A novel hybrid image encryption–compression scheme by combining chaos theory and number theory
Compression and encryption are often performed together for image sharing and/or storage. The order in which the two operations are carried out affects the overall efficiency of digital image services. For example, the encrypted data has less or no compressibility. On the other hand, it is challengi...
Gespeichert in:
| Veröffentlicht in: | Signal processing. Image communication Jg. 98; S. 116418 |
|---|---|
| Hauptverfasser: | , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
Amsterdam
Elsevier B.V
01.10.2021
Elsevier BV |
| Schlagworte: | |
| ISSN: | 0923-5965, 1879-2677 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | Compression and encryption are often performed together for image sharing and/or storage. The order in which the two operations are carried out affects the overall efficiency of digital image services. For example, the encrypted data has less or no compressibility. On the other hand, it is challenging to ensure reasonable security without downgrading the compression performance. Therefore, incorporating one requirement into another is an interesting approach. In this study, we propose a novel hybrid image encryption and compression scheme that allows compression in the encryption domain. The encryption is based on Chaos theory and is carried out in two steps, i.e., permutation and substitution. The lossless compression is performed on the shuffled image and then the compressed bitstream is grouped into 8-bit elements for substitution stage. The lossless nature of the proposed method makes it suitable for medical image compression and encryption applications. The experimental results shows that the proposed method achieves the necessary level of security and preserves the compression efficiency of a lossless algorithm. In addition, to improve the performance of the entropy encoder of the compression algorithm, we propose a data-to-symbol mapping method based on number theory to represent adjacent pixel values as a block. With such representation, the compression saving is improved on average from 5.76% to 15.45% for UCID dataset. |
|---|---|
| AbstractList | Compression and encryption are often performed together for image sharing and/or storage. The order in which the two operations are carried out affects the overall efficiency of digital image services. For example, the encrypted data has less or no compressibility. On the other hand, it is challenging to ensure reasonable security without downgrading the compression performance. Therefore, incorporating one requirement into another is an interesting approach. In this study, we propose a novel hybrid image encryption and compression scheme that allows compression in the encryption domain. The encryption is based on Chaos theory and is carried out in two steps, i.e., permutation and substitution. The lossless compression is performed on the shuffled image and then the compressed bitstream is grouped into 8-bit elements for substitution stage. The lossless nature of the proposed method makes it suitable for medical image compression and encryption applications. The experimental results shows that the proposed method achieves the necessary level of security and preserves the compression efficiency of a lossless algorithm. In addition, to improve the performance of the entropy encoder of the compression algorithm, we propose a data-to-symbol mapping method based on number theory to represent adjacent pixel values as a block. With such representation, the compression saving is improved on average from 5.76% to 15.45% for UCID dataset. |
| ArticleNumber | 116418 |
| Author | Ahmad, Ijaz Shin, Seokjoo |
| Author_xml | – sequence: 1 givenname: Ijaz orcidid: 0000-0002-6022-7413 surname: Ahmad fullname: Ahmad, Ijaz email: ahmadijaz@chosun.kr – sequence: 2 givenname: Seokjoo surname: Shin fullname: Shin, Seokjoo email: sjshin@chosun.ac.kr |
| BookMark | eNqFkDtOAzEQhi0UJJLACWgsUW-wve-CIop4SZFooDZ-zGa9SuxgbyJtxx24ISdhk01FAdVoRv83o_kmaGSdBYSuKZlRQrPbZmY2YgUzRhidUZoltDhDY1rkZcSyPB-hMSlZHKVlll6gSQgNIYQlpByj9zm2bg9rXHfSG42PezBY5btta5z9_vxSbrP1EELf4aBq2ACWHe6n0lhjV1jVwgXc1uB8h4XV2O42EvxpconOK7EOcHWqU_T2cP-6eIqWL4_Pi_kyUiyjbaTihMpEQlLlICtJCUl1kYLUBWNEqjxXTBWlZgKyiioRx7HUQDKZqVRoVul4im6GvVvvPnYQWt64nbf9Sc7SgpKcFDnrU-WQUt6F4KHiyrTi8GjrhVlzSvhBKG_4UQQ_COWD0J6Nf7Fb36d89w91N1DQP7834HlQpvcL2nhQLdfO_Mn_ACsolaE |
