Abstract
The exponential expansion of data in the digital world necessitates the development of effective methods for data transmission and storage. Data Compression strategies are presented to reduce the quantity of data that are saved and conveyed due to constrained resources. At this point, information security is a major problem. Techniques used in cryptography are those that conceal data while it is being stored or transmitted. Compression reduces the number of bits in the data. Thus, to achieve the highest level of security, it is preferable to employ both compression and encryption. In order to transmit data securely over a network, this study analyses encryption and lossless compression algorithms with additional security. Compression and encryption of digital photographs are necessary for confidentiality and effective bandwidth use. The majority of communication systems require both of these criteria. Separate encryption and compression techniques can occasionally lead to poorer performance or lower reconstruction quality. A simultaneous encryption and compression method for digital photos is presented in the paper. It alters ordinary JPEG compression so that data is encrypted while being compressed. The JPEG compressible picture encryption system is the foundation for the encryption procedures. It may be difficult to incorporate LZMC-ABCS algorithms into well-established multimedia systems and workflows due to their lack of standardization and compatibility with current compression formats and codecs. In order to guarantee seamless integration with multimedia applications and platforms, encourage interoperability, and ease uptake, standardization activities are required. The proposed Secure-JPEG technique combines encryption with lossless compression to offer both advantages. Compared to other techniques that take a similar approach, this one offer greater performance and reconstruction quality. Finally, performance measures were extracted and examined using cutting-edge techniques. Three performance measures were applied to the example medical images: PSNR, MSE, and SSIM. A thorough examination of the measuring metrics reveals that this method is more effective than other image processing methods. In this article, we discuss the Lempel–Ziv-Markov Chain algorithm, a popular data compression technique (LZMA). We contend that the synchronous dataflow model of computing more accurately describes the algorithm behavior in terms of formal model-based design. 256 grey levels and color images of varied sizes were used in the experiment. First, IWT-based LZMC ABCS was used to encrypt and compress these images. Then, this bit stream was further compressed utilizing the best confusion diffusion techniques employing Huffman coding. Finally, additional security was achieved by encrypting data using modified quadratic chaotic maps and a logistic map with a variable parameter.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-024-11187-z/MediaObjects/11277_2024_11187_Fig1_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-024-11187-z/MediaObjects/11277_2024_11187_Fig2_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-024-11187-z/MediaObjects/11277_2024_11187_Fig3_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-024-11187-z/MediaObjects/11277_2024_11187_Fig4_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-024-11187-z/MediaObjects/11277_2024_11187_Fig5_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-024-11187-z/MediaObjects/11277_2024_11187_Fig6_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-024-11187-z/MediaObjects/11277_2024_11187_Fig7_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-024-11187-z/MediaObjects/11277_2024_11187_Fig8_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-024-11187-z/MediaObjects/11277_2024_11187_Fig9_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-024-11187-z/MediaObjects/11277_2024_11187_Fig10_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-024-11187-z/MediaObjects/11277_2024_11187_Fig11_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-024-11187-z/MediaObjects/11277_2024_11187_Fig12_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-024-11187-z/MediaObjects/11277_2024_11187_Fig13_HTML.png)
Similar content being viewed by others
Data Availability
Data sharing is not applicable to this article as no new data were created or analysed in this study.
References
Maqbool, S., Ahmad, N., Muhammad, A., & Martinez Enriquez, A. M. (2016). Simultaneous encryption and compression of digital images based on secure-JPEG encoding. In Mexican conference on pattern recognition (pp. 145–154). Springer, Cham
Kang, X., Peng, A., Xianyu, Xu., & Cao, X. (2013). Performing scalable lossy compression on pixel encrypted images. EURASIP Journal on Image and Video Processing, 2013(1), 1–6.
Underwood, R., Bessac, J., Krasowska, D., Calhoun, J. C., Di, S., & Cappello, F. (2023). Black-box statistical prediction of lossy compression ratios for scientific data. The International Journal of High Performance Computing Applications. https://doi.org/10.1177/10943420231179417
Arnold, R., & Bell, T. (1997). A corpus for the evaluation of lossless compression algorithms. In Proceedings DCC'97. Data compression conference (pp. 201–210). IEEE
Chaudhary, P., Gupta, R., Singh, A., Majumder, P., & Pandey, A. (2020). Joint image compression and encryption using a novel column-wise scanning and optimization algorithm. Procedia Computer Science, 167, 244–253.
Singh, S., & Devgon, R. (2019). Analysis of encryption and lossless compression techniques for secure data transmission." In 2019 IEEE 4th international conference on computer and communication systems (ICCCS) (pp. 1–5). IEEE
Priya, C., Ramya, C., Agashthiya, R. V., Hema, R., Mythily, G., & Preethi, V. P. (2019). An efficient method for secure image compression. International Journal of Innovative Technology and Exploring Engineering, 8(6), 266–270.
Hussein, A. M., Idrees, A. K., & Couturier, R. (2023). A distributed prediction–compression-based mechanism for energy saving in IoT networks. The Journal of Supercomputing. https://doi.org/10.1007/s11227-023-05317-w
Li, Q., Fu, Y., Zhang, Z., Fofanah, A. J., & Gao, T. (2022). Medical images lossless recovery based on POB number system and image compression. Multimedia Tools and Applications, 81(8), 11415–11440.
Pourasad, Y., & Cavallaro, F. (2021). A novel image processing approach to enhancement and compression of X-ray images. International Journal of Environmental Research and Public Health, 18(13), 6724.
Jamil, S., Piran, M. J., Rahman, M., & Kwon, O. J. (2023). Learning-driven lossy image compression: A comprehensive survey. Engineering Applications of Artificial Intelligence, 123, 106361.
Kumar, A. A., & Makur, A. (2008). Distributed source coding based encryption and lossless compression of gray scale and color images. In 2008 IEEE 10th workshop on multimedia signal processing (pp. 760–764). IEEE
Mathur, P., Yadav, A., Verma, V. K., & Purohit, R. (2019). Paradigms of image compression and encryption: A review. In 2019 2nd international conference on intelligent communication and computational techniques (ICCT) (pp. 313–317). IEEE
Singh, K. N., & Singh, A. K. (2022). Towards integrating image encryption with compression: A survey. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), 18(3), 1–21.
Chahal, S. (2023). Optimized data management using energy efficient IOT data compression framework with edge machine learning.
Jayasankar, U., Thirumal, V., & Ponnurangam, D. (2021). A survey on data compression techniques: From the perspective of data quality, coding schemes, data type and applications. Journal of King Saud University-Computer and Information Sciences, 33(2), 119–140.
Kingston, A., Colosimo, S., Campisi, P., & Autrusseau, F. (2007). Lossless image compression and selective encryption using a discrete radon transform. In 2007 IEEE international conference on image processing (vol. 4, pp. IV-465). IEEE
Nassra, I., & Capella, J. V. (2023). Data compression techniques in IoT-enabled wireless body sensor networks: A systematic literature review and research trends for QoS improvement. Internet of Things. https://doi.org/10.1016/j.iot.2023.100806
Xin, G., & Fan, P. (2023). Robust, practical and comprehensive analysis of soft compression image coding algorithms for big data. Scientific Reports, 13(1), 1958.
AbdelWahab, O. F., Hussein, A. I., Hamed, H. F., Kelash, H. M., & Khalaf, A. A. (2021). Efficient combination of RSA cryptography, lossy, and lossless compression steganography techniques to hide data. Procedia Computer Science, 182, 5–12.
Kasmeera, K. S., James, S. P., & Sreekumar, K. (2016). Efficient compression of secured images using subservient data and Huffman coding. Procedia Technology, 25, 60–67.
Li, X. Y., Zhou, X. B., Zhou, Q. L., Han, S. J., & Liu, Z. (2020). High-capacity reversible data hiding in encrypted images by information preprocessing. Complexity. https://doi.org/10.1155/2020/6989452
Zheng, S., Li, D., Donghui, Hu., Ye, D., Wang, L., & Wang, J. (2016). Lossless data hiding algorithm for encrypted images with high capacity. Multimedia Tools and Applications, 75(21), 13765–13778.
Gao, H., & Gao, T. (2022). A secure lossless recovery for medical images based on image encoding and data self-embedding. Cluster Computing, 25(1), 707–725.
Gao, Q. (2020). Secure reversible information hiding in image based on loseless compression. In Proceedings of the 2020 5th International Conference on Multimedia Systems and Signal Processing, pp. 50–53.
Horita, A. Y., Bonna, R., Loubach, D. S., Sander, I., & Söderquist, I. (2019). Lempel-Ziv-Markov chain algorithm modeling using models of computation and ForSyDe. In FT2019. Proceedings of the 10th Aerospace Technology Congress, October 8–9, 2019, Stockholm, Sweden, no. 162 (pp. 152–155). Linköping University Electronic Press
Funding
The authors declare that no funds, grants, or other support were received during the preparation of this manuscript.
Author information
Authors and Affiliations
Contributions
Authors' contributions: Conceptualization. Hema.; Methodology, M. Hema and S. Prayla Shyry; Software, M. Hema and S. Prayla Shyry; validation, S. Prayla Shyry; formal analysis, M. Hema.; investigation, M. Hema.; resources, M. Hema.; data curation, S. Prayla Shyry; writing—original draft preparation, M. Hema; writing—review and editing M. Hema.; visualization, S. Prayla Shyry; supervision, S. Prayla Shyry.; All authors have read and agreed to the published version of the manuscript.
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Hema, M., Shyry, S.P. Efficient Compression of Multimedia Data using Lempel–Ziv–Markov Chain Adaptive Block Compressive Sensing (LZMC-ABCS). Wireless Pers Commun (2024). https://doi.org/10.1007/s11277-024-11187-z
Accepted:
Published:
DOI: https://doi.org/10.1007/s11277-024-11187-z