Fractal-Based Secured Multiple-Image Compression and Distribution

Author(s):  
Hsuan T. Chang ◽  
Chih-Chung Hsu

This chapter introduces a pioneer concept in which multiple images are simultaneously considered in the compression and secured distribution frameworks. We have proposed the so-called fractal mating coding scheme to successfully implement the joint image compression and encryption concept through a novel design in the domain pool construction. With the exploration of the intra- and inter-image similarity among multiple images, not only the coding performance can be improved, but also the secured image distribution purpose can be achieved. The authors hope that the revealed fractal-based ideas in this chapter will provide a different perspective for the image compression and distribution framework.

2021 ◽  
Vol 17 (10) ◽  
pp. 630-635
Author(s):  
Jinqing Li ◽  
Yaohui Sheng ◽  
Xiaoqiang Di ◽  
Yining Mu

2021 ◽  
Author(s):  
A.H.M. Zadidul Karim ◽  
Md. Sazal Miah ◽  
Md Abdullah Al Mahmud ◽  
Muhammad Towhidur Rahman

Entropy ◽  
2018 ◽  
Vol 20 (10) ◽  
pp. 801 ◽  
Author(s):  
A. Karawia

To enhance the encryption proficiency and encourage the protected transmission of multiple images, the current work introduces an encryption algorithm for multiple images using the combination of mixed image elements (MIES) and a two-dimensional economic map. Firstly, the original images are grouped into one big image that is split into many pure image elements (PIES); secondly, the logistic map is used to shuffle the PIES; thirdly, it is confused with the sequence produced by the two-dimensional economic map to get MIES; finally, the MIES are gathered into a big encrypted image that is split into many images of the same size as the original images. The proposed algorithm includes a huge number key size space, and this makes the algorithm secure against hackers. Even more, the encryption results obtained by the proposed algorithm outperform existing algorithms in the literature. A comparison between the proposed algorithm and similar algorithms is made. The analysis of the experimental results and the proposed algorithm shows that the proposed algorithm is efficient and secure.


Sign in / Sign up

Export Citation Format

Share Document