| CitedBy_id | crossref_primary_10_51537_chaos_1517688 crossref_primary_10_3389_fphy_2025_1617964 crossref_primary_10_1007_s11071_023_08538_z crossref_primary_10_3390_electronics11162514 crossref_primary_10_1007_s11071_024_10283_w crossref_primary_10_1007_s11071_023_08622_4 crossref_primary_10_1007_s10586_023_04126_3 crossref_primary_10_1088_1402_4896_adb812 crossref_primary_10_1016_j_jisa_2023_103628 crossref_primary_10_3390_s22208074 crossref_primary_10_1007_s11071_022_07756_1 crossref_primary_10_1016_j_future_2023_08_018 crossref_primary_10_1049_ipr2_12926 crossref_primary_10_1063_5_0167282 crossref_primary_10_1016_j_chaos_2024_115039 crossref_primary_10_3390_electronics12112425 crossref_primary_10_1109_ACCESS_2025_3575428 crossref_primary_10_1007_s11042_024_18745_4 crossref_primary_10_1142_S0219649224500503 crossref_primary_10_26634_jit_14_2_21944 crossref_primary_10_1007_s11227_024_05906_3 crossref_primary_10_1088_1402_4896_ad0268 crossref_primary_10_1016_j_optlastec_2023_109543 crossref_primary_10_1007_s10586_024_04672_4 crossref_primary_10_3390_s23084057 crossref_primary_10_3390_math11143171 crossref_primary_10_1155_2022_6438331 crossref_primary_10_1016_j_chaos_2024_115168 crossref_primary_10_1016_j_compeleceng_2024_109089 crossref_primary_10_1007_s11071_023_08230_2 crossref_primary_10_1007_s11042_023_14475_1 crossref_primary_10_1007_s11071_024_10671_2 |
| Cites_doi | 10.1016/j.optlastec.2014.02.015 10.1016/j.image.2013.02.004 10.1155/2008/179290 10.1016/j.optlaseng.2019.03.006 10.1016/j.optlaseng.2019.105821 10.1109/TIT.1978.1055959 10.1016/j.sigpro.2020.107684 10.1002/j.1538-7305.1948.tb01338.x 10.1007/s13319-017-0154-7 10.1007/s11042-018-7023-0 10.12928/telkomnika.v18i3.14900 10.1016/j.sigpro.2020.107525 10.1016/j.optlaseng.2018.05.014 10.1080/00029890.1952.11988142 10.1017/ATSIP.2018.33 10.1109/TIFS.2018.2881677 10.1016/j.optlastec.2018.01.007 10.1080/00207160701294376 10.1109/ACCESS.2020.2976798 10.1016/j.optcom.2017.01.061 10.1016/j.asoc.2015.09.055 10.1109/ACCESS.2016.2569421 10.1016/j.image.2014.06.011 10.1155/2018/9591768 10.1587/transinf.2016MUL0002 10.4028/www.scientific.net/AMM.743.333 10.1016/j.sigpro.2020.107652 10.1109/TCSVT.2019.2894520 10.1109/TIFS.2018.2812080 10.1016/j.compbiomed.2013.05.005 |
| ContentType | Journal Article |
| Copyright | 2021 Elsevier B.V. Copyright Elsevier BV Oct 2021 |
| Copyright_xml | – notice: 2021 Elsevier B.V. – notice: Copyright Elsevier BV Oct 2021 |
| DBID | AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D |
| DOI | 10.1016/j.image.2021.116418 |
| DatabaseName | CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Technology Research Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Applied Sciences Engineering Computer Science |
| EISSN | 1879-2677 |
| ExternalDocumentID | 10_1016_j_image_2021_116418 S0923596521001983 |
| GroupedDBID | --K --M .DC .~1 0R~ 123 1B1 1~. 1~5 4.4 457 4G. 5VS 7-5 71M 8P~ 9JN AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN ABBOA ABFNM ABMAC ABXDB ABYKQ ACDAQ ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADJOM ADMUD ADTZH AEBSH AECPX AEKER AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHJVU AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD ASPBG AVWKF AXJTR AZFZN BJAXD BKOJK BLXMC CS3 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 FDB FEDTE FGOYB FIRID FNPLU FYGXN G-Q G8K GBLVA GBOLZ HLZ HVGLF HZ~ IHE J1W JJJVA KOM LG9 M41 MO0 N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. PQQKQ Q38 R2- RIG ROL RPZ SBC SDF SDG SDP SES SEW SPC SPCBC SST SSV SSZ T5K WUQ XPP ZMT ~G- 9DU AATTM AAXKI AAYWO AAYXX ABDPE ABWVN ACLOT ACRPL ADNMO AEIPS AFJKZ AGQPQ AIIUN ANKPU APXCP CITATION EFKBS ~HD 7SC 7SP 8FD AGCQF JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c261t-c341b4be4f7ebfb1005d85ebd8220bc77c2c89d2ae6f1ca333bde06b6c5ad2fd3 |
| ISICitedReferencesCount | 43 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000702288700003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0923-5965 |
| IngestDate | Wed Aug 13 03:44:08 EDT 2025 Sat Nov 29 07:12:55 EST 2025 Tue Nov 18 22:13:35 EST 2025 Fri Feb 23 02:43:26 EST 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Medical image processing Image encryption Image compression Chaos theory Number theory |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c261t-c341b4be4f7ebfb1005d85ebd8220bc77c2c89d2ae6f1ca333bde06b6c5ad2fd3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0002-6022-7413 |
