Computer Science ›› 2013, Vol. 40 ›› Issue (9): 141-146.

Previous Articles     Next Articles

Secure Palmprint Image Coding Algorithm for JPEG-LS

LI Heng-jian,WANG Lian-hai and ZHANG Jia-shu   

  • Online:2018-11-16 Published:2018-11-16

Abstract: Based on forward-feedback nonlinear dynamic filter(FFNDF),a secure JPEG-LS coder was proposed,and then the proposed algorithm was employed in palmprint image.According to the characteristics of JPEG-LS,FFNDF was employed to generate chaotic stream cipher and then encrypt the coded stream during in the regular mode and run mode.The security of proposed scheme was also analyzed and some other compression and encryption algorithms were also compared.The experimental results show that the proposed palmprint image encryption algorithm has the incomprehensible nature of the encryption with high efficiency and security,as well as low-complexity and no affect on image compression performance.

Key words: Image lossless compression,Image encryption,Chaotic encryption,JPEG-LS

[1] 岳峰,左旺孟,张大鹏.掌纹识别算法综述[J].自动化学报,2010,36(3):353-365
[2] Adams K,David Z,Mohamed K.A survey of palmprint recognition[J].Pattern Recognition,2009,42(7):1408-1418
[3] Grangetto M,Magli E,Olmo G.Multimedia selective encryption by means of randomized arithmetic coding[J].IEEE Trans.Multimedia,2006,8(5):905-917
[4] Massoudi A,Lefebvre F,Vleeschouwer C D,et al.Overview on Selective Encryption of Image and Video:Challenges and Perspectives[J].EURASIP Journal on Information Security,2008,179290
[5] Yuen C H,Wong K W.A chaos-based joint image compression and encryption scheme using DCT and SHA-1[J].Applied Soft Computing,2011,11(8):5092-5098
[6] Kocarev L.Chaos-based cryptography:a brief overview[J].IEEE Circuits and Systems Magazine,2001,1(3):6-21
[7] Wong K W,Yuen C H.Embedding Compression in Chaos-based Cryptography IEEE trans[J].On circuits and systems-II:Express BRIEFS,2008,55(11):1193-1197
[8] Li H J,Zhang J S.Embedding arithmetic coding in Chaos-based cryptography[J].Chinese Physics B,2010,9(5):1-9
[9] Wong K W,Lin Q Z,Chen J Y.Simultaneous arithmetic coding and encryption using chaotic maps[J].IEEE Transactions on Circuits and Systems II:Express Briefs,2010,57(2):146-150
[10] Grangetto M,Torino E M,Olmo G.Multimedia Selective En-cryption by Means of Randomized Arithmetic Coding[J].IEEE Transactions on Multimedia,2006,89(5):905-917
[11] Li H J,Wang L H,Zhao S,et al.Research on Lossless Compression Algorithms of Low Resolution Palmprint Images[J].Research Journal of Applied Sciences,Engineering and Technology,2012,4(14):2072-2081
[12] Zhang J S,Wang X M,Zhang W F.Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter[J].Phy-sics Letters A,2007,2(5/6):439-448
[13] Weinberger M,Seroussi G,Sapiro G.Lossless image compres-sion algorithm:Principles and standardization into JPEG-LS[J].IEEE Transactions on Image Processing,2000,9(8):1309-1324
[14] http://www4.comp.polyu.edu.hk/~biometrics/
[15] Zhang D,Kong W K,You J,et al.On-line palmprint identification[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2003,5:1041-1050
[16] Mi B,Liao X F,Chen Y.A novel chaotic encryption schemebased on arithmetic coding Chaos[J].Solitons and Fractals,2008,8(5):1523-1531
[17] Li H J,Zhang J S.A secure and efficient entropy coding based on arithmetic coding[J].Communications in Nonlinear Science and Numerical Simulations,2009,4(12):4304-4318
[18] Baptista M S.Cryptography with chaos[J].Physics Letters A,1998,0(1/2):50-54

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!