Scalable Coding of PRNG Encrypted Images
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2013, Vol 1, Issue 5
Abstract
This paper proposes a unique scheme of scalable coding for PRNG encrypted images. In the encryption stage, the original pixel values are masked by a modulo-256 addition with pseudorandom numbers that are resulting from a secret key. After decomposing the encrypted data into a down sampled sub image and some data sets with a multipleresolution construction, an encoder quantizes the sub image and the Hadamard coefficients of each data set to condense the data quantity. Then, the data of quantized sub image and coefficients are observed as a set of bit streams. At the receiver side, while a sub image is decrypted to provide the uneven information of the original content, the quantized coefficients can be used to reconstruct the detailed content with an iteratively updating procedure. Because of the hierarchical coding mechanism, the principal original content with advanced resolution can be reconstructed when more bit streams are received.
Authors and Affiliations
Mr. Y. Sridhar| M.Tech Scholar, Assistant Professor ECE Dept., GITAS, Piridi, Bobbli, Vijayanagaram, Mr. Bighneswar Panda| M.Tech Scholar, Assistant Professor ECE Dept., GITAS, Piridi, Bobbli, Vijayanagaram
A Novel Approach For Large-Scale D ata Processing Platform On Peer- To- Peer Based Bestpeer++
We introduce BestPeer++, a framework which conveys versatile information sharing administrations for corporate system applications in the cloud taking into account BestPeer—a distributed (P2P) based information adm...
A Novel Grid Current Compensator for Grid-Connected Distributed Generation under Nonlinear Loads with Fuzzy Logic Controller
This paper introduces an advanced current control strategy for grid-connected operations of distributed generation (DG), which supports the DG to transfer a sinusoidal current into the utility grid despite the distor...
We concentrate on the second sort called clustering CF, which just adventures the client thing communication data and identifies the areas by clustering strategies. Among algorithms of this sort, some are one side cl...
To Provide A Privacy Preserving Auditing Protocol In Cloud Computing Using Tpa
To completely make sure the data honesty and save the cloud users’ calculation possessions as well as online burden it is of significant importance to facilitate public auditing service for cloud data storage so th...
The Trust and Reputation Systems towards Data for Cloud and Wireless Sensor Networks Integrity
Cloud Computing has powerful data storage and data processing capabilities as well as Wireless sensor network has capability of gathering large amount of data. Presented on by including ordering data storage besides...