Image compression with short-term visual encryption using the Burrow Wheeler transform and keyed transpose

J. H. Kong*, K. P. Seng, L. S. Yeong, L. M. Ang

*Corresponding author for this work

Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

3 Citations (Scopus)

Abstract

In some wireless sensor network image processing applications, visual data such as the surveillance imagery or video streaming might contain high commercial value but devalues over time. For such multimedia, the security requirement is usually low or just sufficient to disguise and protect the value of the payload for a short-term period. Multimedia compression is a necessity for these large-sized data and the unification of security and compression properties would greatly increase the practicality of the image processing algorithm. In this paper, we are presenting the image results of using the BWCA (Burrow Wheeler Compression Algorithm) on images with the proposed conditional transposition methodology (keyed transpose) for a short-term visual protection and the results for subjective metric perceptual assessment of the quality and the BWT effects on the images.

Original languageEnglish
Title of host publicationIET International Conference on Wireless Communications and Applications, ICWCA 2012
Edition614 CP
DOIs
Publication statusPublished - 2012
Externally publishedYes
EventIET International Conference on Wireless Communications and Applications, ICWCA 2012 - Kuala Lumpur, Malaysia
Duration: 8 Oct 201210 Oct 2012

Publication series

NameIET Conference Publications
Number614 CP
Volume2012

Conference

ConferenceIET International Conference on Wireless Communications and Applications, ICWCA 2012
Country/TerritoryMalaysia
CityKuala Lumpur
Period8/10/1210/10/12

Keywords

  • BWCA
  • Block-sorting
  • Burrow-wheelers transform
  • Image compression
  • Image encryption

Fingerprint

Dive into the research topics of 'Image compression with short-term visual encryption using the Burrow Wheeler transform and keyed transpose'. Together they form a unique fingerprint.

Cite this