An Effective Approach Of Compressing Encrypted Images

Abstract

In this paper proposing a novel scheme of scalable coding for encrypted images. In the encryption phase, the original pixel values are masked by a modulo- 256 addition with nonrandom numbers that are derived from a secret key. After decomposing the encrypted data into a down sampled subimage and several data sets with a multiple-resolution construction, an encoder calculates the subimage and the Hadamard coefficients of each data set to reduce the data amount. Then, the data calculates subimage and coefficients are regarded as a set of bitstreams. Because of the hierarchical coding mechanism, the principal original content with higher resolution can be reconstructed when more bitstreams are received.

Authors and Affiliations

s. v. v. d Jagadeesh, T Sudha Rani

Keywords

Related Articles

mplementation of HMI-Guided Tracked Wheel Wireless Network Surveillance of a Weapon Robot

As one of the major steps toward fully intelligent autonomous robotic weapon, this paper works have accomplished in three major areas: (1) design of the surveillance system by DM3730 processor (Beagleboard-xM), (2) i...

Optimize Energy Consumption with priority forwarder list in Wireless Sensor Networks

Opportunistic routing always useful to increase the network throughput by forwarding the packets to the nodes which are nearer to the destination node. These nodes are called as forwarder listed nodes during the tran...

Provide Secure And Privacy-Preserving Access Control To Users Anonymously Utilize The Cloud Resource Using Mona

Involvement in a multi-owner manner while preserving data and identity privacy from an untrusted cloud is still a challenging issue due to the regular change of the membership.In the meantime the storage overhead and...

Unique i : An Integrated Automated Altered Fingerprint Identification System

Fingerprint identification systems are very useful in several biometric applications. They are capable of finding correct person with proper identification. Fingerprint identification systems are based on fingerprint...

Ensuring Data Storage Security in a Cloud Computing Using ‘MONA’

Due to the frequent change of the membership, sharing data in a multi-owner manner is a major problem in cloud computing. Identity privacy and Privacy preserving from an entrusted cloud is still a challenging issue....

Download PDF file
  • EP ID EP27716
  • DOI -
  • Views 279
  • Downloads 4

How To Cite

s. v. v. d Jagadeesh, T Sudha Rani (2013). An Effective Approach Of Compressing Encrypted Images. International Journal of Research in Computer and Communication Technology, 2(10), -. https://europub.co.uk/articles/-A-27716