Abstract
As digital images are consistently generated and transmitted online, the unauthorized utilization of these images is an increasing concern that has a significant impact on both security and privacy issues; additionally, the representation of digital images requires a large amount of data. In recent years, an image compression scheme has been widely considered; such a scheme saves on hardware storage space and lowers both the transmission time and bandwidth demand for various potential applications. In this article, we review the various approaches taken to consider joint encryption and compression, assessing both their merits and their limitations. In addition to the survey, we also briefly introduce the most interesting and most often utilized applications of image encryption and evaluation metrics, providing an overview of the various kinds of image encryption schemes available. The contribution made by these approaches is then summarized and compared, offering a consideration of the different technical perspectives. Lastly, we highlight the recent challenges and some potential research directions that could fill the gaps in these domains for both researchers and developers.
- [1] . 2021. Robust high-capacity watermarking over online social network shared images. IEEE Transactions on Circuits and Systems for Video Technology 31, 3 (2021), 1208–1221.Google Scholar
Cross Ref
- [2] . 2019. A novel information hiding scheme based on social networking site viewers’ public comments. Journal of Information Security and Applications 47 (2019), 275–283.Google Scholar
Digital Library
- [3] . 2021. Wild and interesting Facebook statistics and facts. Retrieved from https://kinsta.com/blog/facebook-statistics/.Google Scholar
- [4] . 2021. Instagram by the numbers: Stats, demographics & fun facts. Retrieved from https://www.omnicoreagency.com/instagram-statistics/.Google Scholar
- [5] . 2021. Flickr statistics, user count and facts. Retrieved from https://expandedramblings.com/index.php/flickr-stats/.Google Scholar
- [6] Quicksprout. 2019. How to increase Twitter engagement by 324%. Retrieved from https://www.quicksprout.com/twitter-engagement/.Google Scholar
- [7] . 2018. Advances in security and privacy of multimedia big data in mobile and cloud computing. Multimedia Tools and Applications 77, 7 (2018), 9203–9208.Google Scholar
Digital Library
- [8] . 2001. Authenticity and integrity of digital mammography images. IEEE Transactions on Medical Imaging 20, 8 (2001), 784–791.Google Scholar
Cross Ref
- [9] . 2020. Joint watermarking-encryption-JPEG-LS for medical image reliability control in encrypted and compressed domains. IEEE Transactions on Information Forensics and Security 15 (2020), 2556–2569.Google Scholar
Cross Ref
- [10] . 2019. Handbook of Multimedia Information Security: Techniques and Applications. Springer International Publishing.Google Scholar
Cross Ref
- [11] . 2006. Robust and secure image hashing. IEEE Transactions on Information Forensics and Security 1, 2 (2006), 215–230.Google Scholar
Digital Library
- [12] . 2015. Applied Cryptography: Protocols, Algorithms and Source Code in C. John Wiley & Sons.Google Scholar
- [13] . 2021. Image encryption based on a single-round dictionary and chaotic sequences in cloud computing. Concurrency and Computation: Practice and Experience 33, 7 (2021), 1.Google Scholar
Cross Ref
- [14] . 2019. A remote-sensing image encryption scheme using DNA bases probability and two-dimensional logistic map. IEEE Access 7 (2019), 65450–65459.Google Scholar
Cross Ref
- [15] . 2016. Image encryption based on compressive sensing and scrambled index for secure multimedia transmission. ACM Transactions on Multimedia Computing, Communications, and Applications 12, 4 (2016), 1–22.Google Scholar
Digital Library
- [16] 2021. Cy: Chaotic yolo for user intended image encryption and sharing in social media. Information Sciences 542 (2021), 212–227.Google Scholar
Cross Ref
- [17] . 2019. Medical image encryption using fractional discrete cosine transform with chaotic function. Medical & Biological Engineering & Computing 57 (2019), 2517–2533.Google Scholar
Cross Ref
- [18] . 2018. Secure surveillance framework for IoT systems using probabilistic image encryption. IEEE Transactions on Industrial Informatics 14, 8 (2018), 3679–3689.Google Scholar
Cross Ref
- [19] . 2000. Image encryption for secure internet multimedia applications. IEEE Transactions on Consumer Electronics 46, 3 (2000), 395–403.Google Scholar
Digital Library
