Encryption using SCAN Pattern & Image Encryption then Compression
Keywords:
Carrier Images, Random Permutation, Prediction ErrorAbstract
Encryption Then Compression (ETC) system that ensures security and give compression ratios similar to the state of the art Compression then Encryption (CTE) systems has been an area of research recently. The existing Encryption Then Compression system encrypts using Prediction Error Clustering and Random Permutation and compress using adaptive arithmetic coding. The existing system gives only slightly worse compression ratio than CTE system. The need of sending cluster information makes it vulnerable to attacks. Statistical attack is also possible since it uses adaptive arithmetic coding for compression. The proposed system tries to overcome the shortcomings of the existing system by using hybrid approach for image encryption using SCAN patterns and carrier images at multiple stages and use adaptive arithmetic coding for compression.
References
Zhou, Jiantao, et al. "Designing an efficient image encryption-then compression system via prediction error clustering and random permutation." IEEE Trans. Inf. Forensics and Security, vol. 9, no. 1, pp. 86–97, Jan. 2014.
J. Zhou, X. Liu, and O. C. Au, “On the design of an efficient encryption then- compression system,” in Proc. ICASSP, 2013, pp. 2872–2876.
T. Bianchi, A. Piva, and M. Barni, “On the implementation of the discrete Fourier transform in the encrypted domain,” IEEE Trans. Inf. Forensics Security, vol. 4, no. 1, pp. 86–97, Mar. 2009.
T. Bianchi, A. Piva, and M. Barni, “Composite signal representation for fast and storage-efficient processing of encrypted signals,” IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 180–187, Mar. 2010.
M. Barni, P. Failla, R. Lazzeretti, A.-R. Sadeghi, and T. Schneider, “Privacy-preserving ECG classification with branching programs and neural networks,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 2, pp. 452–468, Jun. 2011.
Z. Erkin, T. Veugen, T. Toft, and R. L. Lagendijk, “Generating private recommendations efficiently using homomorphic encryption and data packing,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 1053– 1066, Jun. 2012.
M. Johnson, P. Ishwar, V. M. Prabhakaran, D. Schonberg, and K.
Ramchandran, “On compressing encrypted data,” IEEE Trans. Signal Process., vol. 52, no. 10, pp. 2992–3006, Oct. 2004.
D. Schonberg, S. C. Draper, and K. Ramchandran, “On blind compression of encrypted correlated data approaching the source entropy rate,” in Proc. 43rd Annu. Allerton Conf., 2005, pp. 1–3.
D. Schonberg, S. C. Draper, and K. Ramchandran, “On compression of encrypted images,” in Proc. IEEE Int. Conf. Image Process., Oct. 2006,
pp. 269–272.
R. Lazzeretti and M. Barni, “Lossless compression of encrypted greylevel and color images,” in Proc. 16th Eur. Signal Process. Conf., Aug. 2008, pp. 1–5.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2016 International Journal for Research Publication and Seminar
This work is licensed under a Creative Commons Attribution 4.0 International License.
Re-users must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. This license allows for redistribution, commercial and non-commercial, as long as the original work is properly credited.