Skip to main content
Log in

Efficient Compression of Multimedia Data using Lempel–Ziv–Markov Chain Adaptive Block Compressive Sensing (LZMC-ABCS)

  • Research
  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The exponential expansion of data in the digital world necessitates the development of effective methods for data transmission and storage. Data Compression strategies are presented to reduce the quantity of data that are saved and conveyed due to constrained resources. At this point, information security is a major problem. Techniques used in cryptography are those that conceal data while it is being stored or transmitted. Compression reduces the number of bits in the data. Thus, to achieve the highest level of security, it is preferable to employ both compression and encryption. In order to transmit data securely over a network, this study analyses encryption and lossless compression algorithms with additional security. Compression and encryption of digital photographs are necessary for confidentiality and effective bandwidth use. The majority of communication systems require both of these criteria. Separate encryption and compression techniques can occasionally lead to poorer performance or lower reconstruction quality. A simultaneous encryption and compression method for digital photos is presented in the paper. It alters ordinary JPEG compression so that data is encrypted while being compressed. The JPEG compressible picture encryption system is the foundation for the encryption procedures. It may be difficult to incorporate LZMC-ABCS algorithms into well-established multimedia systems and workflows due to their lack of standardization and compatibility with current compression formats and codecs. In order to guarantee seamless integration with multimedia applications and platforms, encourage interoperability, and ease uptake, standardization activities are required. The proposed Secure-JPEG technique combines encryption with lossless compression to offer both advantages. Compared to other techniques that take a similar approach, this one offer greater performance and reconstruction quality. Finally, performance measures were extracted and examined using cutting-edge techniques. Three performance measures were applied to the example medical images: PSNR, MSE, and SSIM. A thorough examination of the measuring metrics reveals that this method is more effective than other image processing methods. In this article, we discuss the Lempel–Ziv-Markov Chain algorithm, a popular data compression technique (LZMA). We contend that the synchronous dataflow model of computing more accurately describes the algorithm behavior in terms of formal model-based design. 256 grey levels and color images of varied sizes were used in the experiment. First, IWT-based LZMC ABCS was used to encrypt and compress these images. Then, this bit stream was further compressed utilizing the best confusion diffusion techniques employing Huffman coding. Finally, additional security was achieved by encrypting data using modified quadratic chaotic maps and a logistic map with a variable parameter.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Data Availability

Data sharing is not applicable to this article as no new data were created or analysed in this study.

References

  1. Maqbool, S., Ahmad, N., Muhammad, A., & Martinez Enriquez, A. M. (2016). Simultaneous encryption and compression of digital images based on secure-JPEG encoding. In Mexican conference on pattern recognition (pp. 145–154). Springer, Cham

  2. Kang, X., Peng, A., Xianyu, Xu., & Cao, X. (2013). Performing scalable lossy compression on pixel encrypted images. EURASIP Journal on Image and Video Processing, 2013(1), 1–6.

    Article  Google Scholar 

  3. Underwood, R., Bessac, J., Krasowska, D., Calhoun, J. C., Di, S., & Cappello, F. (2023). Black-box statistical prediction of lossy compression ratios for scientific data. The International Journal of High Performance Computing Applications. https://doi.org/10.1177/10943420231179417

    Article  Google Scholar 

  4. Arnold, R., & Bell, T. (1997). A corpus for the evaluation of lossless compression algorithms. In Proceedings DCC'97. Data compression conference (pp. 201–210). IEEE

  5. Chaudhary, P., Gupta, R., Singh, A., Majumder, P., & Pandey, A. (2020). Joint image compression and encryption using a novel column-wise scanning and optimization algorithm. Procedia Computer Science, 167, 244–253.

    Article  Google Scholar 

  6. Singh, S., & Devgon, R. (2019). Analysis of encryption and lossless compression techniques for secure data transmission." In 2019 IEEE 4th international conference on computer and communication systems (ICCCS) (pp. 1–5). IEEE

  7. Priya, C., Ramya, C., Agashthiya, R. V., Hema, R., Mythily, G., & Preethi, V. P. (2019). An efficient method for secure image compression. International Journal of Innovative Technology and Exploring Engineering, 8(6), 266–270.

    Google Scholar 

  8. Hussein, A. M., Idrees, A. K., & Couturier, R. (2023). A distributed prediction–compression-based mechanism for energy saving in IoT networks. The Journal of Supercomputing. https://doi.org/10.1007/s11227-023-05317-w

    Article  Google Scholar 

  9. Li, Q., Fu, Y., Zhang, Z., Fofanah, A. J., & Gao, T. (2022). Medical images lossless recovery based on POB number system and image compression. Multimedia Tools and Applications, 81(8), 11415–11440.

    Article  Google Scholar 

  10. Pourasad, Y., & Cavallaro, F. (2021). A novel image processing approach to enhancement and compression of X-ray images. International Journal of Environmental Research and Public Health, 18(13), 6724.

