Abstract
As digital images are consistently generated and transmitted online, the unauthorized utilization of these images is an increasing concern that has a significant impact on both security and privacy issues; additionally, the representation of digital images requires a large amount of data. In recent years, an image compression scheme has been widely considered; such a scheme saves on hardware storage space and lowers both the transmission time and bandwidth demand for various potential applications. In this article, we review the various approaches taken to consider joint encryption and compression, assessing both their merits and their limitations. In addition to the survey, we also briefly introduce the most interesting and most often utilized applications of image encryption and evaluation metrics, providing an overview of the various kinds of image encryption schemes available. The contribution made by these approaches is then summarized and compared, offering a consideration of the different technical perspectives. Lastly, we highlight the recent challenges and some potential research directions that could fill the gaps in these domains for both researchers and developers.
- [1] . 2021. Robust high-capacity watermarking over online social network shared images. IEEE Transactions on Circuits and Systems for Video Technology 31, 3 (2021), 1208–1221.Google ScholarCross Ref
- [2] . 2019. A novel information hiding scheme based on social networking site viewers’ public comments. Journal of Information Security and Applications 47 (2019), 275–283.Google ScholarDigital Library
- [3] . 2021. Wild and interesting Facebook statistics and facts. Retrieved from https://kinsta.com/blog/facebook-statistics/.Google Scholar
- [4] . 2021. Instagram by the numbers: Stats, demographics & fun facts. Retrieved from https://www.omnicoreagency.com/instagram-statistics/.Google Scholar
- [5] . 2021. Flickr statistics, user count and facts. Retrieved from https://expandedramblings.com/index.php/flickr-stats/.Google Scholar
- [6] Quicksprout. 2019. How to increase Twitter engagement by 324%. Retrieved from https://www.quicksprout.com/twitter-engagement/.Google Scholar
- [7] . 2018. Advances in security and privacy of multimedia big data in mobile and cloud computing. Multimedia Tools and Applications 77, 7 (2018), 9203–9208.Google ScholarDigital Library
- [8] . 2001. Authenticity and integrity of digital mammography images. IEEE Transactions on Medical Imaging 20, 8 (2001), 784–791.Google ScholarCross Ref
- [9] . 2020. Joint watermarking-encryption-JPEG-LS for medical image reliability control in encrypted and compressed domains. IEEE Transactions on Information Forensics and Security 15 (2020), 2556–2569.Google ScholarCross Ref
- [10] . 2019. Handbook of Multimedia Information Security: Techniques and Applications. Springer International Publishing.Google ScholarCross Ref
- [11] . 2006. Robust and secure image hashing. IEEE Transactions on Information Forensics and Security 1, 2 (2006), 215–230.Google ScholarDigital Library
- [12] . 2015. Applied Cryptography: Protocols, Algorithms and Source Code in C. John Wiley & Sons.Google Scholar
- [13] . 2021. Image encryption based on a single-round dictionary and chaotic sequences in cloud computing. Concurrency and Computation: Practice and Experience 33, 7 (2021), 1.Google ScholarCross Ref
- [14] . 2019. A remote-sensing image encryption scheme using DNA bases probability and two-dimensional logistic map. IEEE Access 7 (2019), 65450–65459.Google ScholarCross Ref
- [15] . 2016. Image encryption based on compressive sensing and scrambled index for secure multimedia transmission. ACM Transactions on Multimedia Computing, Communications, and Applications 12, 4 (2016), 1–22.Google ScholarDigital Library
- [16] 2021. Cy: Chaotic yolo for user intended image encryption and sharing in social media. Information Sciences 542 (2021), 212–227.Google ScholarCross Ref
- [17] . 2019. Medical image encryption using fractional discrete cosine transform with chaotic function. Medical & Biological Engineering & Computing 57 (2019), 2517–2533.Google ScholarCross Ref
- [18] . 2018. Secure surveillance framework for IoT systems using probabilistic image encryption. IEEE Transactions on Industrial Informatics 14, 8 (2018), 3679–3689.Google ScholarCross Ref
- [19] . 2000. Image encryption for secure internet multimedia applications. IEEE Transactions on Consumer Electronics 46, 3 (2000), 395–403.Google ScholarDigital Library
