A novel hybrid image encryption–compression scheme by combining chaos theory and number theory

Compression and encryption are often performed together for image sharing and/or storage. The order in which the two operations are carried out affects the overall efficiency of digital image services. For example, the encrypted data has less or no compressibility. On the other hand, it is challengi...

Full description

Saved in:
Bibliographic Details
Published in:Signal processing. Image communication Vol. 98; p. 116418
Main Authors: Ahmad, Ijaz, Shin, Seokjoo
Format: Journal Article
Language:English
Published: Amsterdam Elsevier B.V 01.10.2021
Elsevier BV
Subjects:
ISSN:0923-5965, 1879-2677
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Compression and encryption are often performed together for image sharing and/or storage. The order in which the two operations are carried out affects the overall efficiency of digital image services. For example, the encrypted data has less or no compressibility. On the other hand, it is challenging to ensure reasonable security without downgrading the compression performance. Therefore, incorporating one requirement into another is an interesting approach. In this study, we propose a novel hybrid image encryption and compression scheme that allows compression in the encryption domain. The encryption is based on Chaos theory and is carried out in two steps, i.e., permutation and substitution. The lossless compression is performed on the shuffled image and then the compressed bitstream is grouped into 8-bit elements for substitution stage. The lossless nature of the proposed method makes it suitable for medical image compression and encryption applications. The experimental results shows that the proposed method achieves the necessary level of security and preserves the compression efficiency of a lossless algorithm. In addition, to improve the performance of the entropy encoder of the compression algorithm, we propose a data-to-symbol mapping method based on number theory to represent adjacent pixel values as a block. With such representation, the compression saving is improved on average from 5.76% to 15.45% for UCID dataset.
AbstractList Compression and encryption are often performed together for image sharing and/or storage. The order in which the two operations are carried out affects the overall efficiency of digital image services. For example, the encrypted data has less or no compressibility. On the other hand, it is challenging to ensure reasonable security without downgrading the compression performance. Therefore, incorporating one requirement into another is an interesting approach. In this study, we propose a novel hybrid image encryption and compression scheme that allows compression in the encryption domain. The encryption is based on Chaos theory and is carried out in two steps, i.e., permutation and substitution. The lossless compression is performed on the shuffled image and then the compressed bitstream is grouped into 8-bit elements for substitution stage. The lossless nature of the proposed method makes it suitable for medical image compression and encryption applications. The experimental results shows that the proposed method achieves the necessary level of security and preserves the compression efficiency of a lossless algorithm. In addition, to improve the performance of the entropy encoder of the compression algorithm, we propose a data-to-symbol mapping method based on number theory to represent adjacent pixel values as a block. With such representation, the compression saving is improved on average from 5.76% to 15.45% for UCID dataset.
ArticleNumber 116418
Author Ahmad, Ijaz
Shin, Seokjoo
Author_xml – sequence: 1
  givenname: Ijaz
  orcidid: 0000-0002-6022-7413
  surname: Ahmad
  fullname: Ahmad, Ijaz
  email: ahmadijaz@chosun.kr
– sequence: 2
  givenname: Seokjoo
  surname: Shin
  fullname: Shin, Seokjoo
  email: sjshin@chosun.ac.kr
