Abstract
Security in internet of things is very critical. The computer systems that use image acquisition and processing from onboard or remote systems need to secure image data over the internet. Security of multimedia image data transmitted over secured and unsecured communications channel in today’s cyberspace is of paramount consideration due to malicious activities over these channels and there has been a high demand especially for end to end security applications for mobile devices. This is to ensure safety and security as well as privacy to transmitted data and stored data in the clouds. In this paper, we proposed a hybrid approach for securing digital images for devices by engaging lossy compression using 2-D discrete cosine transform and Visual Cryptographic Technique. The DCT was used for the lossy compression process and the visual cryptography was used to encrypt the image for confidentiality. The results showed to be very effective and the implementation was done using MATLAB.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Liu, J., Rao, S.G., Li, B., Zhang, H.: Opportunities and challenges of peer-to-peer internet video broadcast. Proc. IEEE 96(1), 11–24 (2008). doi:10.1109/JPROC.2007.909921
Qureshi, A., Megías, D., Rifà-Pous, H.: Framework for preserving security and privacy in peer-to-peer content distribution systems. Expert Syst. Appl. 42(3), 1391–1408 (2015)
Qian, Z., Zhang, X., Ren, Y.: JPEG encryption for image rescaling in the encrypted domain. J. Vis. Commun. Image Represent. 26, 9–13 (2015)
Li, T., et al.: A new scrambling method based on semi-frequency domain and chaotic system. In: International Conference on Neural Networks and Brain, ICNN&B 2005, pp. 607–610 (2005)
Lian, S., Sun, J., Wang, Z.: A novel image encryption scheme based-on JPEG encoding. In: Proceedings of Eighth International Conference on Information Visualization, 2004, IV 2004, pp. 217–220 (2004)
Chen, T.-S., Chang, C.-C., Hwang, M.-S.: A virtual image cryptosystem based upon vector quantization. IEEE Trans. Image Process. 7, 1485–1488 (1998)
Kester, Q., Koumadi, K.M.: Cryptographie technique for image encryption based on the RGB pixel displacement. In: 2012 IEEE 4th International Conference on Adaptive Science & Technology (ICAST), pp. 74–77, 25–27 October 2012
Zhou, Y., Panetta, K., Agaian, S.: Image encryption using Discrete Parametric Cosine Transform. In: 2009 Conference Record of the Forty-Third Asilomar Conference on Signals, Systems and Computers, pp. 395–399, 1–4 November 2009
Sudharsanan, S.: Shared key encryption of JPEG color images. IEEE Trans. Consum. Electron. 51, 1204–1211 (2005)
Zhou, J., et al.: Security analysis of multimedia encryption schemes based on multiple Huffman table. IEEE Signal Process. Lett. 14, 201–204 (2007)
Wu, C.-P., Kuo, C.C.J.: Design of integrated multimedia compression and encryption systems. IEEE Trans. Multimedia 7, 828–839 (2005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Kester, QA. (2018). A Hybrid Lossy Compression Using 2-D Discrete Cosine Transform and Visual Cryptographic Technique for Security of Multimedia Image Data Communications in Internet of Things. In: Bissyande, T., Sie, O. (eds) e-Infrastructure and e-Services for Developing Countries. AFRICOMM 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 208. Springer, Cham. https://doi.org/10.1007/978-3-319-66742-3_28
Download citation
DOI: https://doi.org/10.1007/978-3-319-66742-3_28
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-66741-6
Online ISBN: 978-3-319-66742-3
eBook Packages: Computer ScienceComputer Science (R0)