In this paper we propose a secure lossy image compression method based on Adaptive Vector Quantization. The proposed approach is founded on the principles of the Entropy-restricted Semantic Security and the logical functioning of the Squeeze Cipher algorithm. It could be useful in several application domains, including Virtual Reality (VR) or Augmented Reality (AR), for its security aspects and for its asymmetrical compression/decompression behavior. Indeed, decompression is more efficient and significantly faster with respect to compression. This aspect could be relevant in many scenarios where images are compressed once and decompressed several times, sometimes on devices with limited hardware capabilities. In the proposed approach a single key is used for the compression and the simultaneous encryption of the input image. Such a key must also be used for decryption (and the associated simultaneous decompression). We report preliminary experimental results achieved by a proof-of-concept implementation of our approach. Such results seem to be quite promising and meaningful for future investigations of the proposed approach.

Secure lossy image compression via adaptive vector quantization

Carpentieri B.
;
Palmieri F.;Pizzolante R.
2018-01-01

Abstract

In this paper we propose a secure lossy image compression method based on Adaptive Vector Quantization. The proposed approach is founded on the principles of the Entropy-restricted Semantic Security and the logical functioning of the Squeeze Cipher algorithm. It could be useful in several application domains, including Virtual Reality (VR) or Augmented Reality (AR), for its security aspects and for its asymmetrical compression/decompression behavior. Indeed, decompression is more efficient and significantly faster with respect to compression. This aspect could be relevant in many scenarios where images are compressed once and decompressed several times, sometimes on devices with limited hardware capabilities. In the proposed approach a single key is used for the compression and the simultaneous encryption of the input image. Such a key must also be used for decryption (and the associated simultaneous decompression). We report preliminary experimental results achieved by a proof-of-concept implementation of our approach. Such results seem to be quite promising and meaningful for future investigations of the proposed approach.
2018
978-3-319-95269-7
978-3-319-95270-3
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11386/4758588
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 1
  • ???jsp.display-item.citation.isi??? 0
social impact