Search

Article

x

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

SPIHT-based joint image compression and encryption

Yang Hua-Qian Liao Xiao-Feng Kwok-Wo Wong Zhang Wei Wei Peng-Cheng

SPIHT-based joint image compression and encryption

Yang Hua-Qian, Liao Xiao-Feng, Kwok-Wo Wong, Zhang Wei, Wei Peng-Cheng
PDF
Get Citation
  • A joint of image encryption and compression is investigated, and a novel joint encryption and compression scheme is proposed. In our scheme, the encryption process is performed before compression. Making use of the properties of discrete wavelet transform (DWT) and Set Partitioning in Hierarchical Trees (SPIHT) coding, confusion is restricted to the interior of single subband image itself and so image details are retained. Furthermore, diffusion preserves the two most significant bits (MSBs) and the sign bit, which contain important information about the image. The experiments show that the proposed algorithm possesses a good visual quality of the reconstructed image and a high encryption speed.
    • Funds: Project supported by the Research Grants Council of the Hong Kong Government, China (Grant No. CityU 122308), the Natural Science Foundation Project of CQ CSTC (Grant No. CSTC, 2010BB2279), the Applying Basic Research Program of Chongqing Education Committee (Grant Nos. kj091501, kj091502, kj101501), and the China Postdoctoral Science Foundation (Grant No. 2011M501391).
    [1]

    Wen J, Kim H, Villasenor J D 2006 IEEE trans. Signal Process Letter 13 69

    [2]

    Kim H, Wen J, Villasenor J D 2007 IEEE trans. Signal Process. 55 2263

    [3]

    Bose R, Pathak A 2006 IEEE Trans. Circuits Syst. I 53 848

    [4]

    Wong K W, Yuen C H 2008 IEEE trans. Circuits Syst. II 55 1193

    [5]

    Mao Y N, Wu M 2006 IEEE Trans, Image Processing. 15 2061

    [6]

    Brown R, Chua L O 1996 Int. J. Bifurc. Chaos 6 219

    [7]

    Fridrich J 1998 Int. J. Bifurc. Chaos 8 1259

    [8]

    Jakimoski G, Kocarev L 2001 IEEE Trans. Circuits Syst. I 48 163

    [9]

    Dachselt F, Schwarz W 2001 IEEE Trans. Circuits Syst. I 48 1498

    [10]

    Said A, Pearlman W A 1996 IEEE Trans, Image Processing 5 1303

    [11]

    Shapiro J M 1993 IEEE Trans. Signal Processing 41 3445

    [12]

    Luo R C, Chung L Y, Lien C H 2002 IEEE Trans. Industrial Electronics 49 933

    [13]

    Chan K S, Fekri F 2004 IEEE Trans. Signal Processing. 52 2975

    [14]

    Lian S, Sun J, Wang Z 2004 IEEE Int. Conf. Multimedia Exp. 3 2195

    [15]

    Shannon C 1949 Bell System Tech. J. 28 656

    [16]

    Lin R, Mao Y B, Wang Z Q 2008 Proc IEEE Int Conf. Communications and Networking in China 1294

    [17]

    David Salomon 2006 Data Compression Third Edition (Springer ISBN 0-387-40697-2)

    [18]

    Kohda T, Tsuneda A 1997 IEEE Trans Inform Theory 43 104

    [19]

    Said A, Pearlman W A 1996 IEEE Trans, Circuits Syst for Video Tech. 6 243

    [20]

    Behnia A, Akhshani A, Ahadpour S, Mahmodi H, Akhavand A 2007 Phys. Lett. A 366 391

  • [1]

    Wen J, Kim H, Villasenor J D 2006 IEEE trans. Signal Process Letter 13 69

    [2]

    Kim H, Wen J, Villasenor J D 2007 IEEE trans. Signal Process. 55 2263

    [3]

    Bose R, Pathak A 2006 IEEE Trans. Circuits Syst. I 53 848

    [4]

    Wong K W, Yuen C H 2008 IEEE trans. Circuits Syst. II 55 1193

    [5]

    Mao Y N, Wu M 2006 IEEE Trans, Image Processing. 15 2061

    [6]

    Brown R, Chua L O 1996 Int. J. Bifurc. Chaos 6 219

    [7]

    Fridrich J 1998 Int. J. Bifurc. Chaos 8 1259

    [8]

    Jakimoski G, Kocarev L 2001 IEEE Trans. Circuits Syst. I 48 163

    [9]

    Dachselt F, Schwarz W 2001 IEEE Trans. Circuits Syst. I 48 1498

    [10]

    Said A, Pearlman W A 1996 IEEE Trans, Image Processing 5 1303

    [11]

    Shapiro J M 1993 IEEE Trans. Signal Processing 41 3445

    [12]

    Luo R C, Chung L Y, Lien C H 2002 IEEE Trans. Industrial Electronics 49 933

    [13]

    Chan K S, Fekri F 2004 IEEE Trans. Signal Processing. 52 2975

    [14]

    Lian S, Sun J, Wang Z 2004 IEEE Int. Conf. Multimedia Exp. 3 2195

    [15]

    Shannon C 1949 Bell System Tech. J. 28 656

    [16]