BookMark eNqFkDtOAzEQhi0UJJLACWgsUW-wve-CIop4SZFooDZ-zGa9SuxgbyJtxx24ISdhk01FAdVoRv83o_kmaGSdBYSuKZlRQrPbZmY2YgUzRhidUZoltDhDY1rkZcSyPB-hMSlZHKVlll6gSQgNIYQlpByj9zm2bg9rXHfSG42PezBY5btta5z9_vxSbrP1EELf4aBq2ACWHe6n0lhjV1jVwgXc1uB8h4XV2O42EvxpconOK7EOcHWqU_T2cP-6eIqWL4_Pi_kyUiyjbaTihMpEQlLlICtJCUl1kYLUBWNEqjxXTBWlZgKyiioRx7HUQDKZqVRoVul4im6GvVvvPnYQWt64nbf9Sc7SgpKcFDnrU-WQUt6F4KHiyrTi8GjrhVlzSvhBKG_4UQQ_COWD0J6Nf7Fb36d89w91N1DQP7834HlQpvcL2nhQLdfO_Mn_ACsolaE
CitedBy_id crossref_primary_10_51537_chaos_1517688
crossref_primary_10_3389_fphy_2025_1617964
crossref_primary_10_1007_s11071_023_08538_z
crossref_primary_10_3390_electronics11162514
crossref_primary_10_1007_s11071_024_10283_w
crossref_primary_10_1007_s11071_023_08622_4
crossref_primary_10_1007_s10586_023_04126_3
crossref_primary_10_1088_1402_4896_adb812
crossref_primary_10_1016_j_jisa_2023_103628
crossref_primary_10_3390_s22208074
crossref_primary_10_1007_s11071_022_07756_1
crossref_primary_10_1016_j_future_2023_08_018
crossref_primary_10_1049_ipr2_12926
crossref_primary_10_1063_5_0167282
crossref_primary_10_1016_j_chaos_2024_115039
crossref_primary_10_3390_electronics12112425
crossref_primary_10_1109_ACCESS_2025_3575428
crossref_primary_10_1007_s11042_024_18745_4
crossref_primary_10_1142_S0219649224500503
crossref_primary_10_26634_jit_14_2_21944
crossref_primary_10_1007_s11227_024_05906_3
crossref_primary_10_1088_1402_4896_ad0268
crossref_primary_10_1016_j_optlastec_2023_109543
crossref_primary_10_1007_s10586_024_04672_4
crossref_primary_10_3390_s23084057
crossref_primary_10_3390_math11143171
crossref_primary_10_1155_2022_6438331
crossref_primary_10_1016_j_chaos_2024_115168
crossref_primary_10_1016_j_compeleceng_2024_109089
crossref_primary_10_1007_s11071_023_08230_2
crossref_primary_10_1007_s11042_023_14475_1
crossref_primary_10_1007_s11071_024_10671_2
Cites_doi 10.1016/j.optlastec.2014.02.015
10.1016/j.image.2013.02.004
10.1155/2008/179290
10.1016/j.optlaseng.2019.03.006
10.1016/j.optlaseng.2019.105821
10.1109/TIT.1978.1055959
10.1016/j.sigpro.2020.107684
10.1002/j.1538-7305.1948.tb01338.x
10.1007/s13319-017-0154-7
10.1007/s11042-018-7023-0
10.12928/telkomnika.v18i3.14900
10.1016/j.sigpro.2020.107525
10.1016/j.optlaseng.2018.05.014
10.1080/00029890.1952.11988142
10.1017/ATSIP.2018.33
10.1109/TIFS.2018.2881677
10.1016/j.optlastec.2018.01.007
10.1080/00207160701294376
10.1109/ACCESS.2020.2976798
10.1016/j.optcom.2017.01.061
10.1016/j.asoc.2015.09.055
10.1109/ACCESS.2016.2569421
10.1016/j.image.2014.06.011
10.1155/2018/9591768
10.1587/transinf.2016MUL0002
10.4028/www.scientific.net/AMM.743.333
10.1016/j.sigpro.2020.107652
10.1109/TCSVT.2019.2894520
10.1109/TIFS.2018.2812080
10.1016/j.compbiomed.2013.05.005
ContentType Journal Article
Copyright 2021 Elsevier B.V.
Copyright Elsevier BV Oct 2021
Copyright_xml – notice: 2021 Elsevier B.V.
– notice: Copyright Elsevier BV Oct 2021
DBID AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
DOI 10.1016/j.image.2021.116418
DatabaseName CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Technology Research Database
DeliveryMethod fulltext_linktorsrc
Discipline Applied Sciences
Engineering
Computer Science
EISSN 1879-2677
ExternalDocumentID 10_1016_j_image_2021_116418
S0923596521001983
GroupedDBID --K
--M
.DC
.~1
0R~
123
1B1
1~.
1~5
4.4
457
4G.
5VS
7-5
71M
8P~
9JN
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXUO
AAYFN
ABBOA
ABFNM
ABMAC
ABXDB
ABYKQ
ACDAQ
ACGFS
ACNNM
ACRLP
ACZNC
ADBBV
ADEZE
ADJOM
ADMUD
ADTZH
AEBSH
AECPX
AEKER
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHJVU
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
ASPBG
AVWKF
AXJTR
AZFZN
BJAXD
BKOJK
BLXMC
CS3
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-Q
G8K
GBLVA
GBOLZ
HLZ
HVGLF
HZ~
IHE
J1W
JJJVA
KOM
LG9
M41
MO0
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
PQQKQ
Q38
R2-
RIG
ROL
RPZ
SBC
SDF
SDG
SDP
SES
SEW
SPC
SPCBC
SST
SSV
SSZ
T5K
WUQ
XPP
ZMT
~G-
9DU
AATTM
AAXKI
AAYWO
AAYXX
ABDPE
ABWVN
ACLOT
ACRPL
ADNMO
AEIPS
AFJKZ
AGQPQ
AIIUN
ANKPU
APXCP
CITATION
EFKBS
~HD
7SC
7SP
8FD
AGCQF
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c261t-c341b4be4f7ebfb1005d85ebd8220bc77c2c89d2ae6f1ca333bde06b6c5ad2fd3
ISICitedReferencesCount 43
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000702288700003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0923-5965
IngestDate Wed Aug 13 03:44:08 EDT 2025
