quick manner, researches on image protection and security through a combination of cryptographic and compression techniques begin to take form. The combination of these two methods may include into three categories based on their process sequences. The first category, i.e. cryptographic technique followed by compression method, focuses more on image security than the reduction of a size of data. The second combination, compression technique followed by the cryptographic method, has an advantage where the compression technique can be lossy, lossless, or combination of both. The third category, i.e. compression and cryptographic technologies in a single process either partially or in the form of compressive sensing(CS) provides a good data safety assurance with such a low computational complexity that it is eligible for enhancing the efficiency and security of data/information transmission.

[1]  Wen-Tsai Sung,et al.  Improving the compression and encryption of images using FPGA-based cryptosystems , 2006, Multimedia Tools and Applications.

[2]  Manoj Kumar,et al.  An efficient encryption-then-compression technique for encrypted images using SVD , 2017, Digit. Signal Process..

[3]  D. Y. Patil,et al.  Secure data communication using image encryption and compression , 2014 .

[4]  Safya Belghith,et al.  A selective compression-encryption of images based on SPIHT coding and Chirikov Standard Map , 2017, Signal Process..

[5]  Monica Fira,et al.  Applications of compressed sensing: Compression and encryption , 2015, 2015 E-Health and Bioengineering Conference (EHB).

[6]  Somaya Al-Máadeed,et al.  A New Chaos-Based Image-Encryption and Compression Algorithm , 2012, J. Electr. Comput. Eng..

[7]  Ayman Alfalou,et al.  Enhanced System for image's compression and encryption by addition of biometric characteristics , 2008 .

[8]  X. Tong,et al.  A new algorithm of the combination of image compression and encryption technology based on cross chaotic map , 2013 .

[9]  Mukesh Sharma,et al.  Compression and Encryption: An Integrated Approach , 2012 .

[10]  Meckah Merdiyan,et al.  Implementasi Algoritma Run Length, Half Byte dan Huffman untuk Kompresi File , 2005 .

[11]  Kamlesh Gupta,et al.  Novel Approach for fast Compressed Hybrid color image Cryptosystem , 2012, Adv. Eng. Softw..

[12]  Kwok-Tung Lo,et al.  Joint image compression and encryption based on alternating transforms with quality control , 2015, 2015 Visual Communications and Image Processing (VCIP).

[13]  Kwok-Wo Wong,et al.  A Modified Chaos-Based Joint Compression and Encryption Scheme , 2011, IEEE Transactions on Circuits and Systems II: Express Briefs.

[14]  Zyad Shaaban,et al.  Image Encryption Using DCT and Stream Cipher , 2009 .

[15]  Ch. Samson,et al.  An RGB Image Encryption Supported by Wavelet-based Lossless Compression , 2012 .

[16]  RatnaKumari Challa,et al.  Proficient LWE-based encryption using CAN compression algorithm , 2015, 2015 Conference on Power, Control, Communication and Computational Technologies for Sustainable Growth (PCCCTSG).

[17]  Miao Zhang,et al.  A joint image lossless compression and encryption method based on chaotic map , 2017, Multimedia Tools and Applications.

[18]  Yushu Zhang,et al.  Exploiting random convolution and random subsampling for image encryption and compression , 2015 .

[19]  Hong Wang,et al.  Image compression-encryption scheme combining 2D compressive sensing with discrete fractional random transform , 2017, Multimedia Tools and Applications.

[20]  C. Feregrino-Uribe,et al.  A hardware architecture for elliptic curve cryptography and lossless data compression , 2005, 15th International Conference on Electronics, Communications and Computers (CONIELECOMP'05).

[21]  Balasubramanian Raman,et al.  Chaos Based Joint Compression and Encryption Framework for End-to-End Communication Systems , 2014, Adv. Multim..

[22]  Li-Hua Gong,et al.  Novel image compression–encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing , 2014 .