- [20] . 2018. Depreciating motivation and empirical security analysis of chaos-based image and video encryption. IEEE Transactions on Information Forensics and Security 13, 9 (2018), 2137–2150.Google Scholar
Cross Ref
- [21] . 2019. A pixel permutation based image encryption technique using chaotic map. Multimedia Tools and Applications 78, 19 (2019), 27569–27590.Google Scholar
Digital Library
- [22] . 2020. A novel plaintext-related image encryption scheme based on chaotic system and pixel permutation. IEEE Access 8 (2020), 22082–22093.Google Scholar
Cross Ref
- [23] . 2019. Chaotic encryption algorithm with key controlled neural networks for intelligent transportation systems. IEEE Access 7 (2019), 158697–158709.Google Scholar
Cross Ref
- [24] . 2016. Cryptosystem for securing image encryption using structured phase masks in fresnel wavelet transform domain. 3D Research 7, 34 (2016), 1--18.Google Scholar
- [25] . 2020. Image encryption using dynamic S-box substitution in the wavelet domain. Wireless Personal Communications 115 (2020). 2243–2268.Google Scholar
Digital Library
- [26] . 2015. Encryption of medical images based on the cosine number transform. Signal Processing: Image Communication 35 (2015), 1–8.Google Scholar
Digital Library
- [27] . 2021. A novel double-image encryption algorithm based on rossler hyperchaotic system and compressive sensing. IEEE Access 9 (2021), 41704–41716.Google Scholar
Cross Ref
- [28] . 2020. Novel image compression–encryption hybrid scheme based on DNA encoding and compressive sensing. Applied Physics B 126, 3 (2020), 45.Google Scholar
Cross Ref
- [29] . 2015. On known-plaintext attacks to a compressed sensing-based encryption: A quantitative analysis. IEEE Transactions on Information Forensics and Security 10, 10 (2015), 2182–2195.Google Scholar
Digital Library
- [30] . 2021. Optical image encryption using different twiddle factors in the butterfly algorithm of fast Fourier transform. Optics Communications 485 (2021), 126707.Google Scholar
Cross Ref
- [31] . 2018. Optical image encryption using gamma distribution phase masks in the gyrator domain. Journal of the European Optical Society – Rapid Publications 14, 28 (2018), 1--10.Google Scholar
- [32] . 2020. Color image compression and encryption scheme based on compressive sensing and double random encryption strategy. Signal Processing 176 (2020), 107684.Google Scholar
Cross Ref
- [33] . 2016. A joint color image encryption and compression scheme based on hyper-chaotic system. Nonlinear Dynamics 84, 4 (2016), 2333–2356.Google Scholar
Cross Ref
- [34] . 2021. A survey on data compression techniques: From the perspective of data quality, coding schemes, data type and applications. Journal of King Saud University - Computer and Information Sciences 33, 2 (2021), 119–140.Google Scholar
Cross Ref
- [35] . 2018. Image compression techniques: A survey in lossless and lossy algorithms. Neurocomputing 300 (2018), 44–69.Google Scholar
Cross Ref
- [36] . 2016. Image compression–encryption scheme based on hyper-chaotic system and 2D compressive sensing. Optics & Laser Technology 82 (2016), 121–133.Google Scholar
- [37] . 2021. A comprehensive analysis on image encryption and compression techniques with the assessment of performance evaluation metrics. SN Computer Science 2, 29 (2021), 1--12.Google Scholar
- [38] . 2012. Remote-sensing image encryption in hybrid domain. Optics Communications 285, 7 (2012), 1736–1743.Google Scholar
Cross Ref
- [39] . 2019. Chaotic image encryption algorithm using frequency-domain DNA encoding. IET Image Processing 13, 9 (2019), 1535–1539.Google Scholar
Cross Ref
- [40] . 2016. A review of compressive sensing in information security field. IEEE Access 4 (2016), 2507–2519.Google Scholar
Cross Ref
- [41] . 2013. Color image encryption based on the affine transform and gyrator transform. Optics and Lasers in Engineering 51, 6 (2013), 768–775.Google Scholar
Cross Ref
- [42] . 2011. NPCR and UACI randomness tests for image encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications 1, 2 (2011), 31–38.Google Scholar
- [43] . 2021. Exploiting 2D compressed sensing and information entropy for secure color image compression and encryption. Neural Computing & Applications 33 (2021), 12845–12867.Google Scholar
Digital Library
- [44] . 2015. Optical asymmetric image encryption using gyrator wavelet transform. Optics Communications 354 (2015), 344–352.Google Scholar
Cross Ref
- [45] . 2016. Image encryption based on independent component analysis and Arnold's cat map. Egyptian Informatics Journal 17, 1 (2016), 139–146.Google Scholar
Cross Ref
