Javascript must be enabled to continue!
Efficient JPEG Encoding Using Bernoulli Shift Map for Secure Communication
View through CrossRef
Abstract
Digital data must be compressed and encrypted to maintain confidentiality and efficient bandwidth usage. These two parameters are essential for information processing in most communication systems. Image compression and encryption may result in reduced restoration quality and degraded performance. This study attempts to provide a compression and encryption scheme for digital data named as Secure-JPEG. This scheme is built on the JPEG compression format, the most widely used lossy compression scheme. It extends the standard JPEG compression algorithm to encrypt data during compression. Secure-JPEG scheme provides encryption along with the process of compression, and it could be altered easily to provide lossless compression. On the other hand, the lossless compression provides less compression ratio and is suitable only in specific scenarios. The paper address the problem of security lacks due to the use of a simple random number generator which can not be cryptographically secure. The improved security characteristics are provided through Generalized Bernoulli Shift Map, which has a chaotic system with demonstrated security. The algorithm's security is tested by several cryptographic tests and the chaotic system’s behavior is also analyzed.
Springer Science and Business Media LLC
Title: Efficient JPEG Encoding Using Bernoulli Shift Map for Secure Communication
Description:
Abstract
Digital data must be compressed and encrypted to maintain confidentiality and efficient bandwidth usage.
These two parameters are essential for information processing in most communication systems.
Image compression and encryption may result in reduced restoration quality and degraded performance.
This study attempts to provide a compression and encryption scheme for digital data named as Secure-JPEG.
This scheme is built on the JPEG compression format, the most widely used lossy compression scheme.
It extends the standard JPEG compression algorithm to encrypt data during compression.
Secure-JPEG scheme provides encryption along with the process of compression, and it could be altered easily to provide lossless compression.
On the other hand, the lossless compression provides less compression ratio and is suitable only in specific scenarios.
The paper address the problem of security lacks due to the use of a simple random number generator which can not be cryptographically secure.
The improved security characteristics are provided through Generalized Bernoulli Shift Map, which has a chaotic system with demonstrated security.
The algorithm's security is tested by several cryptographic tests and the chaotic system’s behavior is also analyzed.
Related Results
Image Forgery Detection and Localization using Modified JPEG Ghost
Image Forgery Detection and Localization using Modified JPEG Ghost
Authenticity of an image taken digitally suffers severe threats as a result of increase in various powerful digital image editing tools. These tools modifies the image contents wit...
PENENTUAN UKURAN SAMPEL MENGGUNAKAN RUMUS BERNOULLI DAN SLOVIN: KONSEP DAN APLIKASINYA
PENENTUAN UKURAN SAMPEL MENGGUNAKAN RUMUS BERNOULLI DAN SLOVIN: KONSEP DAN APLIKASINYA
ABSTRACT. The research discussed a sample survey to draw the population inference based on the sample from that population. There are several techniques to take a sample size, but ...
JPEG Column: 102nd JPEG Meeting in San Francisco, U.S.A.
JPEG Column: 102nd JPEG Meeting in San Francisco, U.S.A.
JPEG Trust reaches Draft International Standard stage.
The 102nd JPEG meeting was held in San Francisco, California, USA, from 22 to 26 January 2024. At this meeting, JPE...
Storing Health Data in JPEG: Looking at Exif Area Capacity Limits
Storing Health Data in JPEG: Looking at Exif Area Capacity Limits
Formats for data storage in personal computers vary according to manufacturer and models for personal health-monitoring devices such as blood-pressure and body-composition meters. ...
Pemalar Bernoulli Persamaan Bernoulli
Pemalar Bernoulli Persamaan Bernoulli
A comprehensive analytical study on the meaning of Bernoulli's constant is presented. The Vector method has been employed for the Mathematical analysis. This paper shows that Berno...
JPEG Image Enhancement with Pre-Processing of Color Reduction and Smoothing
JPEG Image Enhancement with Pre-Processing of Color Reduction and Smoothing
JPEG is the international standard for still image encoding and is the most widely used compression algorithm because of its simple encoding process and low computational complexit...
ESSENTIAL SECURITY PRACTICES FOR FORTIFYING MOBILE APPS
ESSENTIAL SECURITY PRACTICES FOR FORTIFYING MOBILE APPS
“Essential Security Practices for Fortifying Mobile Apps” is a definitive guide designed to empower developers, security professionals, and organizations with the knowledge and too...
Bernoulli Polynomials as Permanent of Matrices
Bernoulli Polynomials as Permanent of Matrices
Bernoulli polynomials and Bernoulli numbers are fundamental sequences in mathematics with important applications in number theory, combinatorics, and analysis. Classical treatments...

