#6165. Image compression–encryption scheme using SPIHT and chaotic systems
September 2026 | publication date |
Proposal available till | 12-05-2025 |
4 total number of authors per manuscript | 0 $ |
The title of the journal is available only for the authors who have already paid for |
|
|
Journal’s subject area: |
Safety, Risk, Reliability and Quality;
Computer Networks and Communications;
Software; |
Places in the authors’ list:
1 place - free (for sale)
2 place - free (for sale)
3 place - free (for sale)
4 place - free (for sale)
Abstract:
The world is moving towards digitization for all forms of data. Images are one of the most used data that contains a lot of information. With the increasing network technology, the sharing of data across the internet has also manifold. Certain images are confidential and require security for storing or transmitting on an insecure communication channel. Digital images usually have highly correlated data where compression can be performed to reduce the load on the transmission channel or storage memory. The paper proposes an algorithm to compress the digital images and encryption is performed on the compressed data to provide security. Compression of the image is performed using the Set partitioning in hierarchical trees algorithm. The compressed image is encrypted using a chaotic sequence generated using the Henon map and the cipher image is scrambled using a permutation table obtained from Piecewise Linear chaotic map. To reduce the computation while generating the chaotic sequence, a base conversion operation is used. The initial parameters of the chaotic systems are generated from the elliptic curve point are shared securely using ElGamal based elliptic curve cryptosystem. Security analyses are conducted along with a comparison with other existing systems. The proposed algorithm is secured against various attacks and outperforms existing techniques concerning various statistical and security aspects of an enciphering algorithm.
Keywords:
Chaotic map; Elliptic curve cryptography; Encryption algorithm; Image compression; Security analysis
Contacts :