Performance Evaluation of Image Encryption Using Separable Reversible Data Hiding Scheme
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 1
Abstract
Image Encryption has a significant role in the field of cryptography. In the proposed scheme compression technique is introduced after the encryption and data hiding process to reduce the image size for faster transmission. Encryption scheme, two separate keys are used for image encryption and data hiding with high degree of security to protect an image from unauthorized access. The content owner encrypts the original uncompressed image using an encryption key. The least significant bits (LSBs) of the encrypted image are compressed using a data hiding key to create a space to embed an additional data. Run - Length Coding (RLC) and Haar Wavelet compression technique is employed. At the receiver end, quality of image retrieval and data extraction are achieved only from RLC with their respective keys. Extracted image quality is analyzed by conventional and subjective metrics index are measured. Image Quality Assessment (IQA) technique shows the quality of retrieved image is same as that of the original image.
Authors and Affiliations
Smitha M, Karthik V. J
Design of a Crane Hook of Different Materials and Stress Analysis Using ANSYS Workbench
Crane hook is a prominent component used for lifting the loads. They often undergo failure due to stress concentration. Hence a study on stresses induced in them helps us better understand how to prevent failure. The ai...
Performance and Experimental Studies on VortexCirculating Bed Solar Dryer
Numerous types of solar dryers have been designed and developed in various part of the world. Various topics in sun and solar drying are discussed in many scientific reports, research manuscripts and books. This researc...
Detection and Localization of IDS Based Spoofing Attackers in Wireless Sensor Network
Wireless spoofing attacks are easy to launch, it plays a significant role in the performance of wireless sensor networks. Although the identity of a node can be verified through cryptographic authentication, conventiona...
Balloon Imaging Satellite
In urban areas, it has been long a challenge topic to automatically extract urban objects from images due to the high object density and scene complexity. Applying normal image processing methods could not achieve satis...
A Predictive Solution to Unbalanced-Voltage Problem in Wind Turbine Using Four-leg Indirect Matrix Converter
In this paper, a four leg indirect matrix converter (IMC) is presented for the solution to unbalanced voltage in wind turbines. The wind driven PMSG is used as a generator for the power supply. The four leg indirect mat...