An Effective Approach Of Compressing Encrypted Images
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 10
Abstract
In this paper proposing a novel scheme of scalable coding for encrypted images. In the encryption phase, the original pixel values are masked by a modulo- 256 addition with nonrandom numbers that are derived from a secret key. After decomposing the encrypted data into a down sampled subimage and several data sets with a multiple-resolution construction, an encoder calculates the subimage and the Hadamard coefficients of each data set to reduce the data amount. Then, the data calculates subimage and coefficients are regarded as a set of bitstreams. Because of the hierarchical coding mechanism, the principal original content with higher resolution can be reconstructed when more bitstreams are received.
Authors and Affiliations
s. v. v. d Jagadeesh, T Sudha Rani
Development of an Indigenous Software For Radiometric and Geometric Calibration of Microwave Remote Sensed Imagery
Microwave Remote sensed data finds a great deal of application in the field of agriculture and disaster management. In this paper an attempt is made towards development of software which can be used for processing of...
Human Gait Based Gender Classification Using Various Transformation Techniques
Gender classification such as classifying human face is only challenging for computer, but even hard for human in some cases. In our work a new novel approach is proposed to recognize gender from the face image. Cont...
Essentiality of Localized On-demand Link State (LOLS) Routing in IP Network
Network failure is the complete or partial failure of network component or components. The techniques like Failure Carrying Packet (FCP), Tunneling, Packet Re-cycling (PR), Multiple Routing Configuration (MRC) etc ha...
DHT - Reducing Energy Cost and Identifying Duplicate Nodes in Wireless Sensor Networks
Wireless sensor networks is a collection of sensor nodes scattered over an area for data collection. But the main problem is the danger of the node clone,which arises due to the low-cost, resource-constrained, distrib...
Dynamic Authentication over Graphical Passwords using Visual Cryptography
CAPTCHA is a test build by computer programs which human can pass but computer programs cannot pass CAPTCHA as graphical passwords (CaRP) are a graphical password scheme used for a user access authentication. It is m...