Skip to main content

2018 | OriginalPaper | Buchkapitel

A Hybrid Lossy Compression Using 2-D Discrete Cosine Transform and Visual Cryptographic Technique for Security of Multimedia Image Data Communications in Internet of Things

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Security in internet of things is very critical. The computer systems that use image acquisition and processing from onboard or remote systems need to secure image data over the internet. Security of multimedia image data transmitted over secured and unsecured communications channel in today’s cyberspace is of paramount consideration due to malicious activities over these channels and there has been a high demand especially for end to end security applications for mobile devices. This is to ensure safety and security as well as privacy to transmitted data and stored data in the clouds. In this paper, we proposed a hybrid approach for securing digital images for devices by engaging lossy compression using 2-D discrete cosine transform and Visual Cryptographic Technique. The DCT was used for the lossy compression process and the visual cryptography was used to encrypt the image for confidentiality. The results showed to be very effective and the implementation was done using MATLAB.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Qureshi, A., Megías, D., Rifà-Pous, H.: Framework for preserving security and privacy in peer-to-peer content distribution systems. Expert Syst. Appl. 42(3), 1391–1408 (2015)CrossRef Qureshi, A., Megías, D., Rifà-Pous, H.: Framework for preserving security and privacy in peer-to-peer content distribution systems. Expert Syst. Appl. 42(3), 1391–1408 (2015)CrossRef
3.
Zurück zum Zitat Qian, Z., Zhang, X., Ren, Y.: JPEG encryption for image rescaling in the encrypted domain. J. Vis. Commun. Image Represent. 26, 9–13 (2015)CrossRef Qian, Z., Zhang, X., Ren, Y.: JPEG encryption for image rescaling in the encrypted domain. J. Vis. Commun. Image Represent. 26, 9–13 (2015)CrossRef
4.
Zurück zum Zitat Li, T., et al.: A new scrambling method based on semi-frequency domain and chaotic system. In: International Conference on Neural Networks and Brain, ICNN&B 2005, pp. 607–610 (2005) Li, T., et al.: A new scrambling method based on semi-frequency domain and chaotic system. In: International Conference on Neural Networks and Brain, ICNN&B 2005, pp. 607–610 (2005)
5.
Zurück zum Zitat Lian, S., Sun, J., Wang, Z.: A novel image encryption scheme based-on JPEG encoding. In: Proceedings of Eighth International Conference on Information Visualization, 2004, IV 2004, pp. 217–220 (2004) Lian, S., Sun, J., Wang, Z.: A novel image encryption scheme based-on JPEG encoding. In: Proceedings of Eighth International Conference on Information Visualization, 2004, IV 2004, pp. 217–220 (2004)
6.
Zurück zum Zitat Chen, T.-S., Chang, C.-C., Hwang, M.-S.: A virtual image cryptosystem based upon vector quantization. IEEE Trans. Image Process. 7, 1485–1488 (1998)MathSciNetCrossRefMATH Chen, T.-S., Chang, C.-C., Hwang, M.-S.: A virtual image cryptosystem based upon vector quantization. IEEE Trans. Image Process. 7, 1485–1488 (1998)MathSciNetCrossRefMATH
7.
Zurück zum Zitat Kester, Q., Koumadi, K.M.: Cryptographie technique for image encryption based on the RGB pixel displacement. In: 2012 IEEE 4th International Conference on Adaptive Science & Technology (ICAST), pp. 74–77, 25–27 October 2012 Kester, Q., Koumadi, K.M.: Cryptographie technique for image encryption based on the RGB pixel displacement. In: 2012 IEEE 4th International Conference on Adaptive Science & Technology (ICAST), pp. 74–77, 25–27 October 2012
8.
Zurück zum Zitat Zhou, Y., Panetta, K., Agaian, S.: Image encryption using Discrete Parametric Cosine Transform. In: 2009 Conference Record of the Forty-Third Asilomar Conference on Signals, Systems and Computers, pp. 395–399, 1–4 November 2009 Zhou, Y., Panetta, K., Agaian, S.: Image encryption using Discrete Parametric Cosine Transform. In: 2009 Conference Record of the Forty-Third Asilomar Conference on Signals, Systems and Computers, pp. 395–399, 1–4 November 2009
9.
Zurück zum Zitat Sudharsanan, S.: Shared key encryption of JPEG color images. IEEE Trans. Consum. Electron. 51, 1204–1211 (2005)CrossRef Sudharsanan, S.: Shared key encryption of JPEG color images. IEEE Trans. Consum. Electron. 51, 1204–1211 (2005)CrossRef
10.
Zurück zum Zitat Zhou, J., et al.: Security analysis of multimedia encryption schemes based on multiple Huffman table. IEEE Signal Process. Lett. 14, 201–204 (2007)CrossRef Zhou, J., et al.: Security analysis of multimedia encryption schemes based on multiple Huffman table. IEEE Signal Process. Lett. 14, 201–204 (2007)CrossRef
11.
Zurück zum Zitat Wu, C.-P., Kuo, C.C.J.: Design of integrated multimedia compression and encryption systems. IEEE Trans. Multimedia 7, 828–839 (2005)CrossRef Wu, C.-P., Kuo, C.C.J.: Design of integrated multimedia compression and encryption systems. IEEE Trans. Multimedia 7, 828–839 (2005)CrossRef
Metadaten
Titel
A Hybrid Lossy Compression Using 2-D Discrete Cosine Transform and Visual Cryptographic Technique for Security of Multimedia Image Data Communications in Internet of Things
verfasst von
Quist-Aphetsi Kester
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-66742-3_28

Premium Partner