Comments on “A Novel Image Encryption-Compression Scheme Using Hyper-Chaos and Chinese Remainder Theorem”

Article Preview

Abstract:

In a recent paper by Zhu and Zhao [1], an image encryption-compression scheme (IECS) based on hyper-chaos and Chinese remainder theorem (CRT) is proposed. This comment points out that in [1] there are some errors in two important algorithms and the performance of the proposed IECS is severely overestimated. It is shown that the IECS presented in paper [1] can be easily discredited and ipso facto cannot be used for compressing the plain image with a given compression ratio. Both theoretical analysis and experimental results are given to support our conclusion.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

333-337

Citation:

Online since:

March 2015

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] H.G. Zhu, C. Zhao, X.D. Zhang, A novel image encryption–compression scheme using hyper-chaos and Chinese remainder theorem, Signal Processing: Image Communication 28 (2013) 670–680.

DOI: 10.1016/j.image.2013.02.004

Google Scholar

[2] J. Chen, J. Zhou, K. -W. Wong, A modified chaos-based joint image compression and encryption scheme, IEEE Transactions on Circuits and Systems II. 2(2011) 110–114.

DOI: 10.1109/tcsii.2011.2106316

Google Scholar

[3] C. -P Wu, C. -C. J. Kuo, Design of integrated multimedia compression and encryption systems, IEEE Transactions on Multimedia. 5(2005) 828–839.

DOI: 10.1109/tmm.2005.854469

Google Scholar

[4] Y.S. Zhang, D. Xiao, H. Liu, H. Nan, GLS coding based security solution to JPEG with the structure of aggregated compression and encryption, Commun Nonlinear Sci Numer Simulat. 19 (2014) 1366-1374.

DOI: 10.1016/j.cnsns.2013.09.019

Google Scholar

[5] X. Zhang, Lossy compression and iterative reconstruction for encrypted image, IEEE Transactions on Information Forensics and Security. 1(2011) 53–58.

DOI: 10.1109/tifs.2010.2099114

Google Scholar

[6] C.H. Yuen, K.W. Wong, A chaos-based joint image compression and encryption scheme using DCT and SHA-1, Applied Soft Computing 11 (2011) 5092–5098.

DOI: 10.1016/j.asoc.2011.05.050

Google Scholar