TY - JOUR
T1 - A chaos-based joint image compression and encryption scheme using DCT and SHA-1
AU - Yuen, Ching-Hung
AU - Wong, Kwok-Wo
PY - 2011/12
Y1 - 2011/12
N2 - A chaos-based joint image compression and encryption algorithm using discrete cosine transformation (DCT) and Secure Hash Algorithm-1 (SHA-1) is proposed. As SHA-1 is fast and input-sensitive, it is employed to enhance the diffusion effect on image pixels. The DCT coefficients of the whole image are separated into two sequences for mutual interaction. The sequence of low-frequency coefficients, together with the secret keys, generates a message digest to perturb another sequence composed of high-frequency coefficients. The last cipher block of the high-frequency sequence is used as a feedback to control the diffusion and permutation in the low-frequency sequence. Huffman code is chosen as the entropy coding to compress the encrypted chains. Experimental results confirm that our algorithm is efficient and highly sensitive to both the key and the plain-image. © 2011 Elsevier B.V. All rights reserved.
AB - A chaos-based joint image compression and encryption algorithm using discrete cosine transformation (DCT) and Secure Hash Algorithm-1 (SHA-1) is proposed. As SHA-1 is fast and input-sensitive, it is employed to enhance the diffusion effect on image pixels. The DCT coefficients of the whole image are separated into two sequences for mutual interaction. The sequence of low-frequency coefficients, together with the secret keys, generates a message digest to perturb another sequence composed of high-frequency coefficients. The last cipher block of the high-frequency sequence is used as a feedback to control the diffusion and permutation in the low-frequency sequence. Huffman code is chosen as the entropy coding to compress the encrypted chains. Experimental results confirm that our algorithm is efficient and highly sensitive to both the key and the plain-image. © 2011 Elsevier B.V. All rights reserved.
KW - Chaotic map
KW - Image compression
KW - Image encryption
UR - http://www.scopus.com/inward/record.url?scp=80053575623&partnerID=8YFLogxK
UR - https://www.scopus.com/record/pubmetrics.uri?eid=2-s2.0-80053575623&origin=recordpage
U2 - 10.1016/j.asoc.2011.05.050
DO - 10.1016/j.asoc.2011.05.050
M3 - RGC 21 - Publication in refereed journal
SN - 1568-4946
VL - 11
SP - 5092
EP - 5098
JO - Applied Soft Computing Journal
JF - Applied Soft Computing Journal
IS - 8
ER -