- [46] . 2014. A parallel block-based encryption schema for digital images using reversible cellular automata. Engineering Science and Technology, an International Journal 17, 2 (2014), 85–94.Google Scholar
Cross Ref
- [47] 2015. A protocol to encrypt digital images using chaotic maps and memory cellular automata. Logic Journal of the IGPL 23, 3 (2015), 485–494.Google Scholar
Cross Ref
- [48] . 2017. An asymmetric color image encryption method by using deduced gyrator transform. Optics and Lasers in Engineering 89 (2017), 72–79.Google Scholar
Cross Ref
- [49] . 2020. Two-stage data encryption using chaotic neural networks. Journal of Intelligent & Fuzzy Systems 38, 3 (2020), 2561–2568.Google Scholar
Digital Library
- [50] . 2015. Image compression and encryption scheme using fractal dictionary and Julia set. IET Image Processing 9, 3 (2015), 173–183.Google Scholar
Cross Ref
- [51] . 2017. A scrambling framework for block transform compressed image. Multimedia Tools and Applications 76, 5 (2017), 6709–6729.Google Scholar
Digital Library
- [52] . 2020. A compressive sensing based image encryption and compression algorithm with identity authentication and blind signcryption. IEEE Access 8 (2020), 211676–211690.Google Scholar
Cross Ref
- [53] . 2020. Lossless image compression-encryption algorithm based on BP neural network and chaotic system. Multimedia Tools and Applications 79, 27 (2020), 19963–19992.Google Scholar
Digital Library
- [54] . 2020. A dynamic triple-image encryption scheme based on chaos, S-Box and image compressing. IEEE Access 8 (2020), 210382–210399.Google Scholar
Cross Ref
- [55] . 2019. SVD-based image compression, encryption, and identity authentication algorithm on cloud. IET Image Processing 13, 12 (2019), 2224–2232.Google Scholar
Cross Ref
- [56] . 2021. Image encryption algorithm for crowd data based on a new hyperchaotic system and Bernstein polynomial. IET Image Processing 15, 14 (2021), 1–20.Google Scholar
- [57] . 2019. Color image compression-encryption algorithm based on fractional-order memristor chaotic circuit. IEEE Access 7 (2019), 58751–58763.Google Scholar
Cross Ref
- [58] . 2021. An image compression and encryption algorithm based on the fractional-order simplest chaotic circuit. IEEE Access 9 (2021), 22141–22155.Google Scholar
Cross Ref
- [59] . 2020. Compression-then-encryption-based secure watermarking technique for smart healthcare system. IEEE MultiMedia 27, 4 (2020), 133–143.Google Scholar
Digital Library
- [60] . 2014. Designing an efficient image encryption-then-compression system via prediction error clustering and random permutation. IEEE Transactions on Information Forensics and Security 9, 1 (2014), 39–50.Google Scholar
Digital Library
- [61] . 2014. Compressing encrypted images with auxiliary information. IEEE Transactions on Multimedia 16, 5 (2014), 1327–1336.Google Scholar
Cross Ref
- [62] . 2015. A new encryption-then-compression algorithm using the rate–distortion optimization. Signal Processing: Image Communication 39 (2015), 141–150.Google Scholar
Digital Library
- [63] . 2015. An encryption-then-compression system for JPEG/Motion JPEG standard. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E98, 11 (2015), 2238–2245.Google Scholar
Cross Ref
- [64] . 2017. An efficient encryption-then-compression technique for encrypted images using SVD. Digital Signal Processing 60 (2017), 81–89.Google Scholar
Digital Library
- [65] . 2018. A novel image compression-encryption scheme based on chaos and compression sensing. IEEE Access 6 (2018), 67095–67107.Google Scholar
Cross Ref
- [66] . 2019. Encryption-then-compression systems using grayscale-based image encryption for JPEG images. IEEE Transactions on Information Forensics and Security 14, 6 (2019), 1515–1525.Google Scholar
Cross Ref
- [67] . 2019. Flexible lossy compression for selective encrypted image with image inpainting. IEEE Transactions on Circuits and Systems for Video Technology 29, 11 (2019), 3341–3355.Google Scholar
Digital Library
- [68] . 2020. A new MRF-based lossy compression for encrypted binary images. IEEE Access 8 (2020), 11328–11341.Google Scholar
Cross Ref
- [69] . 2020. Robust coding of encrypted images via 2D compressed sensing. IEEE Transactions on Multimedia 23 (2020), 2656–267.Google Scholar
Digital Library
- [70] . 2021. Secure image communication through adaptive deer hunting optimization based vector quantization coding of perceptually encrypted images. Wireless Personal Communications 116, 3 (2021), 2239–2260.Google Scholar
Digital Library
