A trace-based approach for modeling wireless channel behavior
WSC '96 Proceedings of the 28th conference on Winter simulation
On error preserving encryption algorithms for wireless video transmission
MULTIMEDIA '01 Proceedings of the ninth ACM international conference on Multimedia
JPEG 2000: Image Compression Fundamentals, Standards and Practice
JPEG 2000: Image Compression Fundamentals, Standards and Practice
The Design of Rijndael
Simulation and Analysis of Packet Loss in User Datagram Protocol Transfers
The Journal of Supercomputing
JPEG Still Image Data Compression Standard
JPEG Still Image Data Compression Standard
Multimedia Security Handbook
Image And Video Encryption: From Digital Rights Management To Secured Personal Communication (Advances in Information Security)
Quality measurement for monochrome compressed images in the past 25 years
ICASSP '00 Proceedings of the Acoustics, Speech, and Signal Processing, 2000. on IEEE International Conference - Volume 04
Compression of encrypted visual data
CMS'06 Proceedings of the 10th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Efficient frequency domain selective scrambling of digital video
IEEE Transactions on Multimedia
A format-compliant configurable encryption framework for access control of video
IEEE Transactions on Circuits and Systems for Video Technology
Hi-index | 0.00 |
This paper analyzes the robustness properties of 2D chaotic map image encryption schemes. We investigate the behavior of such block ciphers under different channel error types and find the transmission error robustness to be highly dependent on the type of error occurring and to be very different as compared to the effects when using traditional block ciphers like AES. Additionally, chaotic-mixing-based encryption schemes are shown to be robust to lossy compression as long as the security requirements are not too high. This property facilitates the application of these ciphers in scenarios where lossy compression is applied to encrypted material, which is impossible in case traditional ciphers should be employed. If high security is required chaotic mixing loses its robustness to transmission errors and compression, still the lower computational demand may be an argument in favor of chaotic mixing as compared to traditional ciphers when visual data is to be encrypted.