An Effective Approach Of Compressing Encrypted Images
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 10
Abstract
In this paper proposing a novel scheme of scalable coding for encrypted images. In the encryption phase, the original pixel values are masked by a modulo- 256 addition with nonrandom numbers that are derived from a secret key. After decomposing the encrypted data into a down sampled subimage and several data sets with a multiple-resolution construction, an encoder calculates the subimage and the Hadamard coefficients of each data set to reduce the data amount. Then, the data calculates subimage and coefficients are regarded as a set of bitstreams. Because of the hierarchical coding mechanism, the principal original content with higher resolution can be reconstructed when more bitstreams are received.
Authors and Affiliations
s. v. v. d Jagadeesh, T Sudha Rani
Analysis of Rabin and Rabin-P Cryptosystem for specifying correct plain text
This work, introduced a new, competent and useful scheme based on the Rabin cryptosystem without using the Jacobi symbol [1], message redundancy technique or the needs of extra bits in order to specify the correct pl...
Survey of Techniques of High Level Semantic Based Image Retrieval
This paper provides a comprehensive survey of the recent technical achievements in the research area of content based image retrieval. Images are being used since many years in all spheres including Antisocial Element...
Hopfield Neural Network as Associated Memory with Monte Carlo- (MC-)Adaptation Rule and Genetic Algorithm for pattern storage
This paper describes the performance analysis of Hopfield neural networks by usinggenetic algorithm and Monte Carlo-(MC-) adaptation learning rule.A set of five objects has been considered as the pattern set. In the...
A Stochastic Representation to Probe Data Center Implementation and QoS in Iaas Cloud Organizations
Cloud computing is a general term for framework architectures that includes conveying facilitated administrations over the Internet, made conceivable by huge advancements in virtualization and circulated figuring, an...
A Novel Secure On-Demand Routing Protocol for MANET using RSA Triple Key Technique
MANET (Mobile and Ad hoc Networks) are networks in which nodes are mobile and link connectivity might change all the time. In this kind of networks routing, security and key management are the important and complex p...