- [71] . 2020. Encryption-then-compression-based copyright protection scheme for E-Governance. IT Professional 22, 2 (2020), 45–52.Google Scholar
Cross Ref
- [72] . 2021. Joint encryption and compression-based watermarking technique for security of digital documents. ACM Transactions on Internet Technology 21, 1 (2021), 1–20Google Scholar
Digital Library
- [73] . 2021. Blockchain-assisted secure image transmission and diagnosis model on Internet of medical things environment. Personal and Ubiquitous Computing (2021), 1--11.Google Scholar
Cross Ref
- [74] . 2015. Compression and encryption for remote sensing image using chaotic system. Security and Communication Networks 8, 18 (2015), 3659–3666.Google Scholar
Digital Library
- [75] . 2016. Simultaneous encryption and compression of medical images based on optimized tensor compressed sensing with 3D Lorenz. BioMedical Engineering OnLine 15, 1 (2016), 118.Google Scholar
Cross Ref
- [76] . 2017. Joint image compression and encryption based on order-8 alternating transforms. Journal of Visual Communication and Image Representation 44 (2017), 61–71.Google Scholar
Digital Library
- [77] . 2017. A novel image compression–encryption hybrid algorithm based on the analysis sparse representation. Optics Communications 392 (2017), 223–233.Google Scholar
Cross Ref
- [78] . 2018. A content-adaptive joint image compression and encryption scheme. IEEE Transactions on Multimedia 20, 8 (2018), 1960–1972.Google Scholar
Cross Ref
- [79] . 2018. Compressive sensing based image compression-encryption using novel 1D-chaotic map. Multimedia Tools and Applications 77, 15 (2018), 19209–19234.Google Scholar
Digital Library
- [80] . 2018. Joint encryption and compression of 3D images based on tensor compressive sensing with non-autonomous 3D chaotic system. Multimedia Tools and Applications 77, 2 (2018), 1715–1734.Google Scholar
Digital Library
- [81] . 2019. Image compression and encryption using Chinese remainder theorem. Multimedia Tools and Applications 78, 12 (2019), 16727–16753.Google Scholar
Digital Library
- [82] . 2020. Image compression and encryption scheme based on compressive sensing and Fourier transform. IEEE Access 8 (2020), 40838–40849.Google Scholar
Cross Ref
- [83] . 2021. Image compression-encryption method based on two-dimensional sparse recovery and chaotic system. Scientific Reports 11, 1 (2021).Google Scholar
Cross Ref
- [84] . 2014. A content security protection scheme in jpeg compressed domain. Journal of Visual Communication and Image Representation 25, 5 (2014), 805–813.Google Scholar
Cross Ref
- [85] . 2007. New approaches to encryption and steganography for digital videos. Multimedia Systems 13, 3 (2007), 191–204.Google Scholar
Digital Library
- [86] . 2019. A chaotic image encryption algorithm based on 3-d bit-plane permutation. Neural Computing & Applications 31, 11 (2019), 7111–7130.Google Scholar
Digital Library
- [87] . 2009. A pixel-based scrambling scheme for digital medical images protection. Journal of Network and Computer Applications 32, 4 (2009), 788–794.Google Scholar
Digital Library
- [88] . 2013. A novel image encryption-compression scheme using hyper-chaos and Chinese remainder theorem. Signal Processing: Image Communication 28, 6 (2013), 670–680.Google Scholar
Cross Ref
- [89] . 2013. A new algorithm of the combination of image compression and encryption technology based on cross chaotic map. Nonlinear Dynamics, 72, 1 (2013), 229–241.Google Scholar
Cross Ref
Index Terms
Towards Integrating Image Encryption with Compression: A Survey
Recommendations
An Improved Encryption–Compression-based Algorithm for Securing Digital Images
Nowadays, there is an increasing tendency to upload images to online platforms acting as information carriers for various applications. Unfortunately, the unauthorized utilization of such images is a serious concern that has significantly impacted ...
Simultaneous Encryption/Compression of Images Using Alpha Rooting
DCC '08: Proceedings of the Data Compression ConferenceSignificant work has been done in the areas of image encryption and compression as two independent problems, yet the two areas are strongly interleaved and should be considered simultaneously. Consider that current practice in image processing generally ...
A public key-based encryption and signature verification model for secured image transmission in network
Image transmission is a challenging task due to the large file size and the security issues. Many existing systems on medical image transmission use symmetric key cryptography where the key is shared to multiple recipients leading to security leakage. ...






Comments