Abstract

Confidentiality and efficient bandwidth utilization require a combination of compression and encryption of digital images. In this paper, a new method for joint image compression and encryption based on set partitioning in hierarchical trees (SPIHT) with optimized Kd-tree and multiple chaotic maps was proposed. First, the lossless compression and encryption of the original images were performed based on integer wavelet transform (IWT) with SPIHT. Wavelet coefficients undergo diffusions and permutations before encoded through SPIHT. Second, maximum confusion, diffusion and compression of the SPIHT output were performed via the modified Kd-tree, wavelet tree and Huffman coding. Finally, the compressed output was further encrypted with varying parameter logistic maps and modified quadratic chaotic maps. The performance of the proposed technique was evaluated through compression ratio (CR) and peak-signal-to-noise ratio (PSNR), key space and histogram analyses. Moreover, this scheme passes several security tests, such as sensitivity, entropy and differential analysis tests. According to the theoretical analysis and experimental results, the proposed method is more secure and decreases the redundant information of the image more than the existing techniques for hybrid compression and encryption.

Highlights

  • In the current era, with the availability of inexpensive capturing devices with high resolution, the rapid growth of image transmission over public networks has raised substantial concern in the fields of secure transmission and the compression of images [1,2].The compression of data is the main thrust in multimedia applications due to high redundancy.Without compression, storage and communication resources are used inefficiently

  • Compression and programming environment developed by mathworks is an American privately held corporation, encryption of these images were performed with integer wavelet transform (IWT)-based set partitioning in hierarchical trees (SPIHT)

  • An additional level of security was achieved via encryption through a varying parameter logistic map and modified

Read more

Summary

Introduction

With the availability of inexpensive capturing devices with high resolution, the rapid growth of image transmission over public networks has raised substantial concern in the fields of secure transmission and the compression of images [1,2].The compression of data is the main thrust in multimedia applications due to high redundancy.Without compression, storage and communication resources are used inefficiently. With the availability of inexpensive capturing devices with high resolution, the rapid growth of image transmission over public networks has raised substantial concern in the fields of secure transmission and the compression of images [1,2]. The compression of data is the main thrust in multimedia applications due to high redundancy. Storage and communication resources are used inefficiently. Low-bandwidth communication channels and power-limited devices require low-bit-rate compression due to bandwidth and power constraints. Encryption is required for confidentiality and integrity of the information, for open-access networks. Encryption algorithms are typically optimized for a specific type of data due to several factors, such as encryption speed, processing power and sensitivity to bit changes

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call