[23]  Jozsef Vass,et al.  Significance-linked connected component analysis for low bit rate image coding , 1997, Proceedings of International Conference on Image Processing.

[24]  Rajiv Saxena,et al.  Hybrid Encryption-Compression Scheme Based on Multiple Parameter Discrete Fractional Fourier Transform with Eigen Vector Decomposition Algorithm , 2014 .

[25]  Qiong Huang,et al.  A new encryption-then-compression algorithm using the rate-distortion optimization , 2015, Signal Process. Image Commun..

[26]  Seong Oun Hwang,et al.  A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices , 2016, Neural Computing and Applications.

[27]  Di Xiao,et al.  Joint SPIHT compression and selective encryption , 2014, Appl. Soft Comput..

[28]  Ch. Samson,et al.  A Novel Image Encryption Supported by Compression Using Multilevel Wavelet Transform , 2012 .

[29]  Seiichi Uchida,et al.  A parallel image encryption method based on compressive sensing , 2012, Multimedia Tools and Applications.

[30]  Zhihong Zhou,et al.  Image compression–encryption scheme based on hyper-chaotic system and 2D compressive sensing , 2016 .

[31]  Xiaochun Cao,et al.  Performing scalable lossy compression on pixel encrypted images , 2013, EURASIP Journal on Image and Video Processing.

[32]  S.Si.M.T. Ahmad Saikhu,et al.  IMPLEMENTASI ALGORITMA PENGGABUNGAN KOMPRESI DAN ENKRIPSI CITRA DENGAN DCT DAN SHA-1 , 2013 .

[33]  Arun Kumar,et al.  A Modified Encryption Algorithm for Compression of Color Image , 2014 .

[34]  B. Suneetha,et al.  Designing an Efficient Image Encryption-then Compression System , 2015 .

[35]  Mohd Ikram Mohammad,et al.  File Security based on Pretty Good Privacy (PGP) Concept , 2011, Comput. Inf. Sci..

[36]  Safya Belghith,et al.  Joint compression and encryption using chaotically mutated Huffman trees , 2010 .

[37]  Abdul Razzaque An Approach to Image Compression with Partial Encryption without sharing the Secret Key , 2012 .

[38]  Ding Qun,et al.  JPEG Algorithm Analysis and Application in Image Compression Encryption of Digital Chaos , 2013, 2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control.

[39]  Wenjun Zeng,et al.  Efficient Compression of Encrypted Grayscale Images , 2010, IEEE Transactions on Image Processing.

[40]  M. Arunkumar,et al.  Implementation of Encrypted Image Compression Using Resolution Progressive Compression Scheme , 2014 .

[41]  Sen Bai,et al.  Image encryption and compression based on the generalized knight’s tour, discrete cosine transform and chaotic maps , 2016, Multimedia Tools and Applications.

[42]  C.-C. Jay Kuo,et al.  Design of integrated multimedia compression and encryption systems , 2005, IEEE Transactions on Multimedia.

[43]  Kannan Ramchandran,et al.  On Compressing Encrypted Data without the Encryption Key , 2004, TCC.

[44]  Jianhui Wu,et al.  Image encryption and compression based on kronecker compressed sensing and elementary cellular automata scrambling , 2016 .

[45]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[46]  V. V. S. Murthy,et al.  SMOOTHING AND OPTIMAL COMPRESSION OF ENCRYPTED GRAY SCALE IMAGES , 2012 .

[47]  A. Alfalou,et al.  Assessing the performance of a method of simultaneous compression and encryption of multiple images and its resistance against various attacks. , 2013, Optics express.

[48]  T. Sudarson,et al.  Simultaneous Compression and Encryption using Arithmetic Coding with Randomized Bits , 2012 .

[49]  Akhil Kaushik,et al.  A two stage hybrid model for image encryption and compression to enhance security and efficiency , 2014, 2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014).

[50]  Hameed Abdul-Kareem Younis,et al.  Approach For Partial Encryption Of Compressed Images , .