| PQID | 2581070872 |
| PQPubID | 2045400 |
| ParticipantIDs | proquest_journals_2581070872 crossref_citationtrail_10_1016_j_image_2021_116418 crossref_primary_10_1016_j_image_2021_116418 elsevier_sciencedirect_doi_10_1016_j_image_2021_116418 |
| PublicationCentury | 2000 |
| PublicationDate | October 2021 2021-10-00 20211001 |
| PublicationDateYYYYMMDD | 2021-10-01 |
| PublicationDate_xml | – month: 10 year: 2021 text: October 2021 |
| PublicationDecade | 2020 |
| PublicationPlace | Amsterdam |
| PublicationPlace_xml | – name: Amsterdam |
| PublicationTitle | Signal processing. Image communication |
| PublicationYear | 2021 |
| Publisher | Elsevier B.V Elsevier BV |
| Publisher_xml | – name: Elsevier B.V – name: Elsevier BV |
| References | Zhou, Zhang, Zheng, Gong (b32) 2014; 62 Wu, Li, Kurths (b49) 2015; 10 Lina, Lossless (b20) 2009 Chuman, Kurihara, Kiya (b11) 2017 Minemura, Moayed, Wong, Qi, Tanaka (b7) 2012 Zhang, Tong, Liu, Wang, Liu, Liu, Ma (b30) 2020; 8 Bull (b48) 2017 Duseja, Deshmukh (b15) 2019; 78 Petrou, Petrou (b46) 2010 Zhang (b50) 2018; 9 Gallager (b19) 1978; 24 Kurihara, Imaizumi, Shiota, Kiya (b8) 2017 Mao, Chen (b2) 2005 Wu (b47) 2011 Gong, Qiu, Deng, Zhou (b33) 2019; 121 Gong, Deng, Pan, Zhou (b28) 2018; 103 Chai, Wu, Gan, Zhang, Chen (b31) 2020; 171 Massoudi, Lefebvre, De Vleeschouwer, Macq, Quisquater (b42) 2008; 2008 Sayood (b38) 2017 Zhu, Zhao, Zhang (b12) 2013; 28 Chai, Bi, Gan, Liu, Zhang, Chen (b29) 2020; 176 Zhou, Jiang, Gong, Xie (b34) 2018; 110 Aziz, Sam, Mohamed, Daud, Rashid, Abas, Yusof, Dziyauddin (b43) 2020; 18 Preishuber, Hutter, Katzenbeisser, Uhl (b18) 2018; 13 Ou, Sur, Rhee (b23) 2007 Zhang, Xu, Zhou (b35) 2017; 392 Guo, Chen, Li (b13) 2016 Kobayashi, Kiya (b4) 2018 Fu, Meng, Zhan, Zhu, Lau, Tse, Ma (b37) 2013; 43 (b44) 2019 Itier, Puteaux, Puech (b6) 2020; 30 Brindha, Ammasai Gounden (b14) 2016; 40 Huang, Cheng, Gong, Zhou (b26) 2020; 124 Carpentieri (b3) 2018; 2018 Chuman, Sirichotedumrong, Kiya (b10) 2019; 14 W. Puech, J.M. Rodrigues, Crypto-compression of medical images by selective encryption of DCT, in: 13th Eurpoean Signal Process. Conf. Antalya, 2005, pp. 1–4. Puech, Bors, Rodrigues (b25) 2013 Zhou, Panetta, Agaian (b24) 2009 Ye, Zhou, Gong (b27) 2020; 175 Shannon (b1) 1948; 27 Schaefer (b45) 2018 Bai, Zhu, Ji (b17) 2015; 743 Droogenbroeck, Benedett (b21) 2002 Li, Yuan (b5) 2007; 84 Li, Liu, Zhang, Wong (b16) 2014; 29 Ahmad, Shin (b40) 2019 Ahmad, Lee, Shin (b41) 2020 Sirichotedumrong, Kiya (b9) 2019; 8 Zhang, Zhang, Zhou, Liu, Chen, He (b36) 2016; 4 Ore (b39) 1952; 59 Gallager (10.1016/j.image.2021.116418_b19) 1978; 24 Fu (10.1016/j.image.2021.116418_b37) 2013; 43 Duseja (10.1016/j.image.2021.116418_b15) 2019; 78 Li (10.1016/j.image.2021.116418_b16) 2014; 29 Zhang (10.1016/j.image.2021.116418_b36) 2016; 4 Kurihara (10.1016/j.image.2021.116418_b8) 2017 Gong (10.1016/j.image.2021.116418_b33) 2019; 121 Bull (10.1016/j.image.2021.116418_b48) 2017 Chai (10.1016/j.image.2021.116418_b31) 2020; 171 Wu (10.1016/j.image.2021.116418_b47) 2011 Zhang (10.1016/j.image.2021.116418_b35) 2017; 392 Zhou (10.1016/j.image.2021.116418_b34) 2018; 110 Ahmad (10.1016/j.image.2021.116418_b40) 2019 Chai (10.1016/j.image.2021.116418_b29) 2020; 176 (10.1016/j.image.2021.116418_b44) 2019 Droogenbroeck (10.1016/j.image.2021.116418_b21) 2002 Aziz (10.1016/j.image.2021.116418_b43) 2020; 18 Schaefer (10.1016/j.image.2021.116418_b45) 2018 Itier (10.1016/j.image.2021.116418_b6) 2020; 30 Zhang (10.1016/j.image.2021.116418_b30) 2020; 8 Carpentieri (10.1016/j.image.2021.116418_b3) 2018; 2018 Huang (10.1016/j.image.2021.116418_b26) 2020; 124 Chuman (10.1016/j.image.2021.116418_b10) 2019; 14 Sirichotedumrong (10.1016/j.image.2021.116418_b9) 2019; 8 Zhou (10.1016/j.image.2021.116418_b32) 2014; 62 Sayood (10.1016/j.image.2021.116418_b38) 2017 Massoudi (10.1016/j.image.2021.116418_b42) 2008; 2008 Lina (10.1016/j.image.2021.116418_b20) 2009 Chuman (10.1016/j.image.2021.116418_b11) 2017 Preishuber (10.1016/j.image.2021.116418_b18) 2018; 13 Zhu (10.1016/j.image.2021.116418_b12) 2013; 28 Shannon (10.1016/j.image.2021.116418_b1) 1948; 27 Li (10.1016/j.image.2021.116418_b5) 2007; 84 Gong (10.1016/j.image.2021.116418_b28) 2018; 103 Zhang (10.1016/j.image.2021.116418_b50) 2018; 9 Ye (10.1016/j.image.2021.116418_b27) 2020; 175 Guo (10.1016/j.image.2021.116418_b13) 2016 Brindha (10.1016/j.image.2021.116418_b14) 2016; 40 10.1016/j.image.2021.116418_b22 Ore (10.1016/j.image.2021.116418_b39) 1952; 59 Petrou (10.1016/j.image.2021.116418_b46) 2010 Kobayashi (10.1016/j.image.2021.116418_b4) 2018 Ou (10.1016/j.image.2021.116418_b23) 2007 Ahmad (10.1016/j.image.2021.116418_b41) 2020 Wu (10.1016/j.image.2021.116418_b49) 2015; 10 Zhou (10.1016/j.image.2021.116418_b24) 2009 Puech (10.1016/j.image.2021.116418_b25) 2013 Minemura (10.1016/j.image.2021.116418_b7) 2012 Mao (10.1016/j.image.2021.116418_b2) 2005 Bai (10.1016/j.image.2021.116418_b17) 2015; 743 |
| References_xml | – volume: 28 start-page: 670 year: 2013 end-page: 680 ident: b12 article-title: A novel image encryption–compression scheme using hyper-chaos and Chinese remainder theorem publication-title: Signal Process., Image Commun. – volume: 2008 start-page: 1 year: 2008 end-page: 18 ident: b42 article-title: Overview on selective encryption of image and video: Challenges and perspectives publication-title: EURASIP J. Inf. Secur. – volume: 29 start-page: 914 year: 2014 end-page: 920 ident: b16 article-title: Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem publication-title: Signal Process., Image Commun. – volume: 171 year: 2020 ident: b31 article-title: Hiding cipher-images generated by 2-D compressive sensing with a multi-embedding strategy publication-title: Signal Process – year: 2011 ident: b47 article-title: NPCR And UACI randomness tests for image encryption publication-title: Cyber J. J. Sel. Areas Telecommun. – volume: 2018 start-page: 1 year: 2018 end-page: 9 ident: b3 article-title: Efficient compression and encryption for digital data transmission publication-title: Secur. Commun. Netw. – volume: 18 start-page: 1650 year: 2020 ident: b43 article-title: A review on region of interest-based hybrid medical image compression algorithms publication-title: TELKOMNIKA Telecommun. Comput. Electron. Control. – start-page: 179 year: 2018 end-page: 184 ident: b45 article-title: UCID-RAW – A colour image database in raw format publication-title: VipIMAGE 2017 – volume: 743 start-page: 333 year: 2015 end-page: 337 ident: b17 article-title: Comments on a novel image encryption-compression scheme using hyper-chaos and Chinese remainder theorem publication-title: Appl. Mech. Mater. – start-page: 385 year: 2009 end-page: 419 ident: b20 article-title: Image compression publication-title: Essent. Guide Image Process – start-page: 208 year: 2016 end-page: 212 ident: b13 article-title: Chaos-based color image encryption and compression scheme using DNA complementary rule and Chinese remainder theorem publication-title: 2016 13th Int. Comput. Conf. Wavelet Act. Media Technol. Inf. Process. ICCWAMTIP – start-page: 231 year: 2005 end-page: 265 ident: b2 article-title: Chaos-based image encryption publication-title: Handb. Geom. Comput – volume: 40 start-page: 379 year: 2016 end-page: 390 ident: b14 article-title: A chaos based image encryption and lossless compression algorithm using hash table and Chinese remainder theorem publication-title: Appl. Soft Comput. – volume: 13 start-page: 2137 year: 2018 end-page: 2150 ident: b18 article-title: Depreciating motivation and empirical security analysis of chaos-based image and video encryption publication-title: IEEE Trans. Inf. Forensics Secur. – volume: 24 start-page: 668 year: 1978 end-page: 674 ident: b19 article-title: Variations on a theme by huffman publication-title: IEEE Trans. Inf. Theory. – start-page: 52 year: 2017 end-page: 56 ident: b8 article-title: An encryption-then-compression system for lossless image compression standards publication-title: IEICE Trans. Inf. Syst. E100.D – volume: 84 start-page: 1367 year: 2007 end-page: 1378 ident: b5 article-title: A leak and its remedy in JPEG image encryption publication-title: Int. J. Comput. Math. – volume: 8 year: 2019 ident: b9 article-title: Grayscale-based block scrambling image encryption using YCbCr color space for encryption-then-compression systems publication-title: APSIPA Trans. Signal Inf. Process. – year: 2017 ident: b48 article-title: Communicating Pictures – volume: 62 start-page: 152 year: 2014 end-page: 160 ident: b32 article-title: Novel image compression–encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing publication-title: