Please use this identifier to cite or link to this item:
http://hdl.handle.net/10397/106932
| DC Field | Value | Language |
|---|---|---|
| dc.contributor | Department of Electrical and Electronic Engineering | - |
| dc.creator | Li, P | - |
| dc.creator | Lo, KT | - |
| dc.date.accessioned | 2024-06-07T00:58:57Z | - |
| dc.date.available | 2024-06-07T00:58:57Z | - |
| dc.identifier.issn | 1047-3203 | - |
| dc.identifier.uri | http://hdl.handle.net/10397/106932 | - |
| dc.language.iso | en | en_US |
| dc.publisher | Academic Press | en_US |
| dc.rights | © 2018 Elsevier Inc. All rights reserved. | en_US |
| dc.rights | © 2018. This manuscript version is made available under the CC-BY-NC-ND 4.0 license https://creativecommons.org/licenses/by-nc-nd/4.0/ | en_US |
| dc.rights | The following publication Li, P., & Lo, K. T. (2019). Joint image encryption and compression schemes based on 16× 16 DCT. Journal of Visual Communication and Image Representation, 58, 12-24 is available at https://doi.org/10.1016/j.jvcir.2018.11.018. | en_US |
| dc.subject | 16 × 16 DCT | en_US |
| dc.subject | Image encryption | en_US |
| dc.subject | JPEG compression | en_US |
| dc.subject | Statistical attack | en_US |
| dc.title | Joint image encryption and compression schemes based on 16 x 16 DCT | en_US |
| dc.type | Journal/Magazine Article | en_US |
| dc.identifier.spage | 12 | - |
| dc.identifier.epage | 24 | - |
| dc.identifier.volume | 58 | - |
| dc.identifier.doi | 10.1016/j.jvcir.2018.11.018 | - |
| dcterms.abstract | Joint image encryption and compression schemes have shown their great potential values in protecting compressed images. To achieve the protection, a trade-off between encryption power and compression ability needs to be considered. In this paper, we propose two new joint encryption and compression schemes, where one scheme emphasizes compression performance, another highlights protection performance. For a given plain-image, we first raster scan it into non-overlapping 16 16 blocks, then apply various encryption techniques to it. In the first scheme, encryption operations are conducted at the transformation stage and quantization stage of JPEG. As for the second scheme, we add the run/size and value (RSV) pairs’ shuffling operation at JPEG’s entropy coding stage after first scheme’s encryption operations. Performance evaluations using various criteria are conducted to show that the first scheme has better compression efficiency, while the second scheme has better defense ability against the statistical attack. | - |
| dcterms.accessRights | open access | en_US |
| dcterms.bibliographicCitation | Journal of visual communication and image representation, Jan. 2019, v. 58, p. 12-24 | - |
| dcterms.isPartOf | Journal of visual communication and image representation | - |
| dcterms.issued | 2019-01 | - |
| dc.identifier.scopus | 2-s2.0-85056905271 | - |
| dc.identifier.eissn | 1095-9076 | - |
| dc.description.validate | 202405 bcch | - |
| dc.description.oa | Accepted Manuscript | en_US |
| dc.identifier.FolderNumber | EIE-0425 | en_US |
| dc.description.fundingSource | Self-funded | en_US |
| dc.description.pubStatus | Published | en_US |
| dc.identifier.OPUS | 20593772 | en_US |
| dc.description.oaCategory | Green (AAM) | en_US |
| Appears in Collections: | Journal/Magazine Article | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| Li_Joint_Image_Encryption.pdf | Pre-Published version | 2.98 MB | Adobe PDF | View/Open |
Page views
96
Last Week
3
3
Last month
Citations as of Apr 12, 2026
Downloads
111
Citations as of Apr 12, 2026
SCOPUSTM
Citations
38
Citations as of May 8, 2026
WEB OF SCIENCETM
Citations
32
Citations as of Apr 23, 2026
Google ScholarTM
Check
Altmetric
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.



