Skip to main navigation Skip to search Skip to main content

A chaotic-neural-network-based encryption algorithm for JPEG2000 encoded images

Shiguo Lian*, Guanrong Chen, Albert Cheung, Zhiquan Wang

*Corresponding author for this work

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

Abstract

In this paper, a cipher based-on chaotic neural network is proposed, which is used to encrypt JPEG2000 encoded images. During the image encoding process, some sensitive bitstreams are selected from different subbands, bit-planes or encoding-passes, and then are completely encrypted. The algorithm has high security with low cost; it can keep the original file format and compression ratio unchanged, and can support direct operations such as image browsing and bit-rate control. These properties make the cipher very suitable for such real-time encryption applications as image transmission, web imaging, mobile and wireless multimedia communication. © Springer-Verlag 2004.
Original languageEnglish
Title of host publicationAdvances in Neural Networks - ISNN 2004
Subtitle of host publicationInternational Symposium on Neural Networks, Dalian, China, August 19-21, 2004, Proceedings, Part II
EditorsFu-Liang Yin, Jun Wang, Chengan Guo
Place of PublicationBerlin, Heidelberg
PublisherSpringer 
Pages627-632
ISBN (Electronic)978-3-540-28648-6
ISBN (Print)978-3-540-22843-1
DOIs
Publication statusPublished - 2004
EventInternational Symposium on Neural Networks (ISNN 2004) - Dalian, China
Duration: 19 Aug 200421 Aug 2004

Publication series

NameLecture Notes in Computer Science
Volume3174
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceInternational Symposium on Neural Networks (ISNN 2004)
Abbreviated titleISNN
PlaceChina
CityDalian
Period19/08/0421/08/04

Fingerprint

Dive into the research topics of 'A chaotic-neural-network-based encryption algorithm for JPEG2000 encoded images'. Together they form a unique fingerprint.

Cite this