An Effective Approach Of Compressing Encrypted Images
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 10
Abstract
In this paper proposing a novel scheme of scalable coding for encrypted images. In the encryption phase, the original pixel values are masked by a modulo- 256 addition with nonrandom numbers that are derived from a secret key. After decomposing the encrypted data into a down sampled subimage and several data sets with a multiple-resolution construction, an encoder calculates the subimage and the Hadamard coefficients of each data set to reduce the data amount. Then, the data calculates subimage and coefficients are regarded as a set of bitstreams. Because of the hierarchical coding mechanism, the principal original content with higher resolution can be reconstructed when more bitstreams are received.
Authors and Affiliations
s. v. v. d Jagadeesh, T Sudha Rani
Estimation of Complexity of the Regenerator Placement Problem in Optical Networks
Placement of regenerators in optical networks has attracted the attention of recent research works in optical networks. In this problem, we are given a network with an underlying topology of a graph and with a set o...
Data Sharing In Cloud Storage Using Key Aggregate Cryptosystem
Cloud storage is getting exceptionally famous nowadays .The two noteworthy offices that cloud give are information stockpiling and information sharing. A protected information partaking in cloud is a critical issue....
ARM-7 Based Semi Autonomous Vehicle
In every day there are millions of vehicles are passing on the roads due to urbanization. Transportation Department plays an important role in the features like Time, safety and efficiency but due to the lack of awar...
Text Clustering Using Cosine Similarity and Matrix Factorization
Clustering is a useful technique that organizes a large quantity of unordered text documents into a small number of meaningful and coherent clusters, thereby providing a basis for intuitive and informative navigation...
Minimizing End-To-End Delay in Interactive Network Applications
Multiple users interaction in network applications such as teleconferencing, network gaming, and online trading are gaining popularity but these applications require that the delay difference in between multiple clie...