Efficient JPEG Encoding Using Bernoulli Shift Map for Secure Communication |
| |
Authors: | Ahmad Nisar Younus Muhammad Usman Anjum Muhammad Rizwan Saleem Gulshan Gondal Zaheer Ahmed Narejo Sanam |
| |
Affiliation: | 1.Department of Computer Engineering, University of Engineering and Technology Lahore, Lahore, 54890, Pakistan ;2.Department of Computer Science and IT, University of Jhang, Jhang, 35200, Pakistan ;3.Ecole Mathématiques, Informatique, Télécommunications de Toulouse, Université de Toulouse, Toulouse, France ;4.Department of Electronics Engineering, The Islamia University of Bahawalpur, Bahawalpur, 63100, Pakistan ;5.Department of Computer Science, COMSATS University Islamabad (Lahore Campus), Lahore, 54890, Pakistan ;6.Department of Computer Systems Engineering, Mehran University of Engineering & Technology (MUET), Jamshoro, Pakistan ; |
| |
Abstract: | To ensure confidentiality and efficient network bandwidth, digital data must be compressed and encrypted. In most communication systems, these two factors are critical for information processing. Image compression and encryption may result in lower restoration quality and performance. Secure-JPEG is an effort to create a compression and encryption technique for digital data. This approach is based on the JPEG compression standard, which is the most extensively used lossy compression scheme. It enhances the usual JPEG compression algorithm to encrypt data during compression. The Secure-JPEG approach encrypts the data while it is compressed, and it may be easily modified to offer near lossless compression. Lossless compression, on the other hand, has a lower compression ratio and is only useful in certain situations. The paper addresses the issue of insufficient security as a result of the usage of a simple random number generator that is not cryptographically safe. The enhanced security characteristics are provided via the Generalized Bernoulli Shift Map, which has a chaotic system with proven security. Several cryptographic tests are used to validate the algorithm's security, and the chaotic system's behavior is also examined. |
| |
Keywords: | |
本文献已被 SpringerLink 等数据库收录! |
|