Sat Nov 29 07:12:55 EST 2025
Tue Nov 18 22:13:35 EST 2025
Fri Feb 23 02:43:26 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Medical image processing
Image encryption
Image compression
Chaos theory
Number theory
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c261t-c341b4be4f7ebfb1005d85ebd8220bc77c2c89d2ae6f1ca333bde06b6c5ad2fd3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-6022-7413
PQID 2581070872
PQPubID 2045400
ParticipantIDs proquest_journals_2581070872
crossref_citationtrail_10_1016_j_image_2021_116418
crossref_primary_10_1016_j_image_2021_116418
elsevier_sciencedirect_doi_10_1016_j_image_2021_116418
PublicationCentury 2000
PublicationDate October 2021
2021-10-00
20211001
PublicationDateYYYYMMDD 2021-10-01
PublicationDate_xml – month: 10
  year: 2021
  text: October 2021
PublicationDecade 2020
PublicationPlace Amsterdam
PublicationPlace_xml – name: Amsterdam
PublicationTitle Signal processing. Image communication
PublicationYear 2021
Publisher Elsevier B.V
Elsevier BV
Publisher_xml – name: Elsevier B.V
– name: Elsevier BV
References Zhou, Zhang, Zheng, Gong (b32) 2014; 62
Wu, Li, Kurths (b49) 2015; 10
Lina, Lossless (b20) 2009
Chuman, Kurihara, Kiya (b11) 2017
Minemura, Moayed, Wong, Qi, Tanaka (b7) 2012
Zhang, Tong, Liu, Wang, Liu, Liu, Ma (b30) 2020; 8
Bull (b48) 2017
Duseja, Deshmukh (b15) 2019; 78
Petrou, Petrou (b46) 2010
Zhang (b50) 2018; 9
Gallager (b19) 1978; 24
Kurihara, Imaizumi, Shiota, Kiya (b8) 2017
Mao, Chen (b2) 2005
Wu (b47) 2011
Gong, Qiu, Deng, Zhou (b33) 2019; 121
Gong, Deng, Pan, Zhou (b28) 2018; 103
Chai, Wu, Gan, Zhang, Chen (b31) 2020; 171
Massoudi, Lefebvre, De Vleeschouwer, Macq, Quisquater (b42) 2008; 2008
Sayood (b38) 2017
Zhu, Zhao, Zhang (b12) 2013; 28
Chai, Bi, Gan, Liu, Zhang, Chen (b29) 2020; 176
Zhou, Jiang, Gong, Xie (b34) 2018; 110
Aziz, Sam, Mohamed, Daud, Rashid, Abas, Yusof, Dziyauddin (b43) 2020; 18
Preishuber, Hutter, Katzenbeisser, Uhl (b18) 2018; 13
Ou, Sur, Rhee (b23) 2007
Zhang, Xu, Zhou (b35) 2017; 392
Guo, Chen, Li (b13) 2016
Kobayashi, Kiya (b4) 2018
Fu, Meng, Zhan, Zhu, Lau, Tse, Ma (b37) 2013; 43
(b44) 2019
Itier, Puteaux, Puech (b6) 2020; 30
Brindha, Ammasai Gounden (b14) 2016; 40
Huang, Cheng, Gong, Zhou (b26) 2020; 124
Carpentieri (b3) 2018; 2018
Chuman, Sirichotedumrong, Kiya (b10) 2019; 14
W. Puech, J.M. Rodrigues, Crypto-compression of medical images by selective encryption of DCT, in: 13th Eurpoean Signal Process. Conf. Antalya, 2005, pp. 1–4.
Puech, Bors, Rodrigues (b25) 2013
Zhou, Panetta, Agaian (b24) 2009
Ye, Zhou, Gong (b27) 2020; 175
Shannon (b1) 1948; 27
Schaefer (b45) 2018
Bai, Zhu, Ji (b17) 2015; 743
Droogenbroeck, Benedett (b21) 2002
Li, Yuan (b5) 2007; 84
Li, Liu, Zhang, Wong (b16) 2014; 29
Ahmad, Shin (b40) 2019
Ahmad, Lee, Shin (b41) 2020
Sirichotedumrong, Kiya (b9) 2019; 8
Zhang, Zhang, Zhou, Liu, Chen, He (b36) 2016; 4
Ore (b39) 1952; 59
Gallager (10.1016/j.image.2021.116418_b19) 1978; 24
Fu (10.1016/j.image.2021.116418_b37) 2013; 43
Duseja (10.1016/j.image.2021.116418_b15) 2019; 78
Li (10.1016/j.image.2021.116418_b16) 2014; 29
Zhang (10.1016/j.image.2021.116418_b36) 2016; 4
Kurihara (10.1016/j.image.2021.116418_b8) 2017
Gong (10.1016/j.image.2021.116418_b33) 2019; 121
Bull (10.1016/j.image.2021.116418_b48) 2017
Chai (10.1016/j.image.2021.116418_b31) 2020; 171
Wu (10.1016/j.image.2021.116418_b47) 2011
Zhang (10.1016/j.image.2021.116418_b35) 2017; 392
Zhou (10.1016/j.image.2021.116418_b34) 2018; 110
Ahmad (10.1016/j.image.2021.116418_b40) 2019
Chai (10.1016/j.image.2021.116418_b29) 2020; 176
(10.1016/j.image.2021.116418_b44) 2019
Droogenbroeck (10.1016/j.image.2021.116418_b21) 2002
Aziz (10.1016/j.image.2021.116418_b43) 2020; 18
Schaefer (10.1016/j.image.2021.116418_b45) 2018
Itier (10.1016/j.image.2021.116418_b6) 2020; 30
Zhang (10.1016/j.image.2021.116418_b30) 2020; 8
Carpentieri (10.1016/j.image.2021.116418_b3) 2018; 2018
Huang (10.1016/j.image.2021.116418_b26) 2020; 124
Chuman (10.1016/j.image.2021.116418_b10) 2019; 14
Sirichotedumrong (10.1016/j.image.2021.116418_b9) 2019; 8
Zhou (10.1016/j.image.2021.116418_b32) 2014; 62
Sayood (10.1016/j.image.2021.116418_b38) 2017
