Please use this identifier to cite or link to this item:
http://hdl.handle.net/10397/106982
DC Field | Value | Language |
---|---|---|
dc.contributor | Department of Electrical and Electronic Engineering | - |
dc.creator | Li, P | - |
dc.creator | Lo, KT | - |
dc.date.accessioned | 2024-06-07T00:59:24Z | - |
dc.date.available | 2024-06-07T00:59:24Z | - |
dc.identifier.issn | 1047-3203 | - |
dc.identifier.uri | http://hdl.handle.net/10397/106982 | - |
dc.language.iso | en | en_US |
dc.publisher | Academic Press | en_US |
dc.rights | © 2017 Elsevier Inc. All rights reserved. | en_US |
dc.rights | © 2017. This manuscript version is made available under the CC-BY-NC-ND 4.0 license https://creativecommons.org/licenses/by-nc-nd/4.0/ | en_US |
dc.rights | The following publication Li, P., & Lo, K. T. (2017). Joint image compression and encryption based on order-8 alternating transforms. Journal of Visual Communication and Image Representation, 44, 61-71 is available at https://doi.org/10.1016/j.jvcir.2017.01.021. | en_US |
dc.subject | Image encryption | en_US |
dc.subject | JPEG standard | en_US |
dc.subject | Orthogonal transforms | en_US |
dc.subject | Security analysis | en_US |
dc.title | Joint image compression and encryption based on order-8 alternating transforms | en_US |
dc.type | Journal/Magazine Article | en_US |
dc.identifier.spage | 61 | - |
dc.identifier.epage | 71 | - |
dc.identifier.volume | 44 | - |
dc.identifier.doi | 10.1016/j.jvcir.2017.01.021 | - |
dcterms.abstract | In this paper, we propose a novel joint image compression and encryption scheme based on JPEG standard. We realize image encryption at JPEG’s transformation stage. Instead of only using 8 8 discrete cosine transform (DCT) for transformation, we generate new orthogonal transforms by embedding an extra rotation angle of p to different stages’ butterflies in 8 8 DCT’s flow-graph, and then apply them alternatively for transformation according to a predefined secret key. By carefully controlling the number of rotation angles embedded, the quality control of encrypted images can also be achieved. The encryption algorithm is further enhanced by performing block permutation before the entropy encoding stage. Extensive experiments have been conducted to show the good protection and compression performance of our encryption schemes. Finally, a detailed security analysis is provided to show the encryption schemes’ resistance to various cryptanalysis methods, such as brute-force attack, key sensitivity analysis, replacement attack and statistical attack. | - |
dcterms.accessRights | open access | en_US |
dcterms.bibliographicCitation | Journal of visual communication and image representation, Apr. 2017, v. 44, p. 61-71 | - |
dcterms.isPartOf | Journal of visual communication and image representation | - |
dcterms.issued | 2017-04 | - |
dc.identifier.scopus | 2-s2.0-85010659702 | - |
dc.identifier.eissn | 1095-9076 | - |
dc.description.validate | 202405 bcch | - |
dc.description.oa | Accepted Manuscript | en_US |
dc.identifier.FolderNumber | EIE-0726 | en_US |
dc.description.fundingSource | Self-funded | en_US |
dc.description.pubStatus | Published | en_US |
dc.identifier.OPUS | 6718126 | en_US |
dc.description.oaCategory | Green (AAM) | en_US |
Appears in Collections: | Journal/Magazine Article |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Li_Joint_Image_Compression.pdf | Pre-Published version | 3.02 MB | Adobe PDF | View/Open |
Page views
5
Citations as of Jun 30, 2024
Downloads
4
Citations as of Jun 30, 2024
SCOPUSTM
Citations
21
Citations as of Jun 21, 2024
WEB OF SCIENCETM
Citations
21
Citations as of Jun 27, 2024
![](/image/google_scholar.jpg)
Google ScholarTM
Check
Altmetric
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.