2018
DOI: 10.11591/ijece.v8i5.pp3568-3586
|View full text |Cite
|
Sign up to set email alerts
|

Balancing Compression and Encryption of Satellite Imagery

Abstract: With the rapid developments in the remote sensing technologies and services, there is a necessity for combined compression and encryption of satellite imagery. The onboard satellite compression is used to minimize storage and communication bandwidth requirements of high data rate satellite applications. While encryption is employed to secure these resources and prevent illegal use of image sensitive information. In this paper, we propose an approach to address these challenges which raised in the highly dynami… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 20 publications
0
3
0
Order By: Relevance
“…In recent years, encryption is playing an essential role in many aspects, such as military, trade secrets and satellite imagery [1][2][3][4][5][6]. Encoding is the process of converting something in the physical world into a representation that can be stored or shared.…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, encryption is playing an essential role in many aspects, such as military, trade secrets and satellite imagery [1][2][3][4][5][6]. Encoding is the process of converting something in the physical world into a representation that can be stored or shared.…”
Section: Introductionmentioning
confidence: 99%
“…However, exchanging images in this way increases the possibility of threats by unauthorized persons changing or stealing these images [2]. The most effective tool to prevent such adversary threats to digital images is cryptographic encryption/decryption algorithms [3], [4]. These tools are used to scramble images during storage, transmission and processing.…”
Section: Introductionmentioning
confidence: 99%
“…Arnold chaotic maps are used, so that image encryption is resistant to attacks by differential attacks and brute force. While the RC4 method is used to increase resistance to statistical attacks, RC4 belongs to the stream cipher, which has the advantage of fast computing [28]. Shifting techniques are also proposed in research [15,26,29].…”
Section: Introductionmentioning
confidence: 99%