Massoudi (10.1016/j.image.2021.116418_b42) 2008; 2008
Lina (10.1016/j.image.2021.116418_b20) 2009
Chuman (10.1016/j.image.2021.116418_b11) 2017
Preishuber (10.1016/j.image.2021.116418_b18) 2018; 13
Zhu (10.1016/j.image.2021.116418_b12) 2013; 28
Shannon (10.1016/j.image.2021.116418_b1) 1948; 27
Li (10.1016/j.image.2021.116418_b5) 2007; 84
Gong (10.1016/j.image.2021.116418_b28) 2018; 103
Zhang (10.1016/j.image.2021.116418_b50) 2018; 9
Ye (10.1016/j.image.2021.116418_b27) 2020; 175
Guo (10.1016/j.image.2021.116418_b13) 2016
Brindha (10.1016/j.image.2021.116418_b14) 2016; 40
10.1016/j.image.2021.116418_b22
Ore (10.1016/j.image.2021.116418_b39) 1952; 59
Petrou (10.1016/j.image.2021.116418_b46) 2010
Kobayashi (10.1016/j.image.2021.116418_b4) 2018
Ou (10.1016/j.image.2021.116418_b23) 2007
Ahmad (10.1016/j.image.2021.116418_b41) 2020
Wu (10.1016/j.image.2021.116418_b49) 2015; 10
Zhou (10.1016/j.image.2021.116418_b24) 2009
Puech (10.1016/j.image.2021.116418_b25) 2013
Minemura (10.1016/j.image.2021.116418_b7) 2012
Mao (10.1016/j.image.2021.116418_b2) 2005
Bai (10.1016/j.image.2021.116418_b17) 2015; 743
References_xml – volume: 28
  start-page: 670
  year: 2013
  end-page: 680
  ident: b12
  article-title: A novel image encryption–compression scheme using hyper-chaos and Chinese remainder theorem
  publication-title: Signal Process., Image Commun.
– volume: 2008
  start-page: 1
  year: 2008
  end-page: 18
  ident: b42
  article-title: Overview on selective encryption of image and video: Challenges and perspectives
  publication-title: EURASIP J. Inf. Secur.
– volume: 29
  start-page: 914
  year: 2014
  end-page: 920
  ident: b16
  article-title: Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem
  publication-title: Signal Process., Image Commun.
– volume: 171
  year: 2020
  ident: b31
  article-title: Hiding cipher-images generated by 2-D compressive sensing with a multi-embedding strategy
  publication-title: Signal Process
– year: 2011
  ident: b47
  article-title: NPCR And UACI randomness tests for image encryption
  publication-title: Cyber J. J. Sel. Areas Telecommun.
– volume: 2018
  start-page: 1
  year: 2018
  end-page: 9
  ident: b3
  article-title: Efficient compression and encryption for digital data transmission
  publication-title: Secur. Commun. Netw.
– volume: 18
  start-page: 1650
  year: 2020
  ident: b43
  article-title: A review on region of interest-based hybrid medical image compression algorithms
  publication-title: TELKOMNIKA Telecommun. Comput. Electron. Control.
– start-page: 179
  year: 2018
  end-page: 184
  ident: b45
  article-title: UCID-RAW – A colour image database in raw format
  publication-title: VipIMAGE 2017
– volume: 743
  start-page: 333
  year: 2015
  end-page: 337
  ident: b17
  article-title: Comments on a novel image encryption-compression scheme using hyper-chaos and Chinese remainder theorem
  publication-title: Appl. Mech. Mater.
– start-page: 385
  year: 2009
  end-page: 419
  ident: b20
  article-title: Image compression
  publication-title: Essent. Guide Image Process
– start-page: 208
  year: 2016
  end-page: 212
  ident: b13
  article-title: Chaos-based color image encryption and compression scheme using DNA complementary rule and Chinese remainder theorem
  publication-title: 2016 13th Int. Comput. Conf. Wavelet Act. Media Technol. Inf. Process. ICCWAMTIP
– start-page: 231
  year: 2005
  end-page: 265
  ident: b2
  article-title: Chaos-based image encryption
  publication-title: Handb. Geom. Comput
– volume: 40
  start-page: 379
  year: 2016
  end-page: 390
  ident: b14
  article-title: A chaos based image encryption and lossless compression algorithm using hash table and Chinese remainder theorem
  publication-title: Appl. Soft Comput.
– volume: 13
  start-page: 2137
  year: 2018
  end-page: 2150
  ident: b18
  article-title: Depreciating motivation and empirical security analysis of chaos-based image and video encryption
  publication-title: IEEE Trans. Inf. Forensics Secur.
– volume: 24
  start-page: 668
  year: 1978
  end-page: 674
  ident: b19
  article-title: Variations on a theme by huffman
  publication-title: IEEE Trans. Inf. Theory.
