Review of Image Compression and Encryption Techniques

Abstract

In line with a growing need for data and information transmission in a safe and quick manner, researches on image protection and security through a combination of cryptographic and compression techniques begin to take form. The combination of these two methods may include into three categories based on their process sequences. The first category, i.e. cryptographic technique followed by compression method, focuses more on image security than the reduction of a size of data. The second combination, compression technique followed by the cryptographic method, has an advantage where the compression technique can be lossy, lossless, or combination of both. The third category, i.e. compression and cryptographic technologies in a single process either partially or in the form of compressive sensing(CS) provides a good data safety assurance with such a low computational complexity that it is eligible for enhancing the efficiency and security of data/information transmission.

Authors and Affiliations

Emy Setyaningsih, Retantyo Wardoyo

Keywords

Related Articles

Credibility Evaluation of Online Distance Education Websites

Web credibility is becoming a significant factor in increasing user satisfaction, trust, and loyalty. Web credibility is particularly important for people who cannot visit an institution for one reason or other and mostl...

Automated Imaging System for Pigmented Skin Lesion Diagnosis

Through the study of pigmented skin lesions risk factors, the appearance of malignant melanoma turns the anomalous occurrence of these lesions to annoying sign. The difficulty of differentiation between malignant melanom...

Characterization of Dynamic Bayesian Network-The Dynamic Bayesian Network as temporal network

In this report, we will be interested at Dynamic Bayesian Network (DBNs) as a model that tries to incorporate temporal dimension with uncertainty. We start with basics of DBN where we especially focus in Inference and L...

Design of Android-Based Remote Patient Monitoring System

Efficient real-time monitoring systems for Patients with critical health condition have been always helpful for making timely decisions to save the lives. In such systems, the useful monitored factors include SPO2 (Oxyge...

Intelligent Pedestrian Detection using Optical Flow and HOG

Pedestrian detection is an important aspect of autonomous vehicle driving as recognizing pedestrians helps in reducing accidents between the vehicles and the pedestrians. In literature, feature based approaches have been...

Download PDF file
  • EP ID EP249107
  • DOI 10.14569/IJACSA.2017.080212
  • Views 76
  • Downloads 0

How To Cite

Emy Setyaningsih, Retantyo Wardoyo (2017). Review of Image Compression and Encryption Techniques. International Journal of Advanced Computer Science & Applications, 8(2), 83-94. https://europub.co.uk/articles/-A-249107