Image Encryption and Compression Using Scalable Coding Techniques

Journal Title: Scholars Journal of Engineering and Technology - Year 2016, Vol 4, Issue 1

Abstract

Abstract: The security becomes an important issue of communication and storage of image due to the growth of multimedia application. Encryption is one of the ways to ensure high security. Images are used in many fields such as military and medical science. They are stored or transferred through network, security of such image data is important. Encryption involves applying special mathematical algorithms and keys to transform digital data into cipher code before they are transmitted and decryption involves the application of mathematical algorithms and keys to get back the original data from cipher code. Information privacy becomes a challenging issue. In order to protect valuable data or image from undesirable readers, image encryption and decryption is essential. In this approach, encryption phase by using selective encryption technique original image pixel values are completely concealed so that an attacker cannot obtain any statistical information from an original image. An encoder quantizes the sub images and Hadamard transform is applied to reduce the data amount. At the receiver side with the cryptographic key, the principal content with higher resolution can be reconstructed when more bit streams are received. The quality of the reconstructed image is measured by calculating peak signal to noise ratio (PSNR). Keywords: Hadamard Transform, Pseudo Random Number Generator (PRNG), Image Encryption, Compression, Decryption, Peak Signal to Noise Ratio (PSNR).

Authors and Affiliations

Karpakam S, Amutha A

Keywords

Related Articles

Hand Written Circuit Schematic Recognition

Circuit drawing is an important task especially in undergraduate courses such as electronics and digital systems. To improve human computer interaction, we have developed recognition system for the hand written circuit a...

On sandwich theorems for certain analytic functions

In this paper, we derive some subordination and superordination results for certain normalized analytic functions in the open unit disk. Keywords: univalent functions; starlike functions; subordination; superordination

Design and Implementation of an E-Learning Live Streaming Application With Audio Chat

In recent years, increased computing power, improved wireless and user-friendly technology and reduced telecommunication costs have contributed to lowering barriers to information access and exchange. The potential for u...

Improved approximation of PERT activity parameters and validation

In Project Evaluation and Review Technique (PERT) , the activity mean and variance are very useful to find the expected project duration and variance of the critical path. Project duration makes a large difference in the...

The method of calculating the average decline rate by using the iterative method

In this paper, we used a simple iterative method to get the iterative formula of average decline rate, and this formula is used to solve practical problems of solving the average decline rate. Keywords: Iterative me...

Download PDF file
  • EP ID EP383199
  • DOI -
  • Views 128
  • Downloads 0

How To Cite

Karpakam S, Amutha A (2016). Image Encryption and Compression Using Scalable Coding Techniques. Scholars Journal of Engineering and Technology, 4(1), 1-5. https://europub.co.uk/articles/-A-383199