Faiq Gmira, Said Hraoui, A. Saaidi, A. Oulidi, K. Satori
{"title":"通过动态加密保护JPEG压缩的体系结构","authors":"Faiq Gmira, Said Hraoui, A. Saaidi, A. Oulidi, K. Satori","doi":"10.1109/ISACV.2015.7106192","DOIUrl":null,"url":null,"abstract":"In this article, we investigate image security for transmission in digital networks using a hybrid coding based on juxtaposed encryption and compression. We have proposed a new approach that integrates a dynamic Hill-Cipher encryption added to the step of quantizing of JPEG compression. A step by step demonstration is given in order to show the functioning of the crypto compression scheme constructed. This explanation justifies how to strategically integrate different operations of our crypto compression system. The effectiveness and robustness of our scheme is validated by measuring its security strength, its computational cost and the quality of reconstructed images (PSNR). The results showed that our new idea by both its generic fast encryption and its simple adaptation provides a reasonable complexity and a good compromise between security and compression rate, this crypto compression scheme is efficient and recommended for networks with low bandwidth especially for low-power devices.","PeriodicalId":426557,"journal":{"name":"2015 Intelligent Systems and Computer Vision (ISCV)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"Securing the architecture of the JPEG compression by an dynamic encryption\",\"authors\":\"Faiq Gmira, Said Hraoui, A. Saaidi, A. Oulidi, K. Satori\",\"doi\":\"10.1109/ISACV.2015.7106192\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this article, we investigate image security for transmission in digital networks using a hybrid coding based on juxtaposed encryption and compression. We have proposed a new approach that integrates a dynamic Hill-Cipher encryption added to the step of quantizing of JPEG compression. A step by step demonstration is given in order to show the functioning of the crypto compression scheme constructed. This explanation justifies how to strategically integrate different operations of our crypto compression system. The effectiveness and robustness of our scheme is validated by measuring its security strength, its computational cost and the quality of reconstructed images (PSNR). The results showed that our new idea by both its generic fast encryption and its simple adaptation provides a reasonable complexity and a good compromise between security and compression rate, this crypto compression scheme is efficient and recommended for networks with low bandwidth especially for low-power devices.\",\"PeriodicalId\":426557,\"journal\":{\"name\":\"2015 Intelligent Systems and Computer Vision (ISCV)\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-03-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 Intelligent Systems and Computer Vision (ISCV)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISACV.2015.7106192\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 Intelligent Systems and Computer Vision (ISCV)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISACV.2015.7106192","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Securing the architecture of the JPEG compression by an dynamic encryption
In this article, we investigate image security for transmission in digital networks using a hybrid coding based on juxtaposed encryption and compression. We have proposed a new approach that integrates a dynamic Hill-Cipher encryption added to the step of quantizing of JPEG compression. A step by step demonstration is given in order to show the functioning of the crypto compression scheme constructed. This explanation justifies how to strategically integrate different operations of our crypto compression system. The effectiveness and robustness of our scheme is validated by measuring its security strength, its computational cost and the quality of reconstructed images (PSNR). The results showed that our new idea by both its generic fast encryption and its simple adaptation provides a reasonable complexity and a good compromise between security and compression rate, this crypto compression scheme is efficient and recommended for networks with low bandwidth especially for low-power devices.