Improvements on Data Insertion Technique in Encrypted Image against Lossy Compression

被引:0
|
作者
Ito, Ryoma [1 ]
Tanaka, Kiyoshi [1 ]
Wong, KokSheik [2 ]
Ong, Simying [3 ]
机构
[1] Shinshu Univ, Nagano, Japan
[2] Monash Univ Malaysia, Selangor, Malaysia
[3] Univ Malaya, Kuala Lumpur, Malaysia
关键词
JEDI; safety zone; majority vote; bit error rate;
D O I
10.1109/ispacs48206.2019.8986356
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes two techniques in enhancing the robustness of a joint image encryption and data insertion method against lossy compression [1]. Safety zone is first introduced to ensure that pixel values representing '0' are separated from those representing '1' with a gap in between. This empty gap serves as a buffer so that pixels from both groups do not cross and eventually affect the extraction process. Next, majority vote is also adopted so that error can be further suppressed, although reducing number of bits that can be inserted. Results suggest that both strategies can suppress error caused by lossy compression.
引用
收藏
页数:2
相关论文
共 50 条
  • [1] Lossy Compression of Encrypted Image by Compressive Sensing Technique
    Kumar, A. Anil
    Makur, Anamitra
    [J]. TENCON 2009 - 2009 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2009, : 1255 - 1259
  • [2] Lossy Compression and Iterative Reconstruction for Encrypted Image
    Zhang, Xinpeng
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (01) : 53 - 58
  • [3] Flexible Lossy Compression for Selective Encrypted Image With Image Inpainting
    Qin, Chuan
    Zhou, Qing
    Cao, Fang
    Dong, Jing
    Zhang, Xinpeng
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2019, 29 (11) : 3341 - 3355
  • [4] Separable Reversible Encrypted Data Hiding in Encrypted Image Using AES algorithm and Lossy Technique
    Kadam, Parag
    Nawale, Mangesh
    Kandhare, Akash
    Patil, Mukesh
    [J]. 2013 INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, INFORMATICS AND MEDICAL ENGINEERING (PRIME), 2013,
  • [5] Improvements on data hiding for lossy compression
    Sencar, HT
    Akansu, AN
    Ramkumar, M
    [J]. 2002 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS I-IV, PROCEEDINGS, 2002, : 3449 - 3452
  • [6] A scheme for encrypted image data compression
    Thakur, Nileshsingh V.
    Deshmukh, Kalyani
    Shah, Saurabh A.
    Semwal, Vijay Bhaskar
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2A): : 409 - 420
  • [7] Fractal Image Compression Method for Lossy Data Compression
    Artuger, Firat
    Ozkaynak, Fatih
    [J]. 2018 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND DATA PROCESSING (IDAP), 2018,
  • [8] Integrated Lossy and Lossless Compression with LSB Insertion Technique in Steganography
    Tan, Yi-Fei
    Tan, Wooi-Nee
    Guo, Xiaoning
    [J]. FIFTH INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2013), 2013, 8878
  • [9] A generalization of "Image lossy data compression" recommendation
    Serra-Saorista, J
    Garcia, F
    Auli, F
    Gonzalez, JE
    [J]. IGARSS 2004: IEEE INTERNATIONAL GEOSCIENCE AND REMOTE SENSING SYMPOSIUM PROCEEDINGS, VOLS 1-7: SCIENCE FOR SOCIETY: EXPLORING AND MANAGING A CHANGING PLANET, 2004, : 301 - 304
  • [10] Reversible data hiding with differential compression in encrypted image
    Zhenjun Tang
    Shijie Xu
    Heng Yao
    Chuan Qin
    Xianquan Zhang
    [J]. Multimedia Tools and Applications, 2019, 78 : 9691 - 9715