    Article  Google Scholar 

  11. Jamil, S., Piran, M. J., Rahman, M., & Kwon, O. J. (2023). Learning-driven lossy image compression: A comprehensive survey. Engineering Applications of Artificial Intelligence, 123, 106361.

    Article  Google Scholar 

  12. Kumar, A. A., & Makur, A. (2008). Distributed source coding based encryption and lossless compression of gray scale and color images. In 2008 IEEE 10th workshop on multimedia signal processing (pp. 760–764). IEEE

  13. Mathur, P., Yadav, A., Verma, V. K., & Purohit, R. (2019). Paradigms of image compression and encryption: A review. In 2019 2nd international conference on intelligent communication and computational techniques (ICCT) (pp. 313–317). IEEE

  14. Singh, K. N., & Singh, A. K. (2022). Towards integrating image encryption with compression: A survey. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), 18(3), 1–21.

    Article  MathSciNet  Google Scholar 

  15. Chahal, S. (2023). Optimized data management using energy efficient IOT data compression framework with edge machine learning.

  16. Jayasankar, U., Thirumal, V., & Ponnurangam, D. (2021). A survey on data compression techniques: From the perspective of data quality, coding schemes, data type and applications. Journal of King Saud University-Computer and Information Sciences, 33(2), 119–140.

    Article  Google Scholar 

  17. Kingston, A., Colosimo, S., Campisi, P., & Autrusseau, F. (2007). Lossless image compression and selective encryption using a discrete radon transform. In 2007 IEEE international conference on image processing (vol. 4, pp. IV-465). IEEE

  18. Nassra, I., & Capella, J. V. (2023). Data compression techniques in IoT-enabled wireless body sensor networks: A systematic literature review and research trends for QoS improvement. Internet of Things. https://doi.org/10.1016/j.iot.2023.100806

    Article  Google Scholar 

  19. Xin, G., & Fan, P. (2023). Robust, practical and comprehensive analysis of soft compression image coding algorithms for big data. Scientific Reports, 13(1), 1958.

    Article  Google Scholar 

  20. AbdelWahab, O. F., Hussein, A. I., Hamed, H. F., Kelash, H. M., & Khalaf, A. A. (2021). Efficient combination of RSA cryptography, lossy, and lossless compression steganography techniques to hide data. Procedia Computer Science, 182, 5–12.

    Article  Google Scholar 

  21. Kasmeera, K. S., James, S. P., & Sreekumar, K. (2016). Efficient compression of secured images using subservient data and Huffman coding. Procedia Technology, 25, 60–67.

    Article  Google Scholar 

  22. Li, X. Y., Zhou, X. B., Zhou, Q. L., Han, S. J., & Liu, Z. (2020). High-capacity reversible data hiding in encrypted images by information preprocessing. Complexity. https://doi.org/10.1155/2020/6989452

    Article  Google Scholar 

  23. Zheng, S., Li, D., Donghui, Hu., Ye, D., Wang, L., & Wang, J. (2016). Lossless data hiding algorithm for encrypted images with high capacity. Multimedia Tools and Applications, 75(21), 13765–13778.

    Article  Google Scholar 

  24. Gao, H., & Gao, T. (2022). A secure lossless recovery for medical images based on image encoding and data self-embedding. Cluster Computing, 25(1), 707–725.

    Article  Google Scholar 

  25. Gao, Q. (2020). Secure reversible information hiding in image based on loseless compression. In Proceedings of the 2020 5th International Conference on Multimedia Systems and Signal Processing, pp. 50–53.

  26. Horita, A. Y., Bonna, R., Loubach, D. S., Sander, I., & Söderquist, I. (2019). Lempel-Ziv-Markov chain algorithm modeling using models of computation and ForSyDe. In FT2019. Proceedings of the 10th Aerospace Technology Congress, October 8–9, 2019, Stockholm, Sweden, no. 162 (pp. 152–155). Linköping University Electronic Press

Download references

Funding

The authors declare that no funds, grants, or other support were received during the preparation of this manuscript.

Author information

Authors and Affiliations

Authors

Contributions

Authors' contributions: Conceptualization. Hema.; Methodology, M. Hema and S. Prayla Shyry; Software, M. Hema and S. Prayla Shyry; validation, S. Prayla Shyry; formal analysis, M. Hema.; investigation, M. Hema.; resources, M. Hema.; data curation, S. Prayla Shyry; writing—original draft preparation, M. Hema; writing—review and editing M. Hema.; visualization, S. Prayla Shyry; supervision, S. Prayla Shyry.; All authors have read and agreed to the published version of the manuscript.

Corresponding author

Correspondence to M. Hema.

Ethics declarations

Competing interests

The authors declare no competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hema, M., Shyry, S.P. Efficient Compression of Multimedia Data using Lempel–Ziv–Markov Chain Adaptive Block Compressive Sensing (LZMC-ABCS). Wireless Pers Commun (2024). https://doi.org/10.1007/s11277-024-11187-z

Download citation

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11277-024-11187-z

Keywords

Navigation