An RGB Image Encryption Supported by Wavelet-based Lossless Compression
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2012, Vol 3, Issue 9
Abstract
In this paper we have proposed a method for an RGB image encryption supported by lifting scheme based lossless compression. Firstly we have compressd the input color image using a 2-D integer wavelet transform. Then we have applied lossless predictive coding to achieve additional compression. The compressed image is encrypted by using Secure Advanced Hill Cipher (SAHC) involving a pair of involutory matrices, a function called Mix() and an operation called XOR. Decryption followed by reconstruction shows that there is no difference between the output image and the input image. The proposed method can be used for efficient and secure transmission of image data.
Authors and Affiliations
Ch. Samson, V. Sastry
COMPARATIVE STUDY OF THE SOFTWARE METRICS FOR THE COMPLEXITY AND MAINTAINABILITY OF SOFTWARE DEVELOPMENT
Software metrics is one of the well-known topics of research in software engineering. Metrics are used to improve the quality and validity of software systems. Research in this area focus mainly on static metrics obtaine...
Different Protocols for High Speed Networks
New challenges arise with the presence of various types of physical links, such as wireless networks, high speed and satellite in today’s ever-changing network. It is clear that the TCP throughput deteriorates in h...
Analysis of Cloud Network Management Using Resource Allocation and Task Scheduling Services
Network failure in cloud datacenter could result from inefficient resource allocation; scheduling and logical segmentation of physical machines (network constraints). This is highly undesirable in Distributed Cloud Compu...
Cloud and Web Technologies: Technical Improvements and Their Implications on E-Governance
Cloud computing technology helps to improve ICT based services like e-governance execution and create new business opportunities and their implementation. Cloud computing is an evolution of web based internet application...
IMPLEMENTATION OF NODE ENERGY BASED ON ENCRYPTION KEYING
This paper deals with Designing cost-efficient, secure network protocols for any Networks is a challenging problem because node in a network itself is resource-limited. Since the communication cost is the most dominant f...