Opt. Laser Technol. – start-page: 62 year: 2007 end-page: 73 ident: b23 article-title: Region-based selective encryption for medical imaging publication-title: Front. Algorithmics – volume: 8 start-page: 40838 year: 2020 end-page: 40849 ident: b30 article-title: Image compression and encryption scheme based on compressive sensing and Fourier transform publication-title: IEEE Access – start-page: 397 year: 2013 end-page: 421 ident: b25 article-title: Protection of colour images by selective encryption publication-title: Adv. Color Image Process. Anal – volume: 176 year: 2020 ident: b29 article-title: Color image compression and encryption scheme based on compressive sensing and double random encryption strategy publication-title: Signal Process – volume: 9 year: 2018 ident: b50 article-title: Test and verification of AES used for image encryption publication-title: 3D Res. – start-page: 261 year: 2012 end-page: 264 ident: b7 article-title: JPEG Image scrambling without expansion in bitstream size publication-title: 2012 19th IEEE Int. Conf. Image Process – reference: W. Puech, J.M. Rodrigues, Crypto-compression of medical images by selective encryption of DCT, in: 13th Eurpoean Signal Process. Conf. Antalya, 2005, pp. 1–4. – volume: 27 start-page: 379 year: 1948 end-page: 423 ident: b1 article-title: A mathematical theory of communication publication-title: Bell Syst. Tech. J. – volume: 10 year: 2015 ident: b49 article-title: A new color image encryption scheme using CML and a fractional-order chaotic system publication-title: PLOS ONE – start-page: 2157 year: 2017 end-page: 2161 ident: b11 article-title: On the security of block scrambling-based ETC systems against jigsaw puzzle solver attacks publication-title: 2017 IEEE Int. Conf. Acoust. Speech Signal Process. ICASSP – volume: 121 start-page: 169 year: 2019 end-page: 180 ident: b33 article-title: An optical image compression and encryption scheme based on compressive sensing and RSA algorithm publication-title: Opt. Lasers Eng. – volume: 4 start-page: 2507 year: 2016 end-page: 2519 ident: b36 article-title: A review of compressive sensing in information security field publication-title: IEEE Access – volume: 392 start-page: 223 year: 2017 end-page: 233 ident: b35 article-title: A novel image compression–encryption hybrid algorithm based on the analysis sparse representation publication-title: Opt. Commun. – volume: 43 start-page: 1000 year: 2013 end-page: 1010 ident: b37 article-title: An efficient and secure medical image protection scheme based on chaotic maps publication-title: Comput. Biol. Med. – start-page: 634 year: 2020 end-page: 636 ident: b41 article-title: Analysis of Chinese remainder theorem for data compression publication-title: 2020 Int. Conf. Inf. Netw. ICOIN – year: 2019 ident: b44 article-title: True color kodak images – volume: 14 start-page: 1515 year: 2019 end-page: 1525 ident: b10 article-title: Encryption-then-compression systems using grayscale-based image encryption for JPEG images publication-title: IEEE Trans. Inf. Forensics Secur. – year: 2017 ident: b38 article-title: Introduction To Data Compression, 5th Edition – volume: 175 year: 2020 ident: b27 article-title: Multi-image compression-encryption scheme based on quaternion discrete fractional hartley transform and improved pixel adaptive diffusion publication-title: Signal Process – volume: 110 start-page: 72 year: 2018 end-page: 79 ident: b34 article-title: Double-image compression and encryption algorithm based on co-sparse representation and random pixel exchanging publication-title: Opt. Lasers Eng. – start-page: 3707 year: 2009 end-page: 3710 ident: b24 article-title: A lossless encryption method for medical images using edge maps publication-title: 2009 Annu. Int. Conf. IEEE Eng. Med. Biol. Soc – volume: 124 year: 2020 ident: b26 article-title: Nonlinear optical multi-image encryption scheme with two-dimensional linear canonical transform publication-title: Opt. Lasers Eng. – start-page: 384 year: 2018 end-page: 387 ident: b4 article-title: Bitstream-based JPEG image encryption with file-size preserving publication-title: 2018 IEEE 7th Glob. Conf. Consum. Electron. GCCE – volume: 59 start-page: 365 year: 1952 end-page: 370 ident: b39 article-title: The general Chinese remainder theorem publication-title: Am. Math. Mon. – volume: 103 start-page: 48 year: 2018 