In this paper we propose a secure lossy image compression method based on Adaptive Vector Quantization. The proposed approach is founded on the principles of the Entropy-restricted Semantic Security and the logical functioning of the Squeeze Cipher algorithm. It could be useful in several application domains, including Virtual Reality (VR) or Augmented Reality (AR), for its security aspects and for its asymmetrical compression/decompression behavior. Indeed, decompression is more efficient and significantly faster with respect to compression. This aspect could be relevant in many scenarios where images are compressed once and decompressed several times, sometimes on devices with limited hardware capabilities. In the proposed approach a single key is used for the compression and the simultaneous encryption of the input image. Such a key must also be used for decryption (and the associated simultaneous decompression). We report preliminary experimental results achieved by a proof-of-concept implementation of our approach. Such results seem to be quite promising and meaningful for future investigations of the proposed approach.
Secure lossy image compression via adaptive vector quantization
Carpentieri B.
;Palmieri F.;Pizzolante R.
2018-01-01
Abstract
In this paper we propose a secure lossy image compression method based on Adaptive Vector Quantization. The proposed approach is founded on the principles of the Entropy-restricted Semantic Security and the logical functioning of the Squeeze Cipher algorithm. It could be useful in several application domains, including Virtual Reality (VR) or Augmented Reality (AR), for its security aspects and for its asymmetrical compression/decompression behavior. Indeed, decompression is more efficient and significantly faster with respect to compression. This aspect could be relevant in many scenarios where images are compressed once and decompressed several times, sometimes on devices with limited hardware capabilities. In the proposed approach a single key is used for the compression and the simultaneous encryption of the input image. Such a key must also be used for decryption (and the associated simultaneous decompression). We report preliminary experimental results achieved by a proof-of-concept implementation of our approach. Such results seem to be quite promising and meaningful for future investigations of the proposed approach.I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.