Highly Secured Lossless Image Cryptography Algorithm Based on Haar Wavelet Transform
Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 2
Abstract
Along with the rapid increasing growth of computer and network technologies, images are being transmitted more and more frequently. Security of image is a big issue. Image information is lively and visual, and has been an important means of expressing information of person. There are many encryption algorithm had been available each one having some strength and weakness. Image cryptography can use text cryptosystems to encrypt images directly, since image size is greater than text. Image encryption can be classified into lossy and lossless encryption methods. Lossless encryption methods are more applicable than lossy encryption methods when marginal distortion is not tolerable. In the proposed system, find the hash value of image using by image hashing toolbox. Image hashing is very easy to the tamper with digital data without leaving any clues. Under these circumstances, integrity verification has become an important issue in the digital world. After finding the hash value, the image is transformed into the frequency domain using the wavelet transform, Image processing and analysis based on the continuous or discrete image transforms are classic techniques. The image transforms are widely used in image filtering, data description, etc. Nowadays the wavelet theorems make up very popular methods of image processing, de-noising and compression. The image transform theory is a well-known area characterized by a precise mathematical background. Considering that the Haar functions are the simplest wavelets, these forms are used in many methods of discrete image transforms and processing then the image sub-bands are encrypted in a such way that guarantees a secure, reliable, and an unbreakable form. The encryption involves scattering the distinguishable frequency data in the image using a reversible weighting factor amongst the rest of the frequencies. The algorithm is designed to shuffle and reverse the sign of each frequency in the transformed image before the image frequencies are transformed back to the pixel domain. The decryption algorithm reverses the encryption process and restores the image to its original form.
Energy Loss Reduction in Distribution System
This research study energy loss reduction in distribution system. This study carries out in the distribution system by using PSS/adept program as tool for simulation. The techniques considered for the reduction of techni...
Preprocessing of Various Data Sets Using Different Classification Algorithms for Evolutionary Programming
The performance analysis and preprocessing of data is very important in data mining. Here, the performance is analyzed on various classification algorithms using different data sets so as to identify which results the be...
Effects of Unical Feed on Fecundity and Gonad Development of Clarias gariepinus; A Comparative Study with Coppens Commercial Feed in Earthen Pond
This study was carried out to determine and compare the fecundity and gonad development of Clarias gariepinus fed Unical and Coppens feeds in earthen pond for 150 days in the University of Calabar fish farm. Twenty (20)...
Secure Load Rebalancing in Cloud Environment
"This paper examines the load rebalancing problem in cloud computing. The main objective of the paper is to Enhance distributed load rebalancing algorithm to cope with the load imbalance factor, movement cost, and algori...
An Efficient Synthesis and Biological Properties of 2- [ (5-Methoxy-1H- Benzimidazol-2-yl) Sulfanyl] -N-Phenylacetamide Motief
A new series of 2-[(5-methoxy-1H-benzimidazol-2-yl)sulfanyl]-N-phenylacetamide have been synthesized by the condensation 2-mercapto-5-methoxybenzemidazole and 2- chloro – N – ( Aryl ) – acetamides. The novel compounds st...