end-page: 58 ident: b28 article-title: Image compression-encryption algorithms by combining hyper-chaotic system with discrete fractional random transform publication-title: Opt. Laser Technol. – year: 2010 ident: b46 article-title: Image Processing: The Fundamentals – volume: 30 start-page: 646 year: 2020 end-page: 660 ident: b6 article-title: Recompression of JPEG crypto-compressed images without a key publication-title: IEEE Trans. Circuits Syst. Video Technol. – year: 2002 ident: b21 article-title: Techniques for a Selective Encryption of Uncompressed and Compressed Images – start-page: 108 year: 2019 end-page: 109 ident: b40 article-title: Analysis of Chinese Remainder Theorem Moduli for Image Compression – volume: 78 start-page: 16727 year: 2019 end-page: 16753 ident: b15 article-title: Image compression and encryption using chinese remainder theorem publication-title: Multimedia Tools Appl. – volume: 62 start-page: 152 year: 2014 ident: 10.1016/j.image.2021.116418_b32 article-title: Novel image compression–encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing publication-title: Opt. Laser Technol. doi: 10.1016/j.optlastec.2014.02.015 – year: 2002 ident: 10.1016/j.image.2021.116418_b21 – ident: 10.1016/j.image.2021.116418_b22 – start-page: 261 year: 2012 ident: 10.1016/j.image.2021.116418_b7 article-title: JPEG Image scrambling without expansion in bitstream size – volume: 28 start-page: 670 year: 2013 ident: 10.1016/j.image.2021.116418_b12 article-title: A novel image encryption–compression scheme using hyper-chaos and Chinese remainder theorem publication-title: Signal Process., Image Commun. doi: 10.1016/j.image.2013.02.004 – volume: 2008 start-page: 1 year: 2008 ident: 10.1016/j.image.2021.116418_b42 article-title: Overview on selective encryption of image and video: Challenges and perspectives publication-title: EURASIP J. Inf. Secur. doi: 10.1155/2008/179290 – start-page: 179 year: 2018 ident: 10.1016/j.image.2021.116418_b45 article-title: UCID-RAW – A colour image database in raw format – volume: 121 start-page: 169 year: 2019 ident: 10.1016/j.image.2021.116418_b33 article-title: An optical image compression and encryption scheme based on compressive sensing and RSA algorithm publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2019.03.006 – volume: 124 year: 2020 ident: 10.1016/j.image.2021.116418_b26 article-title: Nonlinear optical multi-image encryption scheme with two-dimensional linear canonical transform publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2019.105821 – start-page: 384 year: 2018 ident: 10.1016/j.image.2021.116418_b4 article-title: Bitstream-based JPEG image encryption with file-size preserving – volume: 24 start-page: 668 year: 1978 ident: 10.1016/j.image.2021.116418_b19 article-title: Variations on a theme by huffman publication-title: IEEE Trans. Inf. Theory. doi: 10.1109/TIT.1978.1055959 – volume: 176 year: 2020 ident: 10.1016/j.image.2021.116418_b29 article-title: Color image compression and encryption scheme based on compressive sensing and double random encryption strategy publication-title: Signal Process doi: 10.1016/j.sigpro.2020.107684 – start-page: 634 year: 2020 ident: 10.1016/j.image.2021.116418_b41 article-title: Analysis of Chinese remainder theorem for data compression – volume: 27 start-page: 379 year: 1948 ident: 10.1016/j.image.2021.116418_b1 article-title: A mathematical theory of communication publication-title: Bell Syst. Tech. J. doi: 10.1002/j.1538-7305.1948.tb01338.x – start-page: 231 year: 2005 ident: 10.1016/j.image.2021.116418_b2 article-title: Chaos-based image encryption – start-page: 208 year: 2016 ident: 10.1016/j.image.2021.116418_b13 article-title: Chaos-based color image encryption and compression scheme using DNA complementary rule and Chinese remainder theorem – start-page: 62 year: 2007 ident: 10.1016/j.image.2021.116418_b23 article-title: Region-based selective encryption for medical imaging – volume: 9 year: 2018 ident: 10.1016/j.image.2021.116418_b50 article-title: Test and verification of AES used for image encryption publication-title: 3D Res. doi: 10.1007/s13319-017-0154-7 – start-page: 108 year: 2019 ident: 10.1016/j.image.2021.116418_b40 – start-page: 2157 year: 2017 ident: 10.1016/j.image.2021.116418_b11 article-title: On the security of block scrambling-based ETC systems against jigsaw puzzle solver attacks – volume: 78 start-page: 16727 year: 2019 ident: 10.1016/j.image.2021.116418_b15 article-title: Image compression and encryption using chinese remainder theorem publication-title: Multimedia Tools Appl. doi: 10.1007/s11042-018-7023-0 – volume: 18 start-page: 1650 year: 2020 ident: 10.1016/j.image.2021.116418_b43 article-title: A review on region of interest-based hybrid medical image compression algorithms publication-title: TELKOMNIKA Telecommun. Comput. Electron. Control. doi: 10.12928/telkomnika.v18i3.14900 – start-page: 385 year: 2009 ident: 10.1016/j.image.2021.116418_b20 article-title: Image compression – volume: 171 year: 2020 ident: 10.1016/j.image.2021.116418_b31 article-title: Hiding cipher-images generated by 2-D compressive sensing with a multi-embedding strategy publication-title: Signal Process doi: 10.1016/j.sigpro.2020.107525 – volume: 110 start-page: 72 year: 2018 ident: 10.1016/j.image.2021.116418_b34 article-title: Double-image compression and encryption algorithm based on co-sparse representation and random pixel exchanging publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2018.05.014 – volume: 59 start-page: 365 year: 1952 ident: 10.1016/j.image.2021.116418_b39 article-title: The general Chinese remainder theorem publication-title: Am. Math. Mon. doi: 10.1080/00029890.1952.11988142 – volume: 8 year: 2019 ident: 10.1016/j.image.2021.116418_b9 article-title: Grayscale-based block scrambling image encryption using YCbCr color space for encryption-then-compression systems publication-title: APSIPA Trans. Signal Inf. Process. doi: 10.1017/ATSIP.2018.33 – volume: 14 start-page: 1515 year: 2019 ident: 10.1016/j.image.2021.116418_b10 article-title: Encryption-then-compression systems using grayscale-based image encryption for JPEG images publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2018.2881677 – year: 2011 ident: 10.1016/j.image.2021.116418_b47 article-title: NPCR And UACI randomness tests for image encryption publication-title: Cyber J. J. Sel. Areas Telecommun. – volume: 103 start-page: 48 year: 2018 ident: 10.1016/j.image.2021.116418_b28 article-title: Image compression-encryption algorithms by combining hyper-chaotic system with discrete fractional random transform publication-title: Opt. Laser Technol. doi: 10.1016/j.optlastec.2018.01.007 – volume: 84 start-page: 1367 year: 2007 ident: 10.1016/j.image.2021.116418_b5 article-title: A leak and its remedy in JPEG image encryption publication-title: Int. J. Comput. Math. doi: 10.1080/00207160701294376 – year: 2017 ident: 10.1016/j.image.2021.116418_b38 – year: 2019 ident: 10.1016/j.image.2021.116418_b44 – volume: 8 start-page: 40838 year: 2020 ident: 10.1016/j.image.2021.116418_b30 article-title: Image compression and encryption scheme based on compressive sensing and Fourier transform publication-title: IEEE Access doi: 10.1109/ACCESS.2020.2976798 – volume: 392 start-page: 223 year: 2017 ident: 10.1016/j.image.2021.116418_b35 article-title: A novel image compression–encryption hybrid algorithm based on the analysis sparse representation publication-title: Opt. Commun. doi: 10.1016/j.optcom.2017.01.061 – volume: 40 start-page: 379 year: 2016 ident: 10.1016/j.image.2021.116418_b14 article-title: A chaos based image encryption and lossless compression algorithm using hash table and Chinese remainder theorem publication-title: Appl. Soft Comput. doi: 10.1016/j.asoc.2015.09.055 – year: 2017 ident: 10.1016/j.image.2021.116418_b48 – volume: 4 start-page: 2507 year: 2016 ident: 10.1016/j.image.2021.116418_b36 article-title: A review of compressive sensing in information security field publication-title: IEEE Access doi: 10.1109/ACCESS.2016.2569421 – volume: 29 start-page: 914 year: 2014 ident: 10.1016/j.image.2021.116418_b16 article-title: Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem publication-title: Signal Process., Image Commun. doi: 10.1016/j.image.2014.06.011 – start-page: 397 year: 2013 ident: 10.1016/j.image.2021.116418_b25 article-title: Protection of colour images by selective encryption – volume: 2018 start-page: 1 year: 2018 ident: 10.1016/j.image.2021.116418_b3 article-title: Efficient compression and encryption for digital data transmission publication-title: Secur. Commun. Netw. doi: 10.1155/2018/9591768 – start-page: 52 year: 2017 ident: 10.1016/j.image.2021.116418_b8 article-title: An encryption-then-compression