首页 | 官方网站   微博 | 高级检索  
     


Efficient JPEG Encoding Using Bernoulli Shift Map for Secure Communication
Authors:Ahmad  Nisar  Younus  Muhammad Usman  Anjum  Muhammad Rizwan  Saleem  Gulshan  Gondal  Zaheer Ahmed  Narejo  Sanam
Affiliation:1.Department of Computer Engineering, University of Engineering and Technology Lahore, Lahore, 54890, Pakistan
;2.Department of Computer Science and IT, University of Jhang, Jhang, 35200, Pakistan
;3.Ecole Mathématiques, Informatique, Télécommunications de Toulouse, Université de Toulouse, Toulouse, France
;4.Department of Electronics Engineering, The Islamia University of Bahawalpur, Bahawalpur, 63100, Pakistan
;5.Department of Computer Science, COMSATS University Islamabad (Lahore Campus), Lahore, 54890, Pakistan
;6.Department of Computer Systems Engineering, Mehran University of Engineering & Technology (MUET), Jamshoro, Pakistan
;
Abstract:

To ensure confidentiality and efficient network bandwidth, digital data must be compressed and encrypted. In most communication systems, these two factors are critical for information processing. Image compression and encryption may result in lower restoration quality and performance. Secure-JPEG is an effort to create a compression and encryption technique for digital data. This approach is based on the JPEG compression standard, which is the most extensively used lossy compression scheme. It enhances the usual JPEG compression algorithm to encrypt data during compression. The Secure-JPEG approach encrypts the data while it is compressed, and it may be easily modified to offer near lossless compression. Lossless compression, on the other hand, has a lower compression ratio and is only useful in certain situations. The paper addresses the issue of insufficient security as a result of the usage of a simple random number generator that is not cryptographically safe. The enhanced security characteristics are provided via the Generalized Bernoulli Shift Map, which has a chaotic system with proven security. Several cryptographic tests are used to validate the algorithm's security, and the chaotic system's behavior is also examined.

Keywords:
本文献已被 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号