– start-page: 52
  year: 2017
  end-page: 56
  ident: b8
  article-title: An encryption-then-compression system for lossless image compression standards
  publication-title: IEICE Trans. Inf. Syst. E100.D
– volume: 84
  start-page: 1367
  year: 2007
  end-page: 1378
  ident: b5
  article-title: A leak and its remedy in JPEG image encryption
  publication-title: Int. J. Comput. Math.
– volume: 8
  year: 2019
  ident: b9
  article-title: Grayscale-based block scrambling image encryption using YCbCr color space for encryption-then-compression systems
  publication-title: APSIPA Trans. Signal Inf. Process.
– year: 2017
  ident: b48
  article-title: Communicating Pictures
– volume: 62
  start-page: 152
  year: 2014
  end-page: 160
  ident: b32
  article-title: Novel image compression–encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing
  publication-title: Opt. Laser Technol.
– start-page: 62
  year: 2007
  end-page: 73
  ident: b23
  article-title: Region-based selective encryption for medical imaging
  publication-title: Front. Algorithmics
– volume: 8
  start-page: 40838
  year: 2020
  end-page: 40849
  ident: b30
  article-title: Image compression and encryption scheme based on compressive sensing and Fourier transform
  publication-title: IEEE Access
– start-page: 397
  year: 2013
  end-page: 421
  ident: b25
  article-title: Protection of colour images by selective encryption
  publication-title: Adv. Color Image Process. Anal
– volume: 176
  year: 2020
  ident: b29
  article-title: Color image compression and encryption scheme based on compressive sensing and double random encryption strategy
  publication-title: Signal Process
– volume: 9
  year: 2018
  ident: b50
  article-title: Test and verification of AES used for image encryption
  publication-title: 3D Res.
– start-page: 261
  year: 2012
  end-page: 264
  ident: b7
  article-title: JPEG Image scrambling without expansion in bitstream size
  publication-title: 2012 19th IEEE Int. Conf. Image Process
– reference: W. Puech, J.M. Rodrigues, Crypto-compression of medical images by selective encryption of DCT, in: 13th Eurpoean Signal Process. Conf. Antalya, 2005, pp. 1–4.
– volume: 27
  start-page: 379
  year: 1948
  end-page: 423
  ident: b1
  article-title: A mathematical theory of communication
  publication-title: Bell Syst. Tech. J.
– volume: 10
  year: 2015
  ident: b49
  article-title: A new color image encryption scheme using CML and a fractional-order chaotic system
  publication-title: PLOS ONE
– start-page: 2157
  year: 2017
  end-page: 2161
  ident: b11
  article-title: On the security of block scrambling-based ETC systems against jigsaw puzzle solver attacks
  publication-title: 2017 IEEE Int. Conf. Acoust. Speech Signal Process. ICASSP
– volume: 121
  start-page: 169
  year: 2019
  end-page: 180
  ident: b33
  article-title: An optical image compression and encryption scheme based on compressive sensing and RSA algorithm
  publication-title: Opt. Lasers Eng.
– volume: 4
  start-page: 2507
  year: 2016
  end-page: 2519
  ident: b36
  article-title: A review of compressive sensing in information security field
  publication-title: IEEE Access
– volume: 392
  start-page: 223
  year: 2017
  end-page: 233
  ident: b35
  article-title: A novel image compression–encryption hybrid algorithm based on the analysis sparse representation
  publication-title: Opt. Commun.
– volume: 43
  start-page: 1000
  year: 2013
  end-page: 1010
  ident: b37
  article-title: An efficient and secure medical image protection scheme based on chaotic maps
  publication-title: Comput. Biol. Med.
– start-page: 634
  year: 2020
  end-page: 636
  ident: b41
  article-title: Analysis of Chinese remainder theorem for data compression
  publication-title: 2020 Int. Conf. Inf. Netw. ICOIN
– year: 2019
  ident: b44
  article-title: True color kodak images
– volume: 14
  start-page: 1515
  year: 2019
  end-page: 1525
  ident: b10
  article-title: Encryption-then-compression systems using grayscale-based image encryption for JPEG images
  publication-title: IEEE Trans. Inf. Forensics Secur.
– year: 2017
  ident: b38
  article-title: Introduction To Data Compression, 5th Edition
– volume: 175
  year: 2020
  ident: b27
  article-title: Multi-image compression-encryption scheme based on quaternion discrete fractional hartley transform and improved pixel adaptive diffusion
  publication-title: Signal Process
– volume: 110
  start-page: 72
  year: 2018
  end-page: 79
  ident: b34
  article-title: Double-image compression and encryption algorithm based on co-sparse representation and random pixel exchanging
  publication-title: Opt. Lasers Eng.
– start-page: 3707
  year: 2009
  end-page: 3710
  ident: b24
  article-title: A lossless encryption method for medical images using edge maps
  publication-title: 2009 Annu. Int. Conf. IEEE Eng. Med. Biol. Soc
– volume: 124
  year: 2020
  ident: b26
  article-title: Nonlinear optical multi-image encryption scheme with two-dimensional linear canonical transform
  publication-title: Opt. Lasers Eng.
