{"title":"基于矢量量化和交叉混沌映射的图像混淆扩散密码系统设计","authors":"Bing Yan, Sen Bai","doi":"10.1109/ICIVC.2017.7984634","DOIUrl":null,"url":null,"abstract":"With the rapid growth of image transmission over the public networks, image compression and encryption has received increasing attention to reduce the redundancy and ensure security. In this paper, a scheme of image compression and encryption based on vector quantization (VQ) and cross chaotic map has been proposed that simultaneously compresses and encrypts the image based on confusion-diffusion cryptosystem. Extensive security analysis has been performed on the proposed scheme by using key space analysis, key sensitivity analysis, statistical analysis and differential analysis. Results of our analysis show that the proposed scheme has high security, significant savings in computation and good compression performance.","PeriodicalId":181522,"journal":{"name":"2017 2nd International Conference on Image, Vision and Computing (ICIVC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Design of image confusion-diffusion cryptosystem based on vector quantization and cross chaotic map\",\"authors\":\"Bing Yan, Sen Bai\",\"doi\":\"10.1109/ICIVC.2017.7984634\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the rapid growth of image transmission over the public networks, image compression and encryption has received increasing attention to reduce the redundancy and ensure security. In this paper, a scheme of image compression and encryption based on vector quantization (VQ) and cross chaotic map has been proposed that simultaneously compresses and encrypts the image based on confusion-diffusion cryptosystem. Extensive security analysis has been performed on the proposed scheme by using key space analysis, key sensitivity analysis, statistical analysis and differential analysis. Results of our analysis show that the proposed scheme has high security, significant savings in computation and good compression performance.\",\"PeriodicalId\":181522,\"journal\":{\"name\":\"2017 2nd International Conference on Image, Vision and Computing (ICIVC)\",\"volume\":\"27 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 2nd International Conference on Image, Vision and Computing (ICIVC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICIVC.2017.7984634\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 2nd International Conference on Image, Vision and Computing (ICIVC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIVC.2017.7984634","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Design of image confusion-diffusion cryptosystem based on vector quantization and cross chaotic map
With the rapid growth of image transmission over the public networks, image compression and encryption has received increasing attention to reduce the redundancy and ensure security. In this paper, a scheme of image compression and encryption based on vector quantization (VQ) and cross chaotic map has been proposed that simultaneously compresses and encrypts the image based on confusion-diffusion cryptosystem. Extensive security analysis has been performed on the proposed scheme by using key space analysis, key sensitivity analysis, statistical analysis and differential analysis. Results of our analysis show that the proposed scheme has high security, significant savings in computation and good compression performance.