Skip to main content
Top

2018 | OriginalPaper | Chapter

A Hybrid Lossy Compression Using 2-D Discrete Cosine Transform and Visual Cryptographic Technique for Security of Multimedia Image Data Communications in Internet of Things

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Security in internet of things is very critical. The computer systems that use image acquisition and processing from onboard or remote systems need to secure image data over the internet. Security of multimedia image data transmitted over secured and unsecured communications channel in today’s cyberspace is of paramount consideration due to malicious activities over these channels and there has been a high demand especially for end to end security applications for mobile devices. This is to ensure safety and security as well as privacy to transmitted data and stored data in the clouds. In this paper, we proposed a hybrid approach for securing digital images for devices by engaging lossy compression using 2-D discrete cosine transform and Visual Cryptographic Technique. The DCT was used for the lossy compression process and the visual cryptography was used to encrypt the image for confidentiality. The results showed to be very effective and the implementation was done using MATLAB.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Qureshi, A., Megías, D., Rifà-Pous, H.: Framework for preserving security and privacy in peer-to-peer content distribution systems. Expert Syst. Appl. 42(3), 1391–1408 (2015)CrossRef Qureshi, A., Megías, D., Rifà-Pous, H.: Framework for preserving security and privacy in peer-to-peer content distribution systems. Expert Syst. Appl. 42(3), 1391–1408 (2015)CrossRef
3.
go back to reference Qian, Z., Zhang, X., Ren, Y.: JPEG encryption for image rescaling in the encrypted domain. J. Vis. Commun. Image Represent. 26, 9–13 (2015)CrossRef Qian, Z., Zhang, X., Ren, Y.: JPEG encryption for image rescaling in the encrypted domain. J. Vis. Commun. Image Represent. 26, 9–13 (2015)CrossRef
4.
go back to reference Li, T., et al.: A new scrambling method based on semi-frequency domain and chaotic system. In: International Conference on Neural Networks and Brain, ICNN&B 2005, pp. 607–610 (2005) Li, T., et al.: A new scrambling method based on semi-frequency domain and chaotic system. In: International Conference on Neural Networks and Brain, ICNN&B 2005, pp. 607–610 (2005)
5.
go back to reference Lian, S., Sun, J., Wang, Z.: A novel image encryption scheme based-on JPEG encoding. In: Proceedings of Eighth International Conference on Information Visualization, 2004, IV 2004, pp. 217–220 (2004) Lian, S., Sun, J., Wang, Z.: A novel image encryption scheme based-on JPEG encoding. In: Proceedings of Eighth International Conference on Information Visualization, 2004, IV 2004, pp. 217–220 (2004)
6.
go back to reference Chen, T.-S., Chang, C.-C., Hwang, M.-S.: A virtual image cryptosystem based upon vector quantization. IEEE Trans. Image Process. 7, 1485–1488 (1998)MathSciNetCrossRefMATH Chen, T.-S., Chang, C.-C., Hwang, M.-S.: A virtual image cryptosystem based upon vector quantization. IEEE Trans. Image Process. 7, 1485–1488 (1998)MathSciNetCrossRefMATH
7.
go back to reference Kester, Q., Koumadi, K.M.: Cryptographie technique for image encryption based on the RGB pixel displacement. In: 2012 IEEE 4th International Conference on Adaptive Science & Technology (ICAST), pp. 74–77, 25–27 October 2012 Kester, Q., Koumadi, K.M.: Cryptographie technique for image encryption based on the RGB pixel displacement. In: 2012 IEEE 4th International Conference on Adaptive Science & Technology (ICAST), pp. 74–77, 25–27 October 2012
8.
go back to reference Zhou, Y., Panetta, K., Agaian, S.: Image encryption using Discrete Parametric Cosine Transform. In: 2009 Conference Record of the Forty-Third Asilomar Conference on Signals, Systems and Computers, pp. 395–399, 1–4 November 2009 Zhou, Y., Panetta, K., Agaian, S.: Image encryption using Discrete Parametric Cosine Transform. In: 2009 Conference Record of the Forty-Third Asilomar Conference on Signals, Systems and Computers, pp. 395–399, 1–4 November 2009
9.
go back to reference Sudharsanan, S.: Shared key encryption of JPEG color images. IEEE Trans. Consum. Electron. 51, 1204–1211 (2005)CrossRef Sudharsanan, S.: Shared key encryption of JPEG color images. IEEE Trans. Consum. Electron. 51, 1204–1211 (2005)CrossRef
10.
go back to reference Zhou, J., et al.: Security analysis of multimedia encryption schemes based on multiple Huffman table. IEEE Signal Process. Lett. 14, 201–204 (2007)CrossRef Zhou, J., et al.: Security analysis of multimedia encryption schemes based on multiple Huffman table. IEEE Signal Process. Lett. 14, 201–204 (2007)CrossRef
11.
go back to reference Wu, C.-P., Kuo, C.C.J.: Design of integrated multimedia compression and encryption systems. IEEE Trans. Multimedia 7, 828–839 (2005)CrossRef Wu, C.-P., Kuo, C.C.J.: Design of integrated multimedia compression and encryption systems. IEEE Trans. Multimedia 7, 828–839 (2005)CrossRef
Metadata
Title
A Hybrid Lossy Compression Using 2-D Discrete Cosine Transform and Visual Cryptographic Technique for Security of Multimedia Image Data Communications in Internet of Things
Author
Quist-Aphetsi Kester
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-66742-3_28

Premium Partner