2023
DOI: 10.3390/s23084057
|View full text |Cite
|
Sign up to set email alerts
|

Comprehensive Analysis of Compressible Perceptual Encryption Methods—Compression and Encryption Perspectives

Abstract: Perceptual encryption (PE) hides the identifiable information of an image in such a way that its intrinsic characteristics remain intact. This recognizable perceptual quality can be used to enable computation in the encryption domain. A class of PE algorithms based on block-level processing has recently gained popularity for their ability to generate JPEG-compressible cipher images. A tradeoff in these methods, however, is between the security efficiency and compression savings due to the chosen block size. Se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
3
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 75 publications
0
3
0
Order By: Relevance
“…Furthermore, various adaptations and versions based on the NPT have been developed. These proposals often strike a balance between security levels and the efficiency of compression savings [15]. One example is the injected negative-positive transformation (NINPT) [16] designed for compressed sensing.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, various adaptations and versions based on the NPT have been developed. These proposals often strike a balance between security levels and the efficiency of compression savings [15]. One example is the injected negative-positive transformation (NINPT) [16] designed for compressed sensing.…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, a final discrete random variable is proposed, denoted as F, representing the number of color pixels with a value equal to h after the NPT. It is defined in Equation ( 14) and can be replicated for each color c. F = S tot + T tot (14) With this in mind, the expected value of F is given in Equation (15).…”
mentioning
confidence: 99%
“…While our proposal increases the encrypted image size by 8% and increases the entropy, during the decryption stage, it is restored to its original dimensions without any loss of data. On the contrary, when employed in formats such as JPEG in lossy compression mode, suboptimal results are frequently observed, characterized by entropy values around 7.90 [27].…”
Section: Introductionmentioning
confidence: 99%