- [20] . 2018. Depreciating motivation and empirical security analysis of chaos-based image and video encryption. IEEE Transactions on Information Forensics and Security 13, 9 (2018), 2137–2150.Google ScholarCross Ref
- [21] . 2019. A pixel permutation based image encryption technique using chaotic map. Multimedia Tools and Applications 78, 19 (2019), 27569–27590.Google ScholarDigital Library
- [22] . 2020. A novel plaintext-related image encryption scheme based on chaotic system and pixel permutation. IEEE Access 8 (2020), 22082–22093.Google ScholarCross Ref
- [23] . 2019. Chaotic encryption algorithm with key controlled neural networks for intelligent transportation systems. IEEE Access 7 (2019), 158697–158709.Google ScholarCross Ref
- [24] . 2016. Cryptosystem for securing image encryption using structured phase masks in fresnel wavelet transform domain. 3D Research 7, 34 (2016), 1--18.Google Scholar
- [25] . 2020. Image encryption using dynamic S-box substitution in the wavelet domain. Wireless Personal Communications 115 (2020). 2243–2268.Google ScholarDigital Library
- [26] . 2015. Encryption of medical images based on the cosine number transform. Signal Processing: Image Communication 35 (2015), 1–8.Google ScholarDigital Library
- [27] . 2021. A novel double-image encryption algorithm based on rossler hyperchaotic system and compressive sensing. IEEE Access 9 (2021), 41704–41716.Google ScholarCross Ref
- [28] . 2020. Novel image compression–encryption hybrid scheme based on DNA encoding and compressive sensing. Applied Physics B 126, 3 (2020), 45.Google ScholarCross Ref
- [29] . 2015. On known-plaintext attacks to a compressed sensing-based encryption: A quantitative analysis. IEEE Transactions on Information Forensics and Security 10, 10 (2015), 2182–2195.Google ScholarDigital Library
- [30] . 2021. Optical image encryption using different twiddle factors in the butterfly algorithm of fast Fourier transform. Optics Communications 485 (2021), 126707.Google ScholarCross Ref
- [31] . 2018. Optical image encryption using gamma distribution phase masks in the gyrator domain. Journal of the European Optical Society – Rapid Publications 14, 28 (2018), 1--10.Google Scholar
- [32] . 2020. Color image compression and encryption scheme based on compressive sensing and double random encryption strategy. Signal Processing 176 (2020), 107684.Google ScholarCross Ref
- [33] . 2016. A joint color image encryption and compression scheme based on hyper-chaotic system. Nonlinear Dynamics 84, 4 (2016), 2333–2356.Google ScholarCross Ref
- [34] . 2021. A survey on data compression techniques: From the perspective of data quality, coding schemes, data type and applications. Journal of King Saud University - Computer and Information Sciences 33, 2 (2021), 119–140.Google ScholarCross Ref
- [35] . 2018. Image compression techniques: A survey in lossless and lossy algorithms. Neurocomputing 300 (2018), 44–69.Google ScholarCross Ref
- [36] . 2016. Image compression–encryption scheme based on hyper-chaotic system and 2D compressive sensing. Optics & Laser Technology 82 (2016), 121–133.Google ScholarCross Ref
- [37] . 2021. A comprehensive analysis on image encryption and compression techniques with the assessment of performance evaluation metrics. SN Computer Science 2, 29 (2021), 1--12.Google Scholar
- [38] . 2012. Remote-sensing image encryption in hybrid domain. Optics Communications 285, 7 (2012), 1736–1743.Google ScholarCross Ref
- [39] . 2019. Chaotic image encryption algorithm using frequency-domain DNA encoding. IET Image Processing 13, 9 (2019), 1535–1539.Google ScholarCross Ref
- [40] . 2016. A review of compressive sensing in information security field. IEEE Access 4 (2016), 2507–2519.Google ScholarCross Ref
- [41] . 2013. Color image encryption based on the affine transform and gyrator transform. Optics and Lasers in Engineering 51, 6 (2013), 768–775.Google ScholarCross Ref
- [42] . 2011. NPCR and UACI randomness tests for image encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications 1, 2 (2011), 31–38.Google Scholar
- [43] . 2021. Exploiting 2D compressed sensing and information entropy for secure color image compression and encryption. Neural Computing & Applications 33 (2021), 12845–12867.Google ScholarDigital Library
- [44] . 2015. Optical asymmetric image encryption using gyrator wavelet transform. Optics Communications 354 (2015), 344–352.Google ScholarCross Ref
- [45] . 2016. Image encryption based on independent component analysis and Arnold's cat map. Egyptian Informatics Journal 17, 1 (2016), 139–146.Google ScholarCross Ref
