Perceptual encryption (PE) hides the identifiable information of an image in such a way that its intrinsic characteristics remain intact. This recognizable perceptual quality can be used to enable computation in the encryption domain. A class of PE algorithms based on block-level processing has recently gained popularity for their ability to generate JPEG-compressible cipher images. A tradeoff in these methods, however, is between the security efficiency and compression savings due to the chosen block size. Several methods (such as the processing of each color component independently, image representation, and sub-block-level processing) have been proposed to effectively manage this tradeoff. The current study adapts these assorted practices into a uniform framework to provide a fair comparison of their results. Specifically, their compression quality is investigated under various design parameters, such as the choice of colorspace, image representation, chroma subsampling, quantization tables, and block size. Our analyses have shown that at best the PE methods introduce a decrease of 6% and 3% in the JPEG compression performance with and without chroma subsampling, respectively. Additionally, their encryption quality is quantified in terms of several statistical analyses. The simulation results show that block-based PE methods exhibit several favorable properties for the encryption-then-compression schemes. Nonetheless, to avoid any pitfalls, their principal design should be carefully considered in the context of the applications for which we outlined possible future research directions.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC10145250 | PMC |
http://dx.doi.org/10.3390/s23084057 | DOI Listing |
Sci Rep
September 2024
Electronics and Communications Engineering Department, Faculty of Engineering, Canadian International College (CIC), Giza, Egypt.
The development of innovative methods for concealing critical data in multimedia files has exploded in information security in recent years. Cryptography and steganography cannot be used alone to protect data; rather, they can be combined and used in a single system. Audio steganography is among the most important information security techniques.
View Article and Find Full Text PDFSensors (Basel)
April 2023
Department of Computer Engineering, Chosun University, Gwangju 61452, Republic of Korea.
Perceptual encryption (PE) hides the identifiable information of an image in such a way that its intrinsic characteristics remain intact. This recognizable perceptual quality can be used to enable computation in the encryption domain. A class of PE algorithms based on block-level processing has recently gained popularity for their ability to generate JPEG-compressible cipher images.
View Article and Find Full Text PDFScience
December 2022
Department of Mechanical and Automation Engineering, The Chinese University of Hong Kong, Shatin, Hong Kong.
A major challenge in nanotechnology is the fabrication of complex three-dimensional (3D) structures with desired materials. We present a strategy for fabricating arbitrary 3D nanostructures with a library of materials including metals, metal alloys, 2D materials, oxides, diamond, upconversion materials, semiconductors, polymers, biomaterials, molecular crystals, and inks. Specifically, hydrogels patterned by femtosecond light sheets are used as templates that allow for direct assembly of materials to form designed nanostructures.
View Article and Find Full Text PDFSensors (Basel)
October 2022
Department of Computer Engineering, Chosun University, Gwangju 61452, Korea.
Perceptual encryption (PE) of images protects visual information while retaining the intrinsic properties necessary to enable computation in the encryption domain. Block-based PE produces JPEG-compliant images with almost the same compression savings as that of the plain images. The methods represent an input color image as a pseudo grayscale image to benefit from a smaller block size.
View Article and Find Full Text PDFComput Intell Neurosci
October 2022
Wachemo University, Hosanna, Ethiopia.
The Internet of Things (IoT) is legitimately growing quicker. The operators have already started setting up a diligent infrastructure for these gadgets. Various technologies need to be developed for this type of sensor, including enterprise safety initiatives.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!