Towards Integrating Image Encryption with Compression: A Survey

被引:55
作者
Singh, Kedar Nath [1 ,2 ,3 ]
Singh, Amit Kumar [4 ]
机构
[1] Noida Inst Engn & Technol, Dept CSE, Greater Noida, UP, India
[2] Noida Inst Engn & Thchnol, Dept Comp Sci & Engn, Greater Noida 201306, Uttar Pradesh, India
[3] Noida Inst Engn & Thchnol, Dept CSE, Greater Noida 201306, Uttar Pradesh, India
[4] Natl Inst Technol Patna, Dept Comp Sci & Engn, Patna 800005, Bihar, India
关键词
Encryption; digital images; compression; joint encryption compression; IDENTITY AUTHENTICATION; ALGORITHM; SCHEME; SYSTEM; ROBUST; CHAOS; WATERMARKING;
D O I
10.1145/3498342
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As digital images are consistently generated and transmitted online, the unauthorized utilization of these images is an increasing concern that has a significant impact on both security and privacy issues; additionally, the representation of digital images requires a large amount of data. In recent years, an image compression scheme has been widely considered; such a scheme saves on hardware storage space and lowers both the transmission time and bandwidth demand for various potential applications. In this article, we review the various approaches taken to consider joint encryption and compression, assessing both their merits and their limitations. In addition to the survey, we also briefly introduce the most interesting and most often utilized applications of image encryption and evaluation metrics, providing an overview of the various kinds of image encryption schemes available. The contribution made by these approaches is then summarized and compared, offering a consideration of the different technical perspectives. Lastly, we highlight the recent challenges and some potential research directions that could fill the gaps in these domains for both researchers and developers.
引用
收藏
页数:21
相关论文
共 89 条
  • [1] Image encryption based on Independent Component Analysis and Arnold's Cat Map
    Abbas, Nidaa AbdulMohsin
    [J]. EGYPTIAN INFORMATICS JOURNAL, 2016, 17 (01) : 139 - 146
  • [2] Blockchain-assisted secure image transmission and diagnosis model on Internet of Medical Things Environment
    Alqaralleh B.A.Y.
    Vaiyapuri T.
    Parvathy V.S.
    Gupta D.
    Khanna A.
    Shankar K.
    [J]. Personal and Ubiquitous Computing, 2024, 28 (01) : 17 - 27
  • [3] Compression-Then-Encryption-Based Secure Watermarking Technique for Smart Healthcare System
    Anand, Ashima
    Singh, Amit Kumar
    Lv, Zhihan
    Bhatnagar, Guarav
    [J]. IEEE MULTIMEDIA, 2020, 27 (04) : 133 - 143
  • [4] A pixel permutation based image encryption technique using chaotic map
    Anwar, Shamama
    Meghana, Solleti
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (19) : 27569 - 27590
  • [5] Cy: Chaotic yolo for user intended image encryption and sharing in social media
    Asgari-Chenaghlu, Meysam
    Feizi-Derakhshi, Mohammad-Reza
    Nikzad-Khasmakhi, Narjes
    Feizi-Derakhshi, Ali-Reza
    Ramezani, Majid
    Jahanbakhsh-Nagadeh, Zoleikha
    Rahkar-Farshi, Taymaz
    Zafarani-Moattar, Elnaz
    Ranjbar-Khadivi, Mehrdad
    Balafar, Mohammad-Ali
    [J]. INFORMATION SCIENCES, 2021, 542 : 212 - 227
  • [6] On Known-Plaintext Attacks to a Compressed Sensing-Based Encryption: A Quantitative Analysis
    Cambareri, Valerio
    Mangia, Mauro
    Pareschi, Fabio
    Rovatti, Riccardo
    Setti, Gianluca
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (10) : 2182 - 2195
  • [7] Color image compression and encryption scheme based on compressive sensing and double random encryption strategy
    Chai, Xiuli
    Bi, Jianqiang
    Gan, Zhihua
    Liu, Xianxing
    Zhang, Yushu
    Chen, Yiran
    [J]. SIGNAL PROCESSING, 2020, 176
  • [8] Color image encryption based on the affine transform and gyrator transform
    Chen, Hang
    Du, Xiaoping
    Liu, Zhengjun
    Yang, Chengwei
    [J]. OPTICS AND LASERS IN ENGINEERING, 2013, 51 (06) : 768 - 775
  • [9] Encryption-Then-Compression Systems Using Grayscale-Based Image Encryption for JPEG Images
    Chuman, Tatsuya
    Sirichotedumrong, Warit
    Kiya, Hitoshi
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (06) : 1515 - 1525
  • [10] Image encryption for secure Internet multimedia applications
    Dang, PP
    Chau, PM
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (03) : 395 - 403