- [46] . 2014. A parallel block-based encryption schema for digital images using reversible cellular automata. Engineering Science and Technology, an International Journal 17, 2 (2014), 85–94.Google ScholarCross Ref
- [47] 2015. A protocol to encrypt digital images using chaotic maps and memory cellular automata. Logic Journal of the IGPL 23, 3 (2015), 485–494.Google ScholarCross Ref
- [48] . 2017. An asymmetric color image encryption method by using deduced gyrator transform. Optics and Lasers in Engineering 89 (2017), 72–79.Google ScholarCross Ref
- [49] . 2020. Two-stage data encryption using chaotic neural networks. Journal of Intelligent & Fuzzy Systems 38, 3 (2020), 2561–2568.Google ScholarDigital Library
- [50] . 2015. Image compression and encryption scheme using fractal dictionary and Julia set. IET Image Processing 9, 3 (2015), 173–183.Google ScholarCross Ref
- [51] . 2017. A scrambling framework for block transform compressed image. Multimedia Tools and Applications 76, 5 (2017), 6709–6729.Google ScholarDigital Library
- [52] . 2020. A compressive sensing based image encryption and compression algorithm with identity authentication and blind signcryption. IEEE Access 8 (2020), 211676–211690.Google ScholarCross Ref
- [53] . 2020. Lossless image compression-encryption algorithm based on BP neural network and chaotic system. Multimedia Tools and Applications 79, 27 (2020), 19963–19992.Google ScholarDigital Library
- [54] . 2020. A dynamic triple-image encryption scheme based on chaos, S-Box and image compressing. IEEE Access 8 (2020), 210382–210399.Google ScholarCross Ref
- [55] . 2019. SVD-based image compression, encryption, and identity authentication algorithm on cloud. IET Image Processing 13, 12 (2019), 2224–2232.Google ScholarCross Ref
- [56] . 2021. Image encryption algorithm for crowd data based on a new hyperchaotic system and Bernstein polynomial. IET Image Processing 15, 14 (2021), 1–20.Google Scholar
- [57] . 2019. Color image compression-encryption algorithm based on fractional-order memristor chaotic circuit. IEEE Access 7 (2019), 58751–58763.Google ScholarCross Ref
- [58] . 2021. An image compression and encryption algorithm based on the fractional-order simplest chaotic circuit. IEEE Access 9 (2021), 22141–22155.Google ScholarCross Ref
- [59] . 2020. Compression-then-encryption-based secure watermarking technique for smart healthcare system. IEEE MultiMedia 27, 4 (2020), 133–143.Google ScholarDigital Library
- [60] . 2014. Designing an efficient image encryption-then-compression system via prediction error clustering and random permutation. IEEE Transactions on Information Forensics and Security 9, 1 (2014), 39–50.Google ScholarDigital Library
- [61] . 2014. Compressing encrypted images with auxiliary information. IEEE Transactions on Multimedia 16, 5 (2014), 1327–1336.Google ScholarCross Ref
- [62] . 2015. A new encryption-then-compression algorithm using the rate–distortion optimization. Signal Processing: Image Communication 39 (2015), 141–150.Google ScholarDigital Library
- [63] . 2015. An encryption-then-compression system for JPEG/Motion JPEG standard. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E98, 11 (2015), 2238–2245.Google ScholarCross Ref
- [64] . 2017. An efficient encryption-then-compression technique for encrypted images using SVD. Digital Signal Processing 60 (2017), 81–89.Google ScholarDigital Library
- [65] . 2018. A novel image compression-encryption scheme based on chaos and compression sensing. IEEE Access 6 (2018), 67095–67107.Google ScholarCross Ref
- [66] . 2019. Encryption-then-compression systems using grayscale-based image encryption for JPEG images. IEEE Transactions on Information Forensics and Security 14, 6 (2019), 1515–1525.Google ScholarCross Ref
- [67] . 2019. Flexible lossy compression for selective encrypted image with image inpainting. IEEE Transactions on Circuits and Systems for Video Technology 29, 11 (2019), 3341–3355.Google ScholarDigital Library
- [68] . 2020. A new MRF-based lossy compression for encrypted binary images. IEEE Access 8 (2020), 11328–11341.Google ScholarCross Ref
- [69] . 2020. Robust coding of encrypted images via 2D compressed sensing. IEEE Transactions on Multimedia 23 (2020), 2656–267.Google ScholarDigital Library
- [70] . 2021. Secure image communication through adaptive deer hunting optimization based vector quantization coding of perceptually encrypted images. Wireless Personal Communications 116, 3 (2021), 2239–2260.Google ScholarDigital Library
