Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/106932
PIRA download icon_1.1View/Download Full Text
DC FieldValueLanguage
dc.contributorDepartment of Electrical and Electronic Engineering-
dc.creatorLi, P-
dc.creatorLo, KT-
dc.date.accessioned2024-06-07T00:58:57Z-
dc.date.available2024-06-07T00:58:57Z-
dc.identifier.issn1047-3203-
dc.identifier.urihttp://hdl.handle.net/10397/106932-
dc.language.isoenen_US
dc.publisherAcademic Pressen_US
dc.rights© 2018 Elsevier Inc. All rights reserved.en_US
dc.rights© 2018. This manuscript version is made available under the CC-BY-NC-ND 4.0 license https://creativecommons.org/licenses/by-nc-nd/4.0/en_US
dc.rightsThe following publication Li, P., & Lo, K. T. (2019). Joint image encryption and compression schemes based on 16× 16 DCT. Journal of Visual Communication and Image Representation, 58, 12-24 is available at https://doi.org/10.1016/j.jvcir.2018.11.018.en_US
dc.subject16 × 16 DCTen_US
dc.subjectImage encryptionen_US
dc.subjectJPEG compressionen_US
dc.subjectStatistical attacken_US
dc.titleJoint image encryption and compression schemes based on 16 x 16 DCTen_US
dc.typeJournal/Magazine Articleen_US
dc.identifier.spage12-
dc.identifier.epage24-
dc.identifier.volume58-
dc.identifier.doi10.1016/j.jvcir.2018.11.018-
dcterms.abstractJoint image encryption and compression schemes have shown their great potential values in protecting compressed images. To achieve the protection, a trade-off between encryption power and compression ability needs to be considered. In this paper, we propose two new joint encryption and compression schemes, where one scheme emphasizes compression performance, another highlights protection performance. For a given plain-image, we first raster scan it into non-overlapping 16 16 blocks, then apply various encryption techniques to it. In the first scheme, encryption operations are conducted at the transformation stage and quantization stage of JPEG. As for the second scheme, we add the run/size and value (RSV) pairs’ shuffling operation at JPEG’s entropy coding stage after first scheme’s encryption operations. Performance evaluations using various criteria are conducted to show that the first scheme has better compression efficiency, while the second scheme has better defense ability against the statistical attack.-
dcterms.accessRightsopen accessen_US
dcterms.bibliographicCitationJournal of visual communication and image representation, Jan. 2019, v. 58, p. 12-24-
dcterms.isPartOfJournal of visual communication and image representation-
dcterms.issued2019-01-
dc.identifier.scopus2-s2.0-85056905271-
dc.identifier.eissn1095-9076-
dc.description.validate202405 bcch-
dc.description.oaAccepted Manuscripten_US
dc.identifier.FolderNumberEIE-0425en_US
dc.description.fundingSourceSelf-fundeden_US
dc.description.pubStatusPublisheden_US
dc.identifier.OPUS20593772en_US
dc.description.oaCategoryGreen (AAM)en_US
Appears in Collections:Journal/Magazine Article
Files in This Item:
File Description SizeFormat 
Li_Joint_Image_Encryption.pdfPre-Published version2.98 MBAdobe PDFView/Open
Open Access Information
Status open access
File Version Final Accepted Manuscript
Access
View full-text via PolyU eLinks SFX Query
Show simple item record

Page views

5
Citations as of Jun 30, 2024

Downloads

2
Citations as of Jun 30, 2024

SCOPUSTM   
Citations

28
Citations as of Jun 21, 2024

WEB OF SCIENCETM
Citations

23
Citations as of Jun 27, 2024

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.