– start-page: 384
  year: 2018
  end-page: 387
  ident: b4
  article-title: Bitstream-based JPEG image encryption with file-size preserving
  publication-title: 2018 IEEE 7th Glob. Conf. Consum. Electron. GCCE
– volume: 59
  start-page: 365
  year: 1952
  end-page: 370
  ident: b39
  article-title: The general Chinese remainder theorem
  publication-title: Am. Math. Mon.
– volume: 103
  start-page: 48
  year: 2018
  end-page: 58
  ident: b28
  article-title: Image compression-encryption algorithms by combining hyper-chaotic system with discrete fractional random transform
  publication-title: Opt. Laser Technol.
– year: 2010
  ident: b46
  article-title: Image Processing: The Fundamentals
– volume: 30
  start-page: 646
  year: 2020
  end-page: 660
  ident: b6
  article-title: Recompression of JPEG crypto-compressed images without a key
  publication-title: IEEE Trans. Circuits Syst. Video Technol.
– year: 2002
  ident: b21
  article-title: Techniques for a Selective Encryption of Uncompressed and Compressed Images
– start-page: 108
  year: 2019
  end-page: 109
  ident: b40
  article-title: Analysis of Chinese Remainder Theorem Moduli for Image Compression
– volume: 78
  start-page: 16727
  year: 2019
  end-page: 16753
  ident: b15
  article-title: Image compression and encryption using chinese remainder theorem
  publication-title: Multimedia Tools Appl.
– volume: 62
  start-page: 152
  year: 2014
  ident: 10.1016/j.image.2021.116418_b32
  article-title: Novel image compression–encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing
  publication-title: Opt. Laser Technol.
  doi: 10.1016/j.optlastec.2014.02.015
– year: 2002
  ident: 10.1016/j.image.2021.116418_b21
– ident: 10.1016/j.image.2021.116418_b22
– start-page: 261
  year: 2012
  ident: 10.1016/j.image.2021.116418_b7
  article-title: JPEG Image scrambling without expansion in bitstream size
– volume: 28
  start-page: 670
  year: 2013
  ident: 10.1016/j.image.2021.116418_b12
  article-title: A novel image encryption–compression scheme using hyper-chaos and Chinese remainder theorem
  publication-title: Signal Process., Image Commun.
  doi: 10.1016/j.image.2013.02.004
– volume: 2008
  start-page: 1
  year: 2008
  ident: 10.1016/j.image.2021.116418_b42
  article-title: Overview on selective encryption of image and video: Challenges and perspectives
  publication-title: EURASIP J. Inf. Secur.
  doi: 10.1155/2008/179290
– start-page: 179
  year: 2018
  ident: 10.1016/j.image.2021.116418_b45
  article-title: UCID-RAW – A colour image database in raw format
– volume: 121
  start-page: 169
  year: 2019
  ident: 10.1016/j.image.2021.116418_b33
  article-title: An optical image compression and encryption scheme based on compressive sensing and RSA algorithm
  publication-title: Opt. Lasers Eng.
  doi: 10.1016/j.optlaseng.2019.03.006
– volume: 124
  year: 2020
  ident: 10.1016/j.image.2021.116418_b26
  article-title: Nonlinear optical multi-image encryption scheme with two-dimensional linear canonical transform
  publication-title: Opt. Lasers Eng.
  doi: 10.1016/j.optlaseng.2019.105821
– start-page: 384
  year: 2018
  ident: 10.1016/j.image.2021.116418_b4
  article-title: Bitstream-based JPEG image encryption with file-size preserving
– volume: 24
  start-page: 668
  year: 1978
  ident: 10.1016/j.image.2021.116418_b19
  article-title: Variations on a theme by huffman
  publication-title: IEEE Trans. Inf. Theory.
  doi: 10.1109/TIT.1978.1055959
– volume: 176
  year: 2020
  ident: 10.1016/j.image.2021.116418_b29
  article-title: Color image compression and encryption scheme based on compressive sensing and double random encryption strategy
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2020.107684
– start-page: 634
  year: 2020
  ident: 10.1016/j.image.2021.116418_b41
  article-title: Analysis of Chinese remainder theorem for data compression
– volume: 27
  start-page: 379
  year: 1948
  ident: 10.1016/j.image.2021.116418_b1
  article-title: A mathematical theory of communication
  publication-title: Bell Syst. Tech. J.
  doi: 10.1002/j.1538-7305.1948.tb01338.x
– start-page: 231
  year: 2005
  ident: 10.1016/j.image.2021.116418_b2
  article-title: Chaos-based image encryption
– start-page: 208
  year: 2016
  ident: 10.1016/j.image.2021.116418_b13
  article-title: Chaos-based color image encryption and compression scheme using DNA complementary rule and Chinese remainder theorem
– start-page: 62
  year: 2007
  ident: 10.1016/j.image.2021.116418_b23
  article-title: Region-based selective encryption for medical imaging
– volume: 9
  year: 2018
  ident: 10.1016/j.image.2021.116418_b50
  article-title: Test and verification of AES used for image encryption
  publication-title: 3D Res.
