A REVIEW PAPER ON A SECURE IMAGE ENCRYPTION-THEN COMPRESSION SYSTEM USING WAVELET VIA PREDICTION ERROR CLUSTERING AND RANDOM PERMUTATION
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 2015, Vol 4, Issue 4
Abstract
Images can be encrypted in many ways; several techniques have used different encryption methods. In this research, we apply a new modified International Data Encryption Algorithm to encrypt the full image in an efficient secure manner, after encryption the original file will be compressed and we get compressed image. This paper introduced a highly efficient image encryption-then compression (ETC) system using wavelet. The proposed image encryption scheme operated in the prediction error domain is able to provide a reasonably high level of security. More notably, the proposed compression approach applied to encrypted images is only slightly worse, unencrypted images as inputs. The proposed image encryption scheme operated in the prediction error domain is shown to be able to provide a reasonably high level of security. We also demonstrate that an arithmetic coding-based approach can be exploited to efficiently compress the encrypted images. More notably, the proposed compression approach applied to encrypted images is only slightly worse, in terms of compression efficiency, than the state-of-the-art lossless/lossy image coders, which take original, unencrypted images as inputs. In contrast, most of the existing ETC solutions induce significant penalty on the compression efficiency. For the implementation of this proposed work we use the Image Processing Toolbox under Matlab software.
Authors and Affiliations
Er. Maninder Kaur
A Review of Vibration-Based Piezoelectric Energy Harvesters
Piezoelectric energy harvesting technology has received a great attention during the last decade to activate low power microelectronic devices. Piezoelectric cantilever beam energy harvesters are commonly used to...
Analysis and Simulation of Asymmetrical Current Source Multilevel Inverter
This paper presents asymmetrical current source multilevel inverter approach for high power output applications. The topology used here is derived from the multilevel voltage-source inverter (MVSI) by dual conver...
A STUDY ON THE 3-DIM. EIGENMODE OF THE RECTANGULAR RESONANT CAVITY BY FEM
FEM has been applied to obtain the 3-dim. eigenmode of the rectangular resonant cavity. The vector Helmholtz equation has been analysed for the resonant field strength in homogeneous media. An eigen-equation has b...
A COMMON FIXED POINT THEOREM ON FUZZY 3-METRIC SPACES
In this paper, we prove a common fixed point theorem for four mappings on fuzzy 3-metric spaces. Our result is an extension of results of S. H. Cho [2] to fuzzy 2-metric spaces. Also, it is a generalization of a r...
[sup]REVIEW OF REMOVAL OF BLACK - HOLE ATTACK IN AODV ROUTING PROTOCOL OF MANET USING BHR[/sup]
A Mobile Ad - Hoc Network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on continual basis. Due to sec...