Skip to main content

A Hybrid Lossy Compression Using 2-D Discrete Cosine Transform and Visual Cryptographic Technique for Security of Multimedia Image Data Communications in Internet of Things

  • Conference paper
  • First Online:
e-Infrastructure and e-Services for Developing Countries (AFRICOMM 2016)

Abstract

Security in internet of things is very critical. The computer systems that use image acquisition and processing from onboard or remote systems need to secure image data over the internet. Security of multimedia image data transmitted over secured and unsecured communications channel in today’s cyberspace is of paramount consideration due to malicious activities over these channels and there has been a high demand especially for end to end security applications for mobile devices. This is to ensure safety and security as well as privacy to transmitted data and stored data in the clouds. In this paper, we proposed a hybrid approach for securing digital images for devices by engaging lossy compression using 2-D discrete cosine transform and Visual Cryptographic Technique. The DCT was used for the lossy compression process and the visual cryptography was used to encrypt the image for confidentiality. The results showed to be very effective and the implementation was done using MATLAB.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Liu, J., Rao, S.G., Li, B., Zhang, H.: Opportunities and challenges of peer-to-peer internet video broadcast. Proc. IEEE 96(1), 11–24 (2008). doi:10.1109/JPROC.2007.909921

    Article  Google Scholar 

  2. Qureshi, A., Megías, D., Rifà-Pous, H.: Framework for preserving security and privacy in peer-to-peer content distribution systems. Expert Syst. Appl. 42(3), 1391–1408 (2015)

    Article  Google Scholar 

  3. Qian, Z., Zhang, X., Ren, Y.: JPEG encryption for image rescaling in the encrypted domain. J. Vis. Commun. Image Represent. 26, 9–13 (2015)

    Article  Google Scholar 

  4. Li, T., et al.: A new scrambling method based on semi-frequency domain and chaotic system. In: International Conference on Neural Networks and Brain, ICNN&B 2005, pp. 607–610 (2005)

    Google Scholar 

  5. Lian, S., Sun, J., Wang, Z.: A novel image encryption scheme based-on JPEG encoding. In: Proceedings of Eighth International Conference on Information Visualization, 2004, IV 2004, pp. 217–220 (2004)

    Google Scholar 

  6. Chen, T.-S., Chang, C.-C., Hwang, M.-S.: A virtual image cryptosystem based upon vector quantization. IEEE Trans. Image Process. 7, 1485–1488 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  7. Kester, Q., Koumadi, K.M.: Cryptographie technique for image encryption based on the RGB pixel displacement. In: 2012 IEEE 4th International Conference on Adaptive Science & Technology (ICAST), pp. 74–77, 25–27 October 2012

    Google Scholar 

  8. Zhou, Y., Panetta, K., Agaian, S.: Image encryption using Discrete Parametric Cosine Transform. In: 2009 Conference Record of the Forty-Third Asilomar Conference on Signals, Systems and Computers, pp. 395–399, 1–4 November 2009

    Google Scholar 

  9. Sudharsanan, S.: Shared key encryption of JPEG color images. IEEE Trans. Consum. Electron. 51, 1204–1211 (2005)

    Article  Google Scholar 

  10. Zhou, J., et al.: Security analysis of multimedia encryption schemes based on multiple Huffman table. IEEE Signal Process. Lett. 14, 201–204 (2007)

    Article  Google Scholar 

  11. Wu, C.-P., Kuo, C.C.J.: Design of integrated multimedia compression and encryption systems. IEEE Trans. Multimedia 7, 828–839 (2005)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Quist-Aphetsi Kester .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Kester, QA. (2018). A Hybrid Lossy Compression Using 2-D Discrete Cosine Transform and Visual Cryptographic Technique for Security of Multimedia Image Data Communications in Internet of Things. In: Bissyande, T., Sie, O. (eds) e-Infrastructure and e-Services for Developing Countries. AFRICOMM 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 208. Springer, Cham. https://doi.org/10.1007/978-3-319-66742-3_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-66742-3_28

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-66741-6

  • Online ISBN: 978-3-319-66742-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics