Robust coding of encrypted images via structural matrix
Zhang Y.2; Wong K.-W.1; Zhang L.Y.1; Wen W.3; Zhou J.4; He X.2
Source PublicationSignal Processing: Image Communication

In this work, we intend to design a robust coder, based on compressive sensing with structurally random matrix, for encrypted images over packet transmission networks. The proposed coder can be applied in the scenario that Alice needs a semi-trusted channel provider Charlie to encode and transmit the encrypted image to Bob. In particular, Alice first encrypts an image using globally random permutation and then sends the encrypted image to Charlie who samples the encrypted image using a structural matrix. Through an imperfect channel with packet loss, Bob receives the compressive measurements and reconstructs the original image by joint decryption and decoding. Experimental results show that the proposed coder can be considered as an efficient multiple description coder with a number of descriptions against packet loss.

KeywordMultiple Description Code Packet Loss Robust Coding Of Encrypted Image Structural Matrix
URLView the original
Indexed BySCI
WOS Research AreaEngineering
WOS SubjectEngineering, Electrical & Electronic
WOS IDWOS:000367412700015
Fulltext Access
Citation statistics
Cited Times [WOS]:12   [WOS Record]     [Related Records in WOS]
Document TypeJournal article
Affiliation1.City University of Hong Kong
2.Southwest China Normal University
3.Jiangxi University of Finance and EcoNomics
4.Universidade de Macau
Recommended Citation
GB/T 7714
Zhang Y.,Wong K.-W.,Zhang L.Y.,et al. Robust coding of encrypted images via structural matrix[J]. Signal Processing: Image Communication,2015,39:202-211.
APA Zhang Y.,Wong K.-W.,Zhang L.Y.,Wen W.,Zhou J.,&He X..(2015).Robust coding of encrypted images via structural matrix.Signal Processing: Image Communication,39,202-211.
MLA Zhang Y.,et al."Robust coding of encrypted images via structural matrix".Signal Processing: Image Communication 39(2015):202-211.
Files in This Item:
There are no files associated with this item.
Related Services
Recommend this item
Usage statistics
Export to Endnote
Google Scholar
Similar articles in Google Scholar
[Zhang Y.]'s Articles
[Wong K.-W.]'s Articles
[Zhang L.Y.]'s Articles
Baidu academic
Similar articles in Baidu academic
[Zhang Y.]'s Articles
[Wong K.-W.]'s Articles
[Zhang L.Y.]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Zhang Y.]'s Articles
[Wong K.-W.]'s Articles
[Zhang L.Y.]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.