Image Encryption and Compression Using Scalable Coding Techniques
Journal Title: Scholars Journal of Engineering and Technology - Year 2016, Vol 4, Issue 1
Abstract
Abstract: The security becomes an important issue of communication and storage of image due to the growth of multimedia application. Encryption is one of the ways to ensure high security. Images are used in many fields such as military and medical science. They are stored or transferred through network, security of such image data is important. Encryption involves applying special mathematical algorithms and keys to transform digital data into cipher code before they are transmitted and decryption involves the application of mathematical algorithms and keys to get back the original data from cipher code. Information privacy becomes a challenging issue. In order to protect valuable data or image from undesirable readers, image encryption and decryption is essential. In this approach, encryption phase by using selective encryption technique original image pixel values are completely concealed so that an attacker cannot obtain any statistical information from an original image. An encoder quantizes the sub images and Hadamard transform is applied to reduce the data amount. At the receiver side with the cryptographic key, the principal content with higher resolution can be reconstructed when more bit streams are received. The quality of the reconstructed image is measured by calculating peak signal to noise ratio (PSNR). Keywords: Hadamard Transform, Pseudo Random Number Generator (PRNG), Image Encryption, Compression, Decryption, Peak Signal to Noise Ratio (PSNR).
Authors and Affiliations
Karpakam S, Amutha A
Improvement Design of Vertically-telescopical Substructure of ZJ30 Rig based on the theory of finite element
According to the actual structure and stress state of the ZJ30 rig derrick and substructure, the beam element model of the derrick and the entity model of the substructure for finite element analysis were established in...
Kinetic, Equilibrium and Mechanistic Studies of Nickel Adsorption on Acid Activated Ipomoea Carnea Leaves
An adsorbent prepared from Ipomoea carnea Leaves (AAIC), by acid treatment was tested for its efficiency in removing nickel ion. The process parameters studied include agitation time, initial Nickel ion concentration, ad...
Evaluation of Water and Wastewater Companies of Sistan and Baluchestan Province Using Russell Modified Model Based on DEA
Undoubtedly, skilled and expert human work force is the biggest asset and the corner stone of progress in every Service Company and organization. Reinforcing and creating modern skills in work force in order to increase...
Functional Properties of Water Holding Capacity, Oil Holding Capacity, Wettability, and Sedimentation of Swell-Dried Soybean Powder
Functional properties of expanded granule soybean powder issued from swell-drying were studied and compared with those of conventional ground powder. Swell-dried soybeans were textured by Instant Controlled Pressure Drop...
Application of Lean Tool- Value Stream Mapping (VSM)
Abstract:Value Stream Mapping is a lean tool used for reducing lead time, uncovering waste in production and supply process by identifying non-value-adding steps first and then removing them. A flow diagram of the proces...