DISCRETE COSINE TRANSFORM OF ENCRYPTED IMAGES

被引:2
作者
Bianchi, Tziano [1 ]
Piva, Alessandro [1 ]
Barni, Mauro [2 ]
机构
[1] Univ Florence, Dip Elettr & Telecomunicaz, Via S Marta 3, I-50139 Florence, Italy
[2] Univ Siena, Dip Ingn Informaz, I-53100 Siena, Italy
来源
2008 15TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-5 | 2008年
关键词
Discrete Cosine transforms; error analysis; homomorphic encryption; image encryption; signal processing in the encrypted domain;
D O I
10.1109/ICIP.2008.4712093
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Processing a signal directly in the encrypted domain provides an elegant solution in application scenarios where valuable signals must be protected from a malicious processing device. In a previous paper we considered the implementation of the ID Discrete Fourier Transform (DFT) in the encrypted domain, by using the homomorphic properties of the underlying cryptosystem. In this paper we extend our previous results by considering the application of the 2-dimensional DCT to encrypted images. The effect of the consecutive application of the DCT algorithm first by rows then by columns is considered, as well as the differences between the implementation of the direct DCT algorithm and its fast version. Particular attention is given to block-based DCT, with emphasis on the possibility of lowering the computational burden by parallel application of the encrypted domain DCT algorithm to different image blocks.
引用
收藏
页码:1668 / 1671
页数:4
相关论文
共 50 条
  • [21] On fast algorithms for computing the inverse modified discrete cosine transform
    Fan, YH
    Madisetti, VK
    Mersereau, RM
    IEEE SIGNAL PROCESSING LETTERS, 1999, 6 (03) : 61 - 64
  • [22] Fast recursive algorithm for the discrete cosine transform with arbitrary length
    School of Physics and Electrical Information Science, Ningxia University, Yinchuan 750021, China
    Dianzi Yu Xinxi Xuebao, 2007, 2 (418-420):
  • [23] A novel secure steganography based on quantized discrete cosine transform coefficients
    Sun, S. (tjussl_07@126.com), 2013, ICIC Express Letters Office, Tokai University, Kumamoto Campus, 9-1-1, Toroku, Kumamoto, 862-8652, Japan (04):
  • [24] Efficient Image Cipher Based on Baker Map in the Discrete Cosine Transform
    Alhumyani, Hesham
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2020, 20 (01) : 68 - 81
  • [25] Fast computation of the high resolution image restoration by using the discrete cosine transform
    Abe, Yoshinori
    Iiguni, Youji
    2007 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL I, PTS 1-3, PROCEEDINGS, 2007, : 745 - 748
  • [26] An RFID Tag Localization Method Based on Hologram Mask and Discrete Cosine Transform
    Rigall, Eric
    Wang, Xianglong
    Chen, Qianmin
    Zhang, Shu
    Dong, Junyu
    IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2022, 71
  • [27] Hardware Efficient Integer Discrete Cosine Transform for Efficient Image/Video Compression
    Chen, Jiajia
    Liu, Shumin
    Deng, Gelei
    Rahardja, Susanto
    IEEE ACCESS, 2019, 7 : 152635 - 152645
  • [28] A Deep Learning Approach in the Discrete Cosine Transform Domain to Median Filtering Forensics
    Zhang, Jun
    Liao, Yixin
    Zhu, Xinshan
    Wang, Hongquan
    Ding, Jie
    IEEE SIGNAL PROCESSING LETTERS, 2020, 27 (27) : 276 - 280
  • [29] Backdoor Attack Based on Lossy Image Compression Using Discrete Cosine Transform
    Liu, Yuting
    Gu, Hong
    Zhang, Annan
    Qin, Pan
    IEEE ACCESS, 2024, 12 : 196488 - 196497
  • [30] Image Compression Based on a Partially Rotated Discrete Cosine Transform With a Principal Orientation
    Lee, Gihwan
    Choe, Yoonsik
    IEEE ACCESS, 2021, 9 : 101773 - 101786