A REVIEW ON HIGH RESOLUTION IMAGE ENCRYPTION AND RECONSTRUCTION USING SCALABLE CODING
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 2015, Vol 4, Issue 5
Abstract
In today’s connected world, research. This paper proposes a unique scheme of scalable coding of transmitting and receiving images in an extreme protected way using Hadamard transform. In the encryption phase, the original pixel values are masked by a modulo - 256 addition with non - random numbers that are derived from a secret key. Then, the encrypted data are decomposed into several parts, and each part is compressed as a bit stream. After decomposing the encrypted data into a down sampled subimage and several data sets with a multiple - resolution construction, an encoder calculates the subimage and the Hadamard coefficients of each dataset to condense the data quantity. Then, the data calculates subimage and coefficients are observed as a set of bitstreams. Because of the hierarchical coding mechan ism at the receiver side with the cryptographic key, the principal content with higher resolution can be reconstructed when more bit streams are received.
Authors and Affiliations
Nirali. R. Burad , Prof. Harish Bhangale
USING DISCRETE WAVELET TRANSFORMATION IN FUSION STRATEGY FOR TARGET SEGMENTATION
This article is presented on SAR (Synthetic aperture radar) images are based on image fusion and reformulated fuzzy clustering to detect the difference between two images. After fusion for better resolution wavele...
High-Resolution Image Retrieval Using Support Vector Machine
Image retrieval search is a method which analyzes the contents of the image rather than the metadata such as keywords, tags, or descriptions associated with the image. Support vector machine have been successfully...
Experimental Analysis of Fabricated Magnetorheological Damper by Using Different Magnetorheological Fluid: A Review
Magnetorheological (MR) fluid damper are semi active control device have been applied a wide range of practical vibration control application. The application of magnetorheological (MR) dampers to give damping by...
RELATIVE STUDY OF OUTLIER DETECTION PROCEDURES
Data Mining just alludes to the extraction of exceptionally intriguing patterns of the data from the monstrous data sets. Outlier detection is one of the imperative parts of data mining which Rexall discovers the percep...
Performance Comparison Wireless Sensor Network Security Protocols : LLSP and Tiny SEC
Security protocols play an important role in the deployment of sensor networks in various environments However, many existing security protocols developed for WSNs are vulnerable to attacks in hostile environments...