Survey on JPEG compatible joint image compression and encryption algorithms

In recent years, image encryption has been broadly researched. Since a large proportion of images on Internet are compressed, and JPEG is the most widely adopted standards for image compression, a variety of joint image compression and encryption algorithms have been proposed. JPEG image encryption...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IET signal processing Jg. 14; H. 8; S. 475 - 488
Hauptverfasser: Li, Peiya, Lo, Kwok-Tung
Format: Journal Article
Sprache:Englisch
Veröffentlicht: The Institution of Engineering and Technology 01.10.2020
Schlagworte:
ISSN:1751-9675, 1751-9683, 1751-9683
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:In recent years, image encryption has been broadly researched. Since a large proportion of images on Internet are compressed, and JPEG is the most widely adopted standards for image compression, a variety of joint image compression and encryption algorithms have been proposed. JPEG image encryption uses signal processing techniques as well as cryptographic techniques in different stages of the JPEG compression process. Based on the location where the encryption is taken place, these algorithms can be generally classified into three major categories: pre-compression encryption algorithms, in-compression encryption algorithms, and post-compression encryption algorithms, which correspond to conduct encryption operations before, during, and after the compression process. From this perspective of classification, the authors give a comprehensive survey on representative image encryption algorithms of each type, and show their properties and limitations. Some of the most recent encryption schemes that achieve protection at various positions of the compression process are selected for comparison, which are two pre-compression encryption algorithms, four in-compression encryption algorithms, and two post-compression encryption algorithms. Possible future research directions on designing joint JPEG compression and encryption schemes are provided in the end, which may facilitate solving application scenario-oriented JPEG security problems with new technologies.
ISSN:1751-9675
1751-9683
1751-9683
DOI:10.1049/iet-spr.2019.0276