- [71] . 2020. Encryption-then-compression-based copyright protection scheme for E-Governance. IT Professional 22, 2 (2020), 45–52.Google ScholarCross Ref
- [72] . 2021. Joint encryption and compression-based watermarking technique for security of digital documents. ACM Transactions on Internet Technology 21, 1 (2021), 1–20Google ScholarDigital Library
- [73] . 2021. Blockchain-assisted secure image transmission and diagnosis model on Internet of medical things environment. Personal and Ubiquitous Computing (2021), 1--11.Google ScholarDigital Library
- [74] . 2015. Compression and encryption for remote sensing image using chaotic system. Security and Communication Networks 8, 18 (2015), 3659–3666.Google ScholarDigital Library
- [75] . 2016. Simultaneous encryption and compression of medical images based on optimized tensor compressed sensing with 3D Lorenz. BioMedical Engineering OnLine 15, 1 (2016), 118.Google ScholarCross Ref
- [76] . 2017. Joint image compression and encryption based on order-8 alternating transforms. Journal of Visual Communication and Image Representation 44 (2017), 61–71.Google ScholarDigital Library
- [77] . 2017. A novel image compression–encryption hybrid algorithm based on the analysis sparse representation. Optics Communications 392 (2017), 223–233.Google ScholarCross Ref
- [78] . 2018. A content-adaptive joint image compression and encryption scheme. IEEE Transactions on Multimedia 20, 8 (2018), 1960–1972.Google ScholarCross Ref
- [79] . 2018. Compressive sensing based image compression-encryption using novel 1D-chaotic map. Multimedia Tools and Applications 77, 15 (2018), 19209–19234.Google ScholarDigital Library
- [80] . 2018. Joint encryption and compression of 3D images based on tensor compressive sensing with non-autonomous 3D chaotic system. Multimedia Tools and Applications 77, 2 (2018), 1715–1734.Google ScholarDigital Library
- [81] . 2019. Image compression and encryption using Chinese remainder theorem. Multimedia Tools and Applications 78, 12 (2019), 16727–16753.Google ScholarDigital Library
- [82] . 2020. Image compression and encryption scheme based on compressive sensing and Fourier transform. IEEE Access 8 (2020), 40838–40849.Google ScholarCross Ref
- [83] . 2021. Image compression-encryption method based on two-dimensional sparse recovery and chaotic system. Scientific Reports 11, 1 (2021).Google ScholarCross Ref
- [84] . 2014. A content security protection scheme in jpeg compressed domain. Journal of Visual Communication and Image Representation 25, 5 (2014), 805–813.Google ScholarCross Ref
- [85] . 2007. New approaches to encryption and steganography for digital videos. Multimedia Systems 13, 3 (2007), 191–204.Google ScholarDigital Library
- [86] . 2019. A chaotic image encryption algorithm based on 3-d bit-plane permutation. Neural Computing & Applications 31, 11 (2019), 7111–7130.Google ScholarDigital Library
- [87] . 2009. A pixel-based scrambling scheme for digital medical images protection. Journal of Network and Computer Applications 32, 4 (2009), 788–794.Google ScholarDigital Library
- [88] . 2013. A novel image encryption-compression scheme using hyper-chaos and Chinese remainder theorem. Signal Processing: Image Communication 28, 6 (2013), 670–680.Google ScholarCross Ref
- [89] . 2013. A new algorithm of the combination of image compression and encryption technology based on cross chaotic map. Nonlinear Dynamics, 72, 1 (2013), 229–241.Google ScholarCross Ref
Index Terms
- Towards Integrating Image Encryption with Compression: A Survey
Recommendations
An Improved Encryption–Compression-based Algorithm for Securing Digital Images
Nowadays, there is an increasing tendency to upload images to online platforms acting as information carriers for various applications. Unfortunately, the unauthorized utilization of such images is a serious concern that has significantly impacted ...
A public key-based encryption and signature verification model for secured image transmission in network
Image transmission is a challenging task due to the large file size and the security issues. Many existing systems on medical image transmission use symmetric key cryptography where the key is shared to multiple recipients leading to security leakage. ...
Simultaneous Encryption/Compression of Images Using Alpha Rooting
DCC '08: Proceedings of the Data Compression ConferenceSignificant work has been done in the areas of image encryption and compression as two independent problems, yet the two areas are strongly interleaved and should be considered simultaneously. Consider that current practice in image processing generally ...
Comments