system for lossless image compression standards publication-title: IEICE Trans. Inf. Syst. E100.D doi: 10.1587/transinf.2016MUL0002 – volume: 743 start-page: 333 year: 2015 ident: 10.1016/j.image.2021.116418_b17 article-title: Comments on a novel image encryption-compression scheme using hyper-chaos and Chinese remainder theorem publication-title: Appl. Mech. Mater. doi: 10.4028/www.scientific.net/AMM.743.333 – volume: 175 year: 2020 ident: 10.1016/j.image.2021.116418_b27 article-title: Multi-image compression-encryption scheme based on quaternion discrete fractional hartley transform and improved pixel adaptive diffusion publication-title: Signal Process doi: 10.1016/j.sigpro.2020.107652 – volume: 30 start-page: 646 year: 2020 ident: 10.1016/j.image.2021.116418_b6 article-title: Recompression of JPEG crypto-compressed images without a key publication-title: IEEE Trans. Circuits Syst. Video Technol. doi: 10.1109/TCSVT.2019.2894520 – volume: 13 start-page: 2137 year: 2018 ident: 10.1016/j.image.2021.116418_b18 article-title: Depreciating motivation and empirical security analysis of chaos-based image and video encryption publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2018.2812080 – volume: 43 start-page: 1000 year: 2013 ident: 10.1016/j.image.2021.116418_b37 article-title: An efficient and secure medical image protection scheme based on chaotic maps publication-title: Comput. Biol. Med. doi: 10.1016/j.compbiomed.2013.05.005 – year: 2010 ident: 10.1016/j.image.2021.116418_b46 – volume: 10 year: 2015 ident: 10.1016/j.image.2021.116418_b49 article-title: A new color image encryption scheme using CML and a fractional-order chaotic system publication-title: PLOS ONE – start-page: 3707 year: 2009 ident: 10.1016/j.image.2021.116418_b24 article-title: A lossless encryption method for medical images using edge maps |
| SSID | ssj0002409 |
| Score | 2.4820244 |
| Snippet | Compression and encryption are often performed together for image sharing and/or storage. The order in which the two operations are carried out affects the... |
| SourceID | proquest crossref elsevier |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 116418 |
| SubjectTerms | Algorithms Chaos theory Coders Compressibility Digital imaging Encryption Image compression Image encryption Medical image processing Medical imaging Number theory Performance enhancement Permutations Security Substitutes |
| Title | A novel hybrid image encryption–compression scheme by combining chaos theory and number theory |
| URI | https://dx.doi.org/10.1016/j.image.2021.116418 https://www.proquest.com/docview/2581070872 |
| Volume | 98 |
| WOSCitedRecordID | wos000702288700003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals 2021 customDbUrl: eissn: 1879-2677 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0002409 issn: 0923-5965 databaseCode: AIEXJ dateStart: 19950201 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3Nb9MwFLdg4wAHPgaIjYF84BZS1XbzdazQEEVoQtpAvYXYcWjLmlRNN62c-B_4D_lLePZz0rCJih24RNWT41p5vzz_nvM-CHkVm-xGU3xQCy38AVOhHxeC-zmMj5gugsx-Mf38ITo-jsfj5KMLt61tO4GoLOPLy2TxX1UNMlC2SZ29gbrbSUEAv0HpcAW1w_WfFD_0yupCn3mTtUnG8qZzE5UDC1yurXVoohuECSbHINjSAxdXz7WhoiCVtmeESQmuakx0xBpN2DzESbqk9mT61XDaBeYcmE4M3sj-q-pmn7TQmswRVqNZ9r094JlgLYMTXX2bVVX3LIKzNqqtPVTkwg8S7P7Q2FfsMu0MJAP3DA3uNduNxwiznn0uPTN9bzP6z0rZV3awNq6wCVmbpXaS1EyS4iS3yS6PggRs9-5wdDR-327XQGmwIKNbelOaygYBXlvL3-jLlY3cspPTh-S-cyvoEOHwiNzS5R554FwM6gx4DaKmi0cj2yP3OiUpH5MvQ2rhQxE-1C6NbuDz68fPDnAoAofKNW2BQy1wKMKEAnAoAsdJnpBPb49O37zzXRcOX4F3vfIV8Bw5kHpQRFoWkoHZzuNAyxyoZV-qKFJcxUnOMx0WTGVCCJnrfihDFWQ5L3LxlOyUVamfEcrjfiL6hQwk0F7GgQkFPGLgUvRlHoUJ2ye8ebipciXqTaeUs3SLYvfJ6_amBVZo2T48bLSWOpKJ5DEFHG6_8bDRcepe9zrlQcxg04wjfnCzZTwndzcv0CHZWS3P9QtyR12spvXypcPob9tYqns |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+novel+hybrid+image+encryption%E2%80%93compression+scheme+by+combining+chaos+theory+and+number+theory&rft.jtitle=Signal+processing.+Image+communication&rft.au=Ahmad%2C+Ijaz&rft.au=Shin%2C+Seokjoo&rft.date=2021-10-01&rft.issn=0923-5965&rft.volume=98&rft.spage=116418&rft_id=info:doi/10.1016%2Fj.image.2021.116418&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_image_2021_116418 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0923-5965&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0923-5965&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0923-5965&client=summon |