2017
DOI: 10.14569/ijacsa.2017.080212
|View full text |Cite
|
Sign up to set email alerts
|

Review of Image Compression and Encryption Techniques

Abstract: Abstract-In line with a growing need for data and information transmission in a safe and quick manner, researches on image protection and security through a combination of cryptographic and compression techniques begin to take form. The combination of these two methods may include into three categories based on their process sequences. The first category, i.e. cryptographic technique followed by compression method, focuses more on image security than the reduction of a size of data. The second combination, com… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
6
2
2

Relationship

0
10

Authors

Journals

citations
Cited by 33 publications
(25 citation statements)
references
References 36 publications
0
19
0
Order By: Relevance
“…In this article, compression algorithms are applied first and then compressed images are encrypted. It can be seen from literature review that the cost of security is minimum if compression is performed before encryption [20]. In this research three different case studies are analyzed: The compressed encrypted images are decompressed and decrypted by using inverse DCT transformation and inverse AES algorithm respectively in order to get the original image.…”
Section: Resultsmentioning
confidence: 99%
“…In this article, compression algorithms are applied first and then compressed images are encrypted. It can be seen from literature review that the cost of security is minimum if compression is performed before encryption [20]. In this research three different case studies are analyzed: The compressed encrypted images are decompressed and decrypted by using inverse DCT transformation and inverse AES algorithm respectively in order to get the original image.…”
Section: Resultsmentioning
confidence: 99%
“…2D-DWT [16] can be obtained by applying 1D DWT row wise to produce L and H sub-bands in each row then column wise. Total four number of sub-bands (LL1, LH1, HL1, and HH1) are acquired for level 1 decomposition [23].…”
Section: Discrete Wavelet Transformmentioning
confidence: 99%
“…Development of information technology has immensely influenced the change in communication from conventional to digital means [1]- [3], this improvement in communication lead to confidentiality issues especially during the transit of information from source to its intended recipient [4], [5].…”
Section: Introductionmentioning
confidence: 99%