A REVIEW ON ENCODING AND RECONSTUCTION OF ENCRYPTED IMAGES

Abstract

This paper gives a scheme of encoding of encrypted greyscale images while transmission of images for security purpose. In the encryption phase, the original pixel values are masked by a modulo-256 addition with pseudorandom numbers that are derived from a secret key. After decomposing the encrypted data into a downsampled subimage and several data sets with a multiple-resolution construction, an encoder quantizes the subimage and the Hadamard coefficients of each data set to reduce the data amount. Then, the data of quantized subimage and coefficients are regarded as a set of bitstreams. At the receiver side, while a subimage is decrypted to provide the rough information of the original content, the quantized coefficients can be used to reconstruct the detailed content with an iteratively updating procedure. Because of the hierarchical coding mechanism, the principal original content with higher

Authors and Affiliations

Shweta M. Ghorpade

Keywords

Related Articles

 Health Monitoring System Using Wi-Fi as a Communication Medium on ARM7

 Health monitoring systems become a hot topic and important research field today. Research on health monitoring were developed for many applications such as military, home care unit, hospital, sports training and...

 A Review on the Effect of Process Parameters on Different Output Parameters During Machining of Several Materials

 It is important to view machining, as well as all manufacturing operations, as a system consisting of the workpiece, the tool and the machine. Machinability is the relative susceptibility of a material to the mach...

PORTABLE SECURITY SYSTEM WITH PANIC SWITCH INCLUDING LOCAL AND REMOTE ALARM

An earnest attempt has been made to devise a multifunctional system for Security. This portable system can be efficiently used for security against leakage of LPG, intruder detection and overheating. Some innovative...

IMPLEMENTATION OF VEHICLE OVER SPEED VIOLATION INDICATOR AND IR BASED HORN SYSTEM

In the present day scenario traffic rules are frequently violated by the drivers and over speeding occur d ue to bad driving behavior ’s . So driver assistance system is p rovided to prevent over speed , violati...

ENERGY EFFICIENT ROU TING PROTOCOL FOR AI R QUALITY MONITORING SYSTEM USING ENHANCE D LEACH IN WIRELESS SENSOR NETWORKS

Air pollution monitoring is though old but very useful concept in day to day life. Air pollution monitoring start from traditional way to the most sophisticated computer has been used to monitor the air quality, howeve...

Download PDF file
  • EP ID EP89654
  • DOI -
  • Views 140
  • Downloads 0

How To Cite

Shweta M. Ghorpade (30). A REVIEW ON ENCODING AND RECONSTUCTION OF ENCRYPTED IMAGES. International Journal of Engineering Sciences & Research Technology, 4(7), 127-130. https://europub.co.uk/articles/-A-89654