An Effective Approach Of Compressing Encrypted Images

Abstract

In this paper proposing a novel scheme of scalable coding for encrypted images. In the encryption phase, the original pixel values are masked by a modulo- 256 addition with nonrandom numbers that are derived from a secret key. After decomposing the encrypted data into a down sampled subimage and several data sets with a multiple-resolution construction, an encoder calculates the subimage and the Hadamard coefficients of each data set to reduce the data amount. Then, the data calculates subimage and coefficients are regarded as a set of bitstreams. Because of the hierarchical coding mechanism, the principal original content with higher resolution can be reconstructed when more bitstreams are received.

Authors and Affiliations

s. v. v. d Jagadeesh, T Sudha Rani

Keywords

Related Articles

Design and Functional Verification of Four Way Set Associative Cache Controller

This project describes the design of a Cache Controller that will handle 32Kbyte 4 ways with 8word block size cache. A cache controller is a device that used to sequence the read and write of the cache storage array....

Functioning Estimation of Tcp Variants and Directing Etiquettes in Flexible Ad-Hoc Set of Connections

Mobile Ad-hoc Network (MANET) is an accumulation of cell phones rapidly shaping a correspondence system with no brought together control and prior system foundation. Because of the vicinity of versatility in the MANE...

Speech Controlled Automatic Slide Change

The main objective of this paper is to control the power point presentation slides through speech. Initially the commands for moving the slides are given to the computer using the microphone. The voice signals are recor...

A New Dynamic Privacy Grid Mechanism for Location Based Services

Appropriate to the nature of the data being swap over between the user and the server, the common changing of the user’s name provides modest shield for the user’s privacy. A more recent investigation of the mix-zone...

Infrequent Defense System for mobile networks through Miscellaneous Contraption

Malware is malevolent programming which irritates the system PC operation, hacking the touchy data and gets to the private frameworks. It is only a project which is particularly intended to harm the PC it might be an...

Download PDF file
  • EP ID EP27716
  • DOI -
  • Views 283
  • Downloads 4

How To Cite

s. v. v. d Jagadeesh, T Sudha Rani (2013). An Effective Approach Of Compressing Encrypted Images. International Journal of Research in Computer and Communication Technology, 2(10), -. https://europub.co.uk/articles/-A-27716