    Lin R, Mao Y B, Wang Z Q 2008 Proc IEEE Int Conf. Communications and Networking in China 1294

    [17]

    David Salomon 2006 Data Compression Third Edition (Springer ISBN 0-387-40697-2)

    [18]

    Kohda T, Tsuneda A 1997 IEEE Trans Inform Theory 43 104

    [19]

    Said A, Pearlman W A 1996 IEEE Trans, Circuits Syst for Video Tech. 6 243

    [20]

    Behnia A, Akhshani A, Ahadpour S, Mahmodi H, Akhavand A 2007 Phys. Lett. A 366 391

  • [1] Li Bai-Hong, Wang Dou-Dou, Pang Hua-Feng, Zhang Tao, Xie You, Gao Feng, Dong Rui-Fang, Li Yong-Fang, Zhang Shou-Gang. Compression of correlation time of chirped biphotons by binary phase modulation. Acta Physica Sinica, 2017, 66(4): 044206. doi: 10.7498/aps.66.044206
    [2] KUANG JING-YU, DENG KUN, HUANG RONG-HAI. AN ENCRYPTION APPROACH TO DIGITAL COMMUNICATION BY USING SPATIOTEMPORAL CHAOS SYNCHRONIZATION. Acta Physica Sinica, 2001, 50(10): 1856-1861. doi: 10.7498/aps.50.1856
    [3] Wang Zhong-Chun. Nonclassical feature of the field in the two-atom Tavis-Cummings model with atomic motion. Acta Physica Sinica, 2006, 55(1): 192-196. doi: 10.7498/aps.55.192
    [4] Zhang Ming-Sheng, Wang Ji-Suo, Feng Jian, Liu Tang-Kun. . Acta Physica Sinica, 2002, 51(11): 2509-2513. doi: 10.7498/aps.51.2509
    [5] Wang Dong. Direct Bell state measurement for optical beams with correlated amplitude quadratures and anticorrelated phase quadratures. Acta Physica Sinica, 2010, 59(11): 7596-7601. doi: 10.7498/aps.59.7596
    [6] Xiang Fei, Qiu Shui-Sheng. Stream cipher design based on inter-perturbations of chaotic systems. Acta Physica Sinica, 2008, 57(10): 6132-6138. doi: 10.7498/aps.57.6132
    [7] Gan Tian, Feng Shao-Tong, Nie Shou-Ping, Zhu Zhu-Qing. An image hiding and blind extraction algorithm based on block discrete wavelet transform. Acta Physica Sinica, 2012, 61(8): 084203. doi: 10.7498/aps.61.084203
    [8] Du Wen-Liao, Tao Jian-Feng, Gong Xiao-Yun, Gong Liang, Liu Cheng-Liang. Dual-tree complex wavelet transform based multifractal detrended fluctuation analysis for nonstationary time series. Acta Physica Sinica, 2016, 65(9): 090502. doi: 10.7498/aps.65.090502
    [9] Fu Mao-Jing, Zhuang Jian-Jun, Ning Xin-Bao, Zhan Qing-Bo, Shao Yi, Hou Feng-Zhen. Extracting human gait series based on the wavelet transform. Acta Physica Sinica, 2010, 59(6): 4343-4350. doi: 10.7498/aps.59.4343
    [10] You Rong-Yi, Chen Zhong, Xu Shen-Chu, Wu Bo-Xi. Study on phase-space reconstruction of chaotic signal based on wavelet transform. Acta Physica Sinica, 2004, 53(9): 2882-2888. doi: 10.7498/aps.53.2882
  • Citation:
Metrics
  • Abstract views:  1833
  • PDF Downloads:  676
  • Cited By: 0
Publishing process
  • Received Date:  14 March 2011
  • Accepted Date:  20 June 2011
  • Published Online:  15 April 2012

SPIHT-based joint image compression and encryption

  • 1. College of Computer Science and Engineering, Chongqing University, Chongqing 400044, China;
  • 2. Dept of Electronic Engineering, City University of Hong Kong, 83 Tat Chee Avenue, Kowloon Tong, Hong Kong, China;
  • 3. Centre of Network Management, Chongqing Education of College, Chongqing 400067, China
Fund Project:  Project supported by the Research Grants Council of the Hong Kong Government, China (Grant No. CityU 122308), the Natural Science Foundation Project of CQ CSTC (Grant No. CSTC, 2010BB2279), the Applying Basic Research Program of Chongqing Education Committee (Grant Nos. kj091501, kj091502, kj101501), and the China Postdoctoral Science Foundation (Grant No. 2011M501391).

Abstract: A joint of image encryption and compression is investigated, and a novel joint encryption and compression scheme is proposed. In our scheme, the encryption process is performed before compression. Making use of the properties of discrete wavelet transform (DWT) and Set Partitioning in Hierarchical Trees (SPIHT) coding, confusion is restricted to the interior of single subband image itself and so image details are retained. Furthermore, diffusion preserves the two most significant bits (MSBs) and the sign bit, which contain important information about the image. The experiments show that the proposed algorithm possesses a good visual quality of the reconstructed image and a high encryption speed.

Reference (20)

Catalog

    /

    返回文章
    返回