A REVIEW ON ENCODING AND RECONSTUCTION OF ENCRYPTED IMAGES
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 4, Issue 7
Abstract
This paper gives a scheme of encoding of encrypted greyscale images while transmission of images for security purpose. In the encryption phase, the original pixel values are masked by a modulo-256 addition with pseudorandom numbers that are derived from a secret key. After decomposing the encrypted data into a downsampled subimage and several data sets with a multiple-resolution construction, an encoder quantizes the subimage and the Hadamard coefficients of each data set to reduce the data amount. Then, the data of quantized subimage and coefficients are regarded as a set of bitstreams. At the receiver side, while a subimage is decrypted to provide the rough information of the original content, the quantized coefficients can be used to reconstruct the detailed content with an iteratively updating procedure. Because of the hierarchical coding mechanism, the principal original content with higher
Authors and Affiliations
Shweta M. Ghorpade
Health Monitoring System Using Wi-Fi as a Communication Medium on ARM7
Health monitoring systems become a hot topic and important research field today. Research on health monitoring were developed for many applications such as military, home care unit, hospital, sports training and...
A Review on the Effect of Process Parameters on Different Output Parameters During Machining of Several Materials
It is important to view machining, as well as all manufacturing operations, as a system consisting of the workpiece, the tool and the machine. Machinability is the relative susceptibility of a material to the mach...
PORTABLE SECURITY SYSTEM WITH PANIC SWITCH INCLUDING LOCAL AND REMOTE ALARM
An earnest attempt has been made to devise a multifunctional system for Security. This portable system can be efficiently used for security against leakage of LPG, intruder detection and overheating. Some innovative...
IMPLEMENTATION OF VEHICLE OVER SPEED VIOLATION INDICATOR AND IR BASED HORN SYSTEM
In the present day scenario traffic rules are frequently violated by the drivers and over speeding occur d ue to bad driving behavior ’s . So driver assistance system is p rovided to prevent over speed , violati...
ENERGY EFFICIENT ROU TING PROTOCOL FOR AI R QUALITY MONITORING SYSTEM USING ENHANCE D LEACH IN WIRELESS SENSOR NETWORKS
Air pollution monitoring is though old but very useful concept in day to day life. Air pollution monitoring start from traditional way to the most sophisticated computer has been used to monitor the air quality, howeve...