  doi: 10.1007/s13319-017-0154-7
– start-page: 108
  year: 2019
  ident: 10.1016/j.image.2021.116418_b40
– start-page: 2157
  year: 2017
  ident: 10.1016/j.image.2021.116418_b11
  article-title: On the security of block scrambling-based ETC systems against jigsaw puzzle solver attacks
– volume: 78
  start-page: 16727
  year: 2019
  ident: 10.1016/j.image.2021.116418_b15
  article-title: Image compression and encryption using chinese remainder theorem
  publication-title: Multimedia Tools Appl.
  doi: 10.1007/s11042-018-7023-0
– volume: 18
  start-page: 1650
  year: 2020
  ident: 10.1016/j.image.2021.116418_b43
  article-title: A review on region of interest-based hybrid medical image compression algorithms
  publication-title: TELKOMNIKA Telecommun. Comput. Electron. Control.
  doi: 10.12928/telkomnika.v18i3.14900
– start-page: 385
  year: 2009
  ident: 10.1016/j.image.2021.116418_b20
  article-title: Image compression
– volume: 171
  year: 2020
  ident: 10.1016/j.image.2021.116418_b31
  article-title: Hiding cipher-images generated by 2-D compressive sensing with a multi-embedding strategy
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2020.107525
– volume: 110
  start-page: 72
  year: 2018
  ident: 10.1016/j.image.2021.116418_b34
  article-title: Double-image compression and encryption algorithm based on co-sparse representation and random pixel exchanging
  publication-title: Opt. Lasers Eng.
  doi: 10.1016/j.optlaseng.2018.05.014
– volume: 59
  start-page: 365
  year: 1952
  ident: 10.1016/j.image.2021.116418_b39
  article-title: The general Chinese remainder theorem
  publication-title: Am. Math. Mon.
  doi: 10.1080/00029890.1952.11988142
– volume: 8
  year: 2019
  ident: 10.1016/j.image.2021.116418_b9
  article-title: Grayscale-based block scrambling image encryption using YCbCr color space for encryption-then-compression systems
  publication-title: APSIPA Trans. Signal Inf. Process.
  doi: 10.1017/ATSIP.2018.33
– volume: 14
  start-page: 1515
  year: 2019
  ident: 10.1016/j.image.2021.116418_b10
  article-title: Encryption-then-compression systems using grayscale-based image encryption for JPEG images
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2018.2881677
– year: 2011
  ident: 10.1016/j.image.2021.116418_b47
  article-title: NPCR And UACI randomness tests for image encryption
  publication-title: Cyber J. J. Sel. Areas Telecommun.
– volume: 103
  start-page: 48
  year: 2018
  ident: 10.1016/j.image.2021.116418_b28
  article-title: Image compression-encryption algorithms by combining hyper-chaotic system with discrete fractional random transform
  publication-title: Opt. Laser Technol.
  doi: 10.1016/j.optlastec.2018.01.007
– volume: 84
  start-page: 1367
  year: 2007
  ident: 10.1016/j.image.2021.116418_b5
  article-title: A leak and its remedy in JPEG image encryption
  publication-title: Int. J. Comput. Math.
  doi: 10.1080/00207160701294376
– year: 2017
  ident: 10.1016/j.image.2021.116418_b38
– year: 2019
  ident: 10.1016/j.image.2021.116418_b44
– volume: 8
  start-page: 40838
  year: 2020
  ident: 10.1016/j.image.2021.116418_b30
  article-title: Image compression and encryption scheme based on compressive sensing and Fourier transform
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.2976798
– volume: 392
  start-page: 223
  year: 2017
  ident: 10.1016/j.image.2021.116418_b35
  article-title: A novel image compression–encryption hybrid algorithm based on the analysis sparse representation
  publication-title: Opt. Commun.
  doi: 10.1016/j.optcom.2017.01.061
– volume: 40
  start-page: 379
  year: 2016
  ident: 10.1016/j.image.2021.116418_b14
  article-title: A chaos based image encryption and lossless compression algorithm using hash table and Chinese remainder theorem
  publication-title: Appl. Soft Comput.
  doi: 10.1016/j.asoc.2015.09.055
– year: 2017
  ident: 10.1016/j.image.2021.116418_b48
– volume: 4
  start-page: 2507
  year: 2016
  ident: 10.1016/j.image.2021.116418_b36
  article-title: A review of compressive sensing in information security field
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2016.2569421
– volume: 29
  start-page: 914
  year: 2014
  ident: 10.1016/j.image.2021.116418_b16
  article-title: Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem
  publication-title: Signal Process., Image Commun.
  doi: 10.1016/j.image.2014.06.011
– start-page: 397
  year: 2013
  ident: 10.1016/j.image.2021.116418_b25
  article-title: Protection of colour images by selective encryption
– volume: 2018
  start-page: 1
  year: 2018
  ident: 10.1016/j.image.2021.116418_b3
  article-title: Efficient compression and encryption for digital data transmission
  publication-title: Secur. Commun. Netw.
  doi: 10.1155/2018/9591768
– start-page: 52
  year: 2017
  ident: 10.1016/j.image.2021.116418_b8
  article-title: An encryption-then-compression system for lossless image compression standards
  publication-title: IEICE Trans. Inf. Syst. E100.D
  doi: 10.1587/transinf.2016MUL0002
– volume: 743
  start-page: 333
  year: 2015
  ident: 10.1016/j.image.2021.116418_b17
  article-title: Comments on a novel image encryption-compression scheme using hyper-chaos and Chinese remainder theorem
  publication-title: Appl. Mech. Mater.
