Home   >   CSC-OpenAccess Library   >    Manuscript Information
Securing Image Transmission Using in- Compression Encryption Technique
Shaimaa Ahmed Elsaid, Khalid F. A. Hussein, Mohamed M. Fouad
Pages - 466 - 481     |    Revised - 30-11-2010     |    Published - 20-12-2010
Volume - 4   Issue - 5    |    Publication Date - December 2010  Table of Contents
Image encryption and compression, optimized multiple Huffman tables, OMHT performance analysis
Multimedia is one of the most popular data shared in the Web, and the protection of it via encryption techniques is of vast interest. In this paper, an Optimized Multiple Huffman Tables (OMHT) technique is proposed to face some compression and security problems found in Multiple Huffman Tables (MHT) technique. OMHT depends on using statistical-model-based compression method to generate different tables from the same data type of images or videos to be encrypted leading to increase compression efficiency and security of the used tables. A systematic study on how to strategically integrate different atomic operations to build a multimedia encryption system is presented. The resulting system can provide superior performance over both generic encryption and its simple adaptation to multimedia in terms of a joint consideration of security, bitrate overhead. The effectiveness of this scheme is verified through a series of experiments, and the robustness of our approach is demonstrated by comparing it against a standard compression technique, JPEG.
CITED BY (1)  
1 Manimegalai, R. (2014). Efficient joint compression and encryption techniques for video data.
1 Google Scholar 
2 Academic Journals Database 
3 CiteSeerX 
4 refSeek 
5 iSEEK 
6 Socol@r  
7 ResearchGATE 
8 Libsearch 
9 Bielefeld Academic Search Engine (BASE) 
10 Scribd 
11 SlideShare 
13 PdfSR 
(independent JPEG group) ftp.uu.net:/graphics/jpeg [accessed at 8/8/2010]
http://www.jpeg.org/public/jfif.pdf (JPEG file interchange format) [accessed at 8/8/2010
. J. Zhou, Z. Liang, Y. Chen, and O. C. Au. “Security analysis of multimedia encryption schemes based on multiple Huffman table”. IEEE Signal Processing Letters, vol. 14, no. 3, pp. 201–204, 2007
3. http://www.jpeg.org (JPEG resources) [accessed at 4/8/2010]
C.P. Wu and C. C. J. K. Kuo. “Design of integrated multimedia compression and encryption systems”. IEEE Transactions in Multimedia, vol. 7, no. 5, pp. 828–839, 2005.
C.P. Wu and C.C. Kuo. “Efficient multimedia encryption via entropy codec design”. Proc. SPIE, vol. 4314, Jan. 2001.
C.P. Wu and C.C.J. Kuo. “Efficient multimedia encryption via entropy codec design”. In Proc. SPIE Int. Symp. Electronic Imaging 2001, vol. 4314, Jan. 2001, p.128.
D. W. Gillman and R. L. Rivest. “On breaking a Huffman code”. IEEE Transactions on Information Theory, vol. 42, no. 3, pp. 972–976, 1996.
D. Xie and C. J. Kuo. “Enhanced Multiple Huffman Table (MHT) Encryption Scheme Using Key Hoping”. In Proceedings of IEEE International Symposium on Circuits and Systems, pp.568–571, May2004.
D. Xie and C. J. Kuo. “Multimedia Data Encryption via Random Rotation in Partitioned Bit Stream”. In Proceedings of IEEE International Symposium on Circuits and Systems, pp.568– 571, May2004.
E. Filiol and C. Fontain. “A new ultra fast stream cipher design: COS ciphers”. In Proc. 8 th IMA Conf. Cryptography and Coding, Dec. 2001.
H. Cheng and X. Li. “Partial encryption of compressed images and videos”. IEEE Transactions on Signal Processing, vol. 48, no. 8, pp. 2439–2451, 2000.
J. Nechvatal et al. “Report on the Development of the Advanced Encryption Standard”. National Institute of Standards and Technology, U.S. Dept. Commerce, Tech. Rep., Oct. 2000.
L. Qiao, K. Nahrstedt, and M. C. Tam.“Is MPEG encryption by using random list instead of zigzag order secure?”. in Proceedings of the IEEE International Symposium on Consumer Electronics (ISCE '97), pp. 226–229, Singapore, December 1997.
M. Van Droogenbroeck and R. Benedett. “Techniques for a selective encryption of uncompressed and compressed images”. In Proceedings of Advanced Concepts for Intelligent Vision Systems (ACIVS '02), pp. 90–97, Ghent, Belgium, September 2002.
Shaimaa A. Elsaid, Khalid F. A. Hussein, and Mohamed M. Fouad. “Securing Multimedia Transmission Using Multiple Huffman Tables Technique”. Electrical and Computer Systems Engineering Conference (ECSE’10), Egypt, 2010.
T. Uehara and R. Safavi Naini.“Chosen DCT coefficients attack on MPEG encryption scheme”. in Proceedings of IEEE Pacific Rim Conference on Multimedia, pp. 316–319,Sydney, Australia, December 2000.
W. Pennebaker and J. Mitchell. ”JPEG Still Image Data Compression Standard”, Van Nostrand Reinhold, New York, 1993.
W. Stallings. "Cryptography and Network Security Principles and Practices", Upper Saddle River, NJ: Prentice Hall, 2003
Mr. Shaimaa Ahmed Elsaid
faculity of engineering - Egypt
Associate Professor Khalid F. A. Hussein
- Egypt
Associate Professor Mohamed M. Fouad
- Egypt

View all special issues >>