Affiliation:
1. National Institute of Technology Patna, India
Abstract
As digital images are consistently generated and transmitted online, the unauthorized utilization of these images is an increasing concern that has a significant impact on both security and privacy issues; additionally, the representation of digital images requires a large amount of data. In recent years, an image compression scheme has been widely considered; such a scheme saves on hardware storage space and lowers both the transmission time and bandwidth demand for various potential applications. In this article, we review the various approaches taken to consider joint encryption and compression, assessing both their merits and their limitations. In addition to the survey, we also briefly introduce the most interesting and most often utilized applications of image encryption and evaluation metrics, providing an overview of the various kinds of image encryption schemes available. The contribution made by these approaches is then summarized and compared, offering a consideration of the different technical perspectives. Lastly, we highlight the recent challenges and some potential research directions that could fill the gaps in these domains for both researchers and developers.
Publisher
Association for Computing Machinery (ACM)
Subject
Computer Networks and Communications,Hardware and Architecture
Reference89 articles.
1. Robust High-Capacity Watermarking Over Online Social Network Shared Images
2. A novel information hiding scheme based on social networking site viewers’ public comments
3. M. Osman. 2021. Wild and interesting Facebook statistics and facts. Retrieved from https://kinsta.com/blog/facebook-statistics/.
4. K. Systrom. 2021. Instagram by the numbers: Stats demographics & fun facts. Retrieved from https://www.omnicoreagency.com/instagram-statistics/.
5. C. Smith. 2021. Flickr statistics user count and facts. Retrieved from https://expandedramblings.com/index.php/flickr-stats/.
Cited by
51 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献