An Approach to Selective Encryption on Compressed Image

被引:0
作者
Roy, Subhajit [1 ]
Sanyal, Gautam [2 ]
机构
[1] Bankura Unnayani Inst Engn, Dept Comp Sci, Bankura, W Bengal, India
[2] Natl Inst Technol Durgapur, Dept Comp Sci & Engn, Durgapur, W Bengal, India
来源
PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I) | 2016年
关键词
Selective Encryption; Compression; Huffman code; Lavenshtein Distance; Encryption ratio; Weighted frequency;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advancement in technology has made the traffic of digital image mainly in the field of medical application a daily routine. Now a day's transmission of medical image especially over wireless is very common. But with the concern for security of image is also growing proportionally resulting from the increasing amount of imaging data. Two important measures for evaluating an encryption system are speed of encryption and security levels. Low computational cost and low storage requirement is the demand of mass. A lot of researches [1-12] have been made to give the image the maximum security level by means of an encryption system which runs in resource constrained device. Selective Encryption is an approach to reduce the computational resources for large imaging data. In this technique a part of image is encrypted keeping the remaining part unencrypted. Here we apply a static HUFFMAN coding for compressing image data and apply Selective Encryption with our proposed algorithm. The experimental study shows that above 90% damage of original file can be achieved by only encrypting 60% to 70 of original file using the proposed technique.
引用
收藏
页码:209 / 214
页数:6
相关论文
共 13 条
  • [1] AGI I, 1996, P S NETW DISTR SYST
  • [2] BHUNIA CT, 2006, ASIAN J INFORM TECHN, V5990, P1017
  • [3] Partial encryption of compressed images and videos
    Cheng, H
    Li, XB
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2000, 48 (08) : 2439 - 2451
  • [4] Forlenza Randolph Michael, METHOD SELECTIVE ENC
  • [5] Hossein Syed Mahamud, 2013, INT J INFORM TECHNOL
  • [6] Lei Tang, 1996, Proceedings ACM Multimedia 96, P219, DOI 10.1145/244130.244209
  • [7] Selective encryption for consumer applications
    Lookabaugh, T
    Sicker, DC
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2004, 42 (05) : 124 - 129
  • [8] Meyer J, 1995, Security mechanisms for multimedia data with the example of mpeg-1 video
  • [9] Qiao L., 1997, Las Vegas : Proceedings of the 1s International Conference on Imaging Science, Systems and Technology, P21
  • [10] Rani Manju, 2015, INT J ADV RES COMPUT, V5