Encryption using SCAN Pattern & Image Encryption then Compression

Authors

  • Rohit Research Scholar, Department of ECE, CBS group of institutions, Jhajjar, India
  • Chinar Department of ECE, CBS group of institutions, Jhajjar, India

Keywords:

Carrier Images, Random Permutation, Prediction Error

Abstract

Encryption Then Compression (ETC) system that ensures security and give compression ratios similar to the state of the art Compression then Encryption (CTE) systems has been an area of research recently. The existing Encryption Then Compression system encrypts using Prediction Error Clustering and Random Permutation and compress using adaptive arithmetic coding. The existing system gives only slightly worse compression ratio than CTE system. The need of sending cluster information makes it vulnerable to attacks. Statistical attack is also possible since it uses adaptive arithmetic coding for compression. The proposed system tries to overcome the shortcomings of the existing system by using hybrid approach for image encryption using SCAN patterns and carrier images at multiple stages and use adaptive arithmetic coding for compression.

References

Zhou, Jiantao, et al. "Designing an efficient image encryption-then compression system via prediction error clustering and random permutation." IEEE Trans. Inf. Forensics and Security, vol. 9, no. 1, pp. 86–97, Jan. 2014.

J. Zhou, X. Liu, and O. C. Au, “On the design of an efficient encryption then- compression system,” in Proc. ICASSP, 2013, pp. 2872–2876.

T. Bianchi, A. Piva, and M. Barni, “On the implementation of the discrete Fourier transform in the encrypted domain,” IEEE Trans. Inf. Forensics Security, vol. 4, no. 1, pp. 86–97, Mar. 2009.

T. Bianchi, A. Piva, and M. Barni, “Composite signal representation for fast and storage-efficient processing of encrypted signals,” IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 180–187, Mar. 2010.

M. Barni, P. Failla, R. Lazzeretti, A.-R. Sadeghi, and T. Schneider, “Privacy-preserving ECG classification with branching programs and neural networks,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 2, pp. 452–468, Jun. 2011.

Z. Erkin, T. Veugen, T. Toft, and R. L. Lagendijk, “Generating private recommendations efficiently using homomorphic encryption and data packing,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 1053– 1066, Jun. 2012.

M. Johnson, P. Ishwar, V. M. Prabhakaran, D. Schonberg, and K.

Ramchandran, “On compressing encrypted data,” IEEE Trans. Signal Process., vol. 52, no. 10, pp. 2992–3006, Oct. 2004.

D. Schonberg, S. C. Draper, and K. Ramchandran, “On blind compression of encrypted correlated data approaching the source entropy rate,” in Proc. 43rd Annu. Allerton Conf., 2005, pp. 1–3.

D. Schonberg, S. C. Draper, and K. Ramchandran, “On compression of encrypted images,” in Proc. IEEE Int. Conf. Image Process., Oct. 2006,

pp. 269–272.

R. Lazzeretti and M. Barni, “Lossless compression of encrypted greylevel and color images,” in Proc. 16th Eur. Signal Process. Conf., Aug. 2008, pp. 1–5.

Downloads

Published

30-06-2016

How to Cite

Rohit, & Chinar. (2016). Encryption using SCAN Pattern & Image Encryption then Compression. International Journal for Research Publication and Seminar, 7(3). Retrieved from https://jrps.shodhsagar.com/index.php/j/article/view/696

Issue

Section

Original Research Article