Simultaneous Encryption/Compression of Images Using Alpha Rooting

Summary form only given. Significant work has been performed on encrypting images and compressing images as two separate problems, but traditional encryption techniques generally degrade the compression ratio. To circumvent these issues, two methods have been used. The first employs known encryption algorithms on compressed image data. The second develops compression algorithms which work well for encrypted data. The contribution of this paper is using alpha rooting to perform simultaneous compression and encryption. This achieves improved compression performance in terms of computational complexity and compression ratio. Results are shown for 2 of the well known benchmark images, using the well known JPEG image compression standard to demonstrate the effectiveness of alpha rooting for simultaneous encryption and compression.

[1]  Borko Furht,et al.  Short Paper: Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[2]  Xiaobo Li,et al.  Image compression and encryption using tree structures , 1997, Pattern Recognit. Lett..

[3]  Henrique S. Malvar Adaptive run-length/Golomb-Rice encoding of quantized generalized Gaussian sources with unknown statistics , 2006, Data Compression Conference (DCC'06).

[4]  C.-C. Jay Kuo,et al.  Design of integrated multimedia compression and encryption systems , 2005, IEEE Transactions on Multimedia.

[5]  Wenjun Zeng,et al.  Efficient frequency domain selective scrambling of digital video , 2003, IEEE Trans. Multim..

[6]  Sos S. Agaian,et al.  Visualization using rational morphology and zonal magnitude reduction , 1998, Electronic Imaging.

[7]  Sos S. Agaian,et al.  Scalable encryption using alpha rooting , 2008, SPIE Defense + Commercial Sensing.

[8]  Guanrong Chen,et al.  Cryptanalysis of a multistage encryption system , 2005, 2005 IEEE International Symposium on Circuits and Systems.

[9]  Chuohao Yeo,et al.  On Compression of Encrypted Video , 2007, 2007 Data Compression Conference (DCC'07).

[10]  Robert M. Gray,et al.  Video residual coding using SPIHT and dependent optimization , 2001, Proceedings DCC 2001. Data Compression Conference.

[11]  Okan K. Ersoy,et al.  Transform image enhancement , 1992, Optical Society of America Annual Meeting.

[12]  Aparna Gurijala,et al.  On encryption-compression tradeoff of pre/post-filtered images , 2005, SPIE Optics + Photonics.

[13]  Gregory L. Mayhew,et al.  A low cost, high speed encryption system and method , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[14]  Shiguo Lian,et al.  A novel image encryption scheme based-on JPEG encoding , 2004, Proceedings. Eighth International Conference on Information Visualisation, 2004. IV 2004..

[15]  Andreas Uhl,et al.  Layered encryption techniques for DCT-coded visual data , 2004, 2004 12th European Signal Processing Conference.

[16]  Guanrong Chen,et al.  Cryptanalysis of an Image Scrambling Scheme Without Bandwidth Expansion , 2008, IEEE Transactions on Circuits and Systems for Video Technology.

[17]  Vinod M. Prabhakaran,et al.  On compressing encrypted data , 2004, IEEE Transactions on Signal Processing.

[18]  Xiaobo Li,et al.  Partial encryption of compressed images and videos , 2000, IEEE Trans. Signal Process..

[19]  Giovanni Motta,et al.  Adaptive linear prediction lossless image coding , 1999, Proceedings DCC'99 Data Compression Conference (Cat. No. PR00096).

[20]  Khalid Sayood,et al.  Lossless hyperspectral image compression using context-based conditional averages , 2005, Data Compression Conference.

[21]  Stefano Lonardi,et al.  A compression-boosting transform for 2D data , 2005, Data Compression Conference.

[22]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[23]  Anil K. Jain Fundamentals of Digital Image Processing , 2018, Control of Color Imaging Systems.

[24]  Amir Akhavan,et al.  A Novel Block Cipher Based on Hierarchy of One-Dimensional Composition Chaotic Maps , 2006, 2006 International Conference on Image Processing.

[25]  Dragan C. Curcija,et al.  Appendix A; Appendix B , 2006 .