scispace - formally typeset
Journal ArticleDOI

Efficient Compression of Encrypted Grayscale Images

TLDR
A resolution progressive compression scheme which compresses an encrypted image progressively in resolution, such that the decoder can observe a low-resolution version of the image, study local statistics based on it, and use the statistics to decode the next resolution level.
Abstract
Lossless compression of encrypted sources can be achieved through Slepian-Wolf coding. For encrypted real-world sources, such as images, the key to improve the compression efficiency is how the source dependency is exploited. Approaches in the literature that make use of Markov properties in the Slepian-Wolf decoder do not work well for grayscale images. In this correspondence, we propose a resolution progressive compression scheme which compresses an encrypted image progressively in resolution, such that the decoder can observe a low-resolution version of the image, study local statistics based on it, and use the statistics to decode the next resolution level. Good performance is observed both theoretically and experimentally.

read more

Citations
More filters
Journal ArticleDOI

Separable Reversible Data Hiding in Encrypted Image

TL;DR: This work proposes a novel scheme for separable reversible data hiding in encrypted images by exploiting the spatial correlation in natural image when the amount of additional data is not too large.
Journal ArticleDOI

Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption

TL;DR: This paper proposes a novel method by reserving room before encryption with a traditional RDH algorithm, and thus it is easy for the data hider to reversibly embed data in the encrypted image.
Journal ArticleDOI

Reversibility improved data hiding in encrypted images

TL;DR: A novel reversible data hiding technique in encrypted images where some pixels are estimated before encryption so that additional data can be embedded in the estimating errors and the data extraction and image recovery are free of errors.
Journal ArticleDOI

High Capacity Reversible Data Hiding in Encrypted Images by Patch-Level Sparse Representation

TL;DR: This paper proposes to consider the patch-level sparse representation when hiding the secret data, and significantly outperforms the state-of-the-art methods in terms of the embedding rate and the image quality.
Journal ArticleDOI

Reversible Data Hiding in Encrypted Images With Distributed Source Encoding

TL;DR: A novel scheme of reversible data hiding in encrypted images using distributed source coding using Slepian-Wolf encoded using low-density parity check codes that outperforms the previously published ones.
References
More filters
Book

Vector Quantization and Signal Compression

TL;DR: The author explains the design and implementation of the Levinson-Durbin Algorithm, which automates the very labor-intensive and therefore time-heavy and expensive process of designing and implementing a Quantizer.
Journal ArticleDOI

Noiseless coding of correlated information sources

TL;DR: The minimum number of bits per character R_X and R_Y needed to encode these sequences so that they can be faithfully reproduced under a variety of assumptions regarding the encoders and decoders is determined.
Book

Cryptography and Network Security: Principles and Practice

TL;DR: The new edition of William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students.
Journal ArticleDOI

The LOCO-I lossless image compression algorithm: principles and standardization into JPEG-LS

TL;DR: LOCO-I as discussed by the authors is a low complexity projection of the universal context modeling paradigm, matching its modeling unit to a simple coding unit, which is based on a simple fixed context model, which approaches the capability of more complex universal techniques for capturing high-order dependencies.
Book

Cryiptography and Network Security : Principles and Practices, 3rd ed

TL;DR: In this article, the authors present a survey of the most popular methods for teaching creativity in the field of cryptography and apply them in the context of public-key cryptography and RSA.
Related Papers (5)