Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(1.02MB)
This is an Open Access publication published under CSC-OpenAccess Policy.
Publications from CSC-OpenAccess Library are being accessed from over 74 countries worldwide.
Securing Image Transmission Using in- Compression Encryption Technique
Shaimaa Ahmed Elsaid, Khalid F. A. Hussein, Mohamed M. Fouad
Pages - 466 - 481     |    Revised - 30-11-2010     |    Published - 20-12-2010
Volume - 4   Issue - 5    |    Publication Date - December 2010  Table of Contents
MORE INFORMATION
KEYWORDS
Image encryption and compression, optimized multiple Huffman tables, OMHT performance analysis
ABSTRACT
Multimedia is one of the most popular data shared in the Web, and the protection of it via encryption techniques is of vast interest. In this paper, an Optimized Multiple Huffman Tables (OMHT) technique is proposed to face some compression and security problems found in Multiple Huffman Tables (MHT) technique. OMHT depends on using statistical-model-based compression method to generate different tables from the same data type of images or videos to be encrypted leading to increase compression efficiency and security of the used tables. A systematic study on how to strategically integrate different atomic operations to build a multimedia encryption system is presented. The resulting system can provide superior performance over both generic encryption and its simple adaptation to multimedia in terms of a joint consideration of security, bitrate overhead. The effectiveness of this scheme is verified through a series of experiments, and the robustness of our approach is demonstrated by comparing it against a standard compression technique, JPEG.
CITED BY (1)  
1 Manimegalai, R. (2014). Efficient joint compression and encryption techniques for video data.
1 Google Scholar 
2 Academic Journals Database 
3 CiteSeerX 
4 refSeek 
5 iSEEK 
6 Socol@r  
7 ResearchGATE 
8 Libsearch 
9 Bielefeld Academic Search Engine (BASE) 
10 Scribd 
11 SlideShare 
12 PDFCAST 
13 PdfSR 
1 C.P. Wu and C. C. J. K. Kuo. “Design of integrated multimedia compression and encryption systems”. IEEE Transactions in Multimedia, vol. 7, no. 5, pp. 828–839, 2005.
2 W. Stallings. "Cryptography and Network Security Principles and Practices", Upper Saddle River, NJ: Prentice Hall, 2003
3 M. Van Droogenbroeck and R. Benedett. “Techniques for a selective encryption of uncompressed and compressed images”. In Proceedings of Advanced Concepts for Intelligent Vision Systems (ACIVS '02), pp. 90–97, Ghent, Belgium, September 2002.
4 L. Qiao, K. Nahrstedt, and M. C. Tam.“Is MPEG encryption by using random list instead of zigzag order secure?”. in Proceedings of the IEEE International Symposium on Consumer Electronics (ISCE '97), pp. 226–229, Singapore, December 1997.
5 T. Uehara and R. Safavi Naini.“Chosen DCT coefficients attack on MPEG encryption scheme”. in Proceedings of IEEE Pacific Rim Conference on Multimedia, pp. 316–319,Sydney, Australia, December 2000.
6 H. Cheng and X. Li. “Partial encryption of compressed images and videos”. IEEE Transactions on Signal Processing, vol. 48, no. 8, pp. 2439–2451, 2000.
7 C.P. Wu and C.C. Kuo. “Efficient multimedia encryption via entropy codec design”. Proc. SPIE, vol. 4314, Jan. 2001.
8 D. Xie and C. J. Kuo. “Enhanced Multiple Huffman Table (MHT) Encryption Scheme Using Key Hoping”. In Proceedings of IEEE International Symposium on Circuits and Systems, pp.568–571, May2004.
9 D. Xie and C. J. Kuo. “Multimedia Data Encryption via Random Rotation in Partitioned Bit Stream”. In Proceedings of IEEE International Symposium on Circuits and Systems, pp.568– 571, May2004.
10 D. W. Gillman and R. L. Rivest. “On breaking a Huffman code”. IEEE Transactions on Information Theory, vol. 42, no. 3, pp. 972–976, 1996.
11 . J. Zhou, Z. Liang, Y. Chen, and O. C. Au. “Security analysis of multimedia encryption schemes based on multiple Huffman table”. IEEE Signal Processing Letters, vol. 14, no. 3, pp. 201–204, 2007
12 W. Pennebaker and J. Mitchell. ”JPEG Still Image Data Compression Standard”, Van Nostrand Reinhold, New York, 1993.
13 3. http://www.jpeg.org (JPEG resources) [accessed at 4/8/2010]
14 http://www.jpeg.org/public/jfif.pdf (JPEG file interchange format) [accessed at 8/8/2010
15 (independent JPEG group) ftp.uu.net:/graphics/jpeg [accessed at 8/8/2010]
16 C.P. Wu and C.C.J. Kuo. “Efficient multimedia encryption via entropy codec design”. In Proc. SPIE Int. Symp. Electronic Imaging 2001, vol. 4314, Jan. 2001, p.128.
17 J. Nechvatal et al. “Report on the Development of the Advanced Encryption Standard”. National Institute of Standards and Technology, U.S. Dept. Commerce, Tech. Rep., Oct. 2000.
18 E. Filiol and C. Fontain. “A new ultra fast stream cipher design: COS ciphers”. In Proc. 8 th IMA Conf. Cryptography and Coding, Dec. 2001.
19 Shaimaa A. Elsaid, Khalid F. A. Hussein, and Mohamed M. Fouad. “Securing Multimedia Transmission Using Multiple Huffman Tables Technique”. Electrical and Computer Systems Engineering Conference (ECSE’10), Egypt, 2010.
Mr. Shaimaa Ahmed Elsaid
faculity of engineering - Egypt
eng.sahmed@windowslive.com
Associate Professor Khalid F. A. Hussein
- Egypt
Associate Professor Mohamed M. Fouad
- Egypt