{"title":"A Mixed Chaotic-cellular Automata Based Encryption Scheme for Compressed Jpeg Images","authors":"Rabab Beniani, K. Faraoun","doi":"10.6025/jmpt/2018/9/3/88-101","DOIUrl":null,"url":null,"abstract":"In this paper, we propose a new scheme for joint compression and encryption of digital images, based on cellular automata and selective encryption of quantized DCT coefficient. Using a key stream by a cellular automata mechanism, a subset of quantized coefficients is selected and then ciphered with the produced pseudorandom key-stream. Thus, we achieve a sufficiently robust security level, mostly against known plaintext attacks while preserving a high compression ratio. Several performance analysis including security analysis, speed performances and compression ratio are performed, and demonstrate the efficacy of the proposed approach with respect to existing ones.","PeriodicalId":226712,"journal":{"name":"J. Multim. Process. Technol.","volume":"544 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"J. Multim. Process. Technol.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.6025/jmpt/2018/9/3/88-101","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
In this paper, we propose a new scheme for joint compression and encryption of digital images, based on cellular automata and selective encryption of quantized DCT coefficient. Using a key stream by a cellular automata mechanism, a subset of quantized coefficients is selected and then ciphered with the produced pseudorandom key-stream. Thus, we achieve a sufficiently robust security level, mostly against known plaintext attacks while preserving a high compression ratio. Several performance analysis including security analysis, speed performances and compression ratio are performed, and demonstrate the efficacy of the proposed approach with respect to existing ones.