Image Encryption and Compression Using Scalable Coding Techniques

Journal Title: Scholars Journal of Engineering and Technology - Year 2016, Vol 4, Issue 1

Abstract

Abstract: The security becomes an important issue of communication and storage of image due to the growth of multimedia application. Encryption is one of the ways to ensure high security. Images are used in many fields such as military and medical science. They are stored or transferred through network, security of such image data is important. Encryption involves applying special mathematical algorithms and keys to transform digital data into cipher code before they are transmitted and decryption involves the application of mathematical algorithms and keys to get back the original data from cipher code. Information privacy becomes a challenging issue. In order to protect valuable data or image from undesirable readers, image encryption and decryption is essential. In this approach, encryption phase by using selective encryption technique original image pixel values are completely concealed so that an attacker cannot obtain any statistical information from an original image. An encoder quantizes the sub images and Hadamard transform is applied to reduce the data amount. At the receiver side with the cryptographic key, the principal content with higher resolution can be reconstructed when more bit streams are received. The quality of the reconstructed image is measured by calculating peak signal to noise ratio (PSNR). Keywords: Hadamard Transform, Pseudo Random Number Generator (PRNG), Image Encryption, Compression, Decryption, Peak Signal to Noise Ratio (PSNR).

Authors and Affiliations

Karpakam S, Amutha A

Keywords

Related Articles

Sobol' sensitivity indices of the structural parameters of symmetry arch under radial limit loads

Sensitivity analysis allows us to investigate the role, the contribution of the input factors to the objective output function. The results of the sensitivity analysis help the designer adjust the reliability of the stru...

Design and Development of Inverted Down Draft Gasifier for Cooking Purpose

Energy is a key input for technological, industrial, social and economical development of a nation. However, a large number of consumers in domestic, agricultural, commercial and industrial sectors are faced with a situa...

Post-Processing techniques on Binary Clique Configuration Algorithm for Data Segments

Sampled the prior distribution using the Metropolis Algorithm. We then estimated the percent of black pixels in each band and compared it to the percent of black pixels in the training set. Several other neighborhoods w...

Design and Construction of a Wireless Remotely Controlled Video Capturing Vehicle

The Video Capturing Vehicle (VCV) is a wireless remotely controlled video capturing device with ground mobility and a simulated flight control. This project focused on designing and building the video capturing vehicle’s...

Trial Equation Method for Exact Travelling Solutions of Fifth Order Caudrey-Dodd-Gibbon Equation

Under the travelling wave transformation, some nonlinear partial differential equations such as the fifth order Caudrey-Dodd-Gibbon equation are transformed to ordinary differential equation. Then Using trial equation me...

Download PDF file
  • EP ID EP383199
  • DOI -
  • Views 112
  • Downloads 0

How To Cite

Karpakam S, Amutha A (2016). Image Encryption and Compression Using Scalable Coding Techniques. Scholars Journal of Engineering and Technology, 4(1), 1-5. https://europub.co.uk/articles/-A-383199