An Effective Approach Of Compressing Encrypted Images
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 10
Abstract
In this paper proposing a novel scheme of scalable coding for encrypted images. In the encryption phase, the original pixel values are masked by a modulo- 256 addition with nonrandom numbers that are derived from a secret key. After decomposing the encrypted data into a down sampled subimage and several data sets with a multiple-resolution construction, an encoder calculates the subimage and the Hadamard coefficients of each data set to reduce the data amount. Then, the data calculates subimage and coefficients are regarded as a set of bitstreams. Because of the hierarchical coding mechanism, the principal original content with higher resolution can be reconstructed when more bitstreams are received.
Authors and Affiliations
s. v. v. d Jagadeesh, T Sudha Rani
mplementation of HMI-Guided Tracked Wheel Wireless Network Surveillance of a Weapon Robot
As one of the major steps toward fully intelligent autonomous robotic weapon, this paper works have accomplished in three major areas: (1) design of the surveillance system by DM3730 processor (Beagleboard-xM), (2) i...
Optimize Energy Consumption with priority forwarder list in Wireless Sensor Networks
Opportunistic routing always useful to increase the network throughput by forwarding the packets to the nodes which are nearer to the destination node. These nodes are called as forwarder listed nodes during the tran...
Provide Secure And Privacy-Preserving Access Control To Users Anonymously Utilize The Cloud Resource Using Mona
Involvement in a multi-owner manner while preserving data and identity privacy from an untrusted cloud is still a challenging issue due to the regular change of the membership.In the meantime the storage overhead and...
Unique i : An Integrated Automated Altered Fingerprint Identification System
Fingerprint identification systems are very useful in several biometric applications. They are capable of finding correct person with proper identification. Fingerprint identification systems are based on fingerprint...
Ensuring Data Storage Security in a Cloud Computing Using ‘MONA’
Due to the frequent change of the membership, sharing data in a multi-owner manner is a major problem in cloud computing. Identity privacy and Privacy preserving from an entrusted cloud is still a challenging issue....