  doi: 10.4028/www.scientific.net/AMM.743.333
– volume: 175
  year: 2020
  ident: 10.1016/j.image.2021.116418_b27
  article-title: Multi-image compression-encryption scheme based on quaternion discrete fractional hartley transform and improved pixel adaptive diffusion
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2020.107652
– volume: 30
  start-page: 646
  year: 2020
  ident: 10.1016/j.image.2021.116418_b6
  article-title: Recompression of JPEG crypto-compressed images without a key
  publication-title: IEEE Trans. Circuits Syst. Video Technol.
  doi: 10.1109/TCSVT.2019.2894520
– volume: 13
  start-page: 2137
  year: 2018
  ident: 10.1016/j.image.2021.116418_b18
  article-title: Depreciating motivation and empirical security analysis of chaos-based image and video encryption
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2018.2812080
– volume: 43
  start-page: 1000
  year: 2013
  ident: 10.1016/j.image.2021.116418_b37
  article-title: An efficient and secure medical image protection scheme based on chaotic maps
  publication-title: Comput. Biol. Med.
  doi: 10.1016/j.compbiomed.2013.05.005
– year: 2010
  ident: 10.1016/j.image.2021.116418_b46
– volume: 10
  year: 2015
  ident: 10.1016/j.image.2021.116418_b49
  article-title: A new color image encryption scheme using CML and a fractional-order chaotic system
  publication-title: PLOS ONE
– start-page: 3707
  year: 2009
  ident: 10.1016/j.image.2021.116418_b24
  article-title: A lossless encryption method for medical images using edge maps
SSID ssj0002409
Score 2.4820244
Snippet Compression and encryption are often performed together for image sharing and/or storage. The order in which the two operations are carried out affects the...
SourceID proquest
crossref
elsevier
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 116418
SubjectTerms Algorithms
Chaos theory
Coders
Compressibility
Digital imaging
Encryption
Image compression
Image encryption
Medical image processing
Medical imaging
Number theory
Performance enhancement
Permutations
Security
Substitutes
Title A novel hybrid image encryption–compression scheme by combining chaos theory and number theory
URI https://dx.doi.org/10.1016/j.image.2021.116418
https://www.proquest.com/docview/2581070872
Volume 98
WOSCitedRecordID wos000702288700003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: ScienceDirect Freedom Collection
  customDbUrl:
  eissn: 1879-2677
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0002409
  issn: 0923-5965
  databaseCode: AIEXJ
  dateStart: 19950201
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9NAEF5BygEOPAqIQkF74BYcxes43j1GqIhwqJBapNyM92GS0NhRnFZNT_wH_iG_hNmdtWNaEdEDFysa2ZuV59vZb9bzIORtHqqcJ1wEQossGMh-FPDc9IOMSaZUXwmRaNdsIjk-5pOJ-OzDbSvXTiApCn55KZb_VdUgA2Xb1NlbqLsZFATwG5QOV1A7XP9J8aNuUV6Ys-50Y5OxurOFjcqBCa42zjrU0Q2RDSbHINiiCy6uWRhLRUEqXc8ImxJcVpjoiDWasHmIl7RJ7cnsm-W0S8w5sJ0YumP3r6qdfdJAa7pAWI3n2VVzwDPFWgYnpvw-L8v2WQQLm6i25lCRRUEssPtDbV-xy7Q3kCG4Z2hwb9huPEaY99x76dnhe9u7_6yUfW0Ha-IK65C1eeoGSe0gKQ5yl-yxJBa8Q_ZG46PJp2a7BkqDBRn91OvSVC4I8MZc_kZfrm3kjp2cPiYPvVtBRwiHJ-SOKfbJI-9iUG_AKxDVXTxq2T550CpJ-ZR8HVEHH4rwoW5qdAufXz9-toBDEThUbmgDHOqAQxEmFIBDEThe8ox8-XB0-v5j4LtwBAq863WggOfIgTSDPDEylyGYbc1jIzVQy75USaKY4kKzzAxh4WdRFElt-kM5VHGmWa6j56RTlIV5QWhk_W-lRRzluf1ezIEOh1rHErx6FYrsgLD65abKl6i3nVLO0h2KPSDvmoeWWKFl9-3DWmupJ5lIHlPA4e4HD2sdp365VymLeQibJk_Yy9tN4xW5v11Ah6SzXp2b1-SeuljPqtUbj9Hfl6-rvQ
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+novel+hybrid+image+encryption%E2%80%93compression+scheme+by+combining+chaos+theory+and+number+theory&rft.jtitle=Signal+processing.+Image+communication&rft.au=Ahmad%2C+Ijaz&rft.au=Shin%2C+Seokjoo&rft.date=2021-10-01&rft.issn=0923-5965&rft.volume=98&rft.spage=116418&rft_id=info:doi/10.1016%2Fj.image.2021.116418&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_image_2021_116418
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0923-5965&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0923-5965&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0923-5965&client=summon