Abstract
In order to encrypt and compress a color image simultaneously, an encryption and compression algorithm for color image was proposed based on a hyperchaotic system. A hyperchaotic system was utilized to make a pure white image into a uniform distribution and colorful palette. In compression process, indexing technology was utilized to map the 3D data of color image to two-dimensional subscript of palette. The compressed image would continue to be encrypted by loop feedback in physical space and time space. Simulation experiments show that the algorithm is realized to encrypt and compress a color image simultaneously. It has large key space, high security, and big compression ratio as well as great application value in secure communication of color image.
Highlights
Image encryption is widely utilized in finance, security, military and other fields
A true color image consists of pixels in image matrix
The large amount of color image data limits the massage transmission and the storage speed. Both reliability of encryption scheme and compressibility of data should be considered in the encryption of color image
Summary
Image encryption is widely utilized in finance, security, military and other fields. The amount of image data becomes larger and larger from binary image to gray image to color image. The amount of data of an m!n true color image is m!n!3!8 bit, 24 times binary image of the same size if 8 bits are utilized to represent gray level of each color. The large amount of color image data limits the massage transmission and the storage speed Both reliability of encryption scheme and compressibility of data should be considered in the encryption of color image. Many compressibility scheme of color image [4,5,6] cannot be utilized in encrypted images as order of arrangement as well as pixel value will change, and the correlation among pixels is disorganized. A resolution-progressive compression scheme was proposed in literature [8] to compress encrypted images. The statistical characteristics, key space and sensitivity of encrypted images are tested
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Online and Biomedical Engineering (iJOE)
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.