Image Encryption and Compression Using Scalable Coding Techniques

Journal Title: Scholars Journal of Engineering and Technology - Year 2016, Vol 4, Issue 1

Abstract

Abstract: The security becomes an important issue of communication and storage of image due to the growth of multimedia application. Encryption is one of the ways to ensure high security. Images are used in many fields such as military and medical science. They are stored or transferred through network, security of such image data is important. Encryption involves applying special mathematical algorithms and keys to transform digital data into cipher code before they are transmitted and decryption involves the application of mathematical algorithms and keys to get back the original data from cipher code. Information privacy becomes a challenging issue. In order to protect valuable data or image from undesirable readers, image encryption and decryption is essential. In this approach, encryption phase by using selective encryption technique original image pixel values are completely concealed so that an attacker cannot obtain any statistical information from an original image. An encoder quantizes the sub images and Hadamard transform is applied to reduce the data amount. At the receiver side with the cryptographic key, the principal content with higher resolution can be reconstructed when more bit streams are received. The quality of the reconstructed image is measured by calculating peak signal to noise ratio (PSNR). Keywords: Hadamard Transform, Pseudo Random Number Generator (PRNG), Image Encryption, Compression, Decryption, Peak Signal to Noise Ratio (PSNR).

Authors and Affiliations

Karpakam S, Amutha A

Keywords

Related Articles

A High Efficient Method of GIS Spatial Data Conversion

At present, most historical surveying data are stored with CAD format, so they can’t be used directly in GIS. This paper focused researches the data format of the CAD and ArcGIS, introduces several methods of data conver...

Discrete Event Simulation Business Process of Trading Companies

The medium discrete event simulation of business processes of the enterprise warehouse shopping package Any Logic was selected which provides the best tool for making management decisions. To create a simulation model of...

A Comparative Study of the Routing Protocols LOAD and RPL in Low-power and Lossy Networks (LLN)

Routing protocols for sensor networks are often designed with explicit assumptions, serving to simplify design and reduce the necessary energy, processing and communications requirements. IPv6 Routing Protocol for Low Po...

Prestressed concrete continuous rigid frame bridge closure segments jacking force calculation and analysis

Prestressed concrete continuous rigid frame bridge in the completion of system transformation, the late creep and shrinkage of concrete combined with cooling effect between the two pier girder has a tendency to shorten,...

Exact solutions to the regularized Burgers-BBM equation

The trial equation method is applied to the regularized Burgers-BBM equation, when the parameter p takes the different values, we have obtained all of its corresponding exact traveling wave solutions. Keywords: traveling...

Download PDF file
  • EP ID EP383199
  • DOI -
  • Views 142
  • Downloads 0

How To Cite

Karpakam S, Amutha A (2016). Image Encryption and Compression Using Scalable Coding Techniques. Scholars Journal of Engineering and Technology, 4(1), 1-5. https://europub.co.uk/articles/-A-383199