Scalable Coding of PRNG Encrypted Images
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2013, Vol 1, Issue 5
Abstract
This paper proposes a unique scheme of scalable coding for PRNG encrypted images. In the encryption stage, the original pixel values are masked by a modulo-256 addition with pseudorandom numbers that are resulting from a secret key. After decomposing the encrypted data into a down sampled sub image and some data sets with a multipleresolution construction, an encoder quantizes the sub image and the Hadamard coefficients of each data set to condense the data quantity. Then, the data of quantized sub image and coefficients are observed as a set of bit streams. At the receiver side, while a sub image is decrypted to provide the uneven information of the original content, the quantized coefficients can be used to reconstruct the detailed content with an iteratively updating procedure. Because of the hierarchical coding mechanism, the principal original content with advanced resolution can be reconstructed when more bit streams are received.
Authors and Affiliations
Mr. Y. Sridhar| M.Tech Scholar, Assistant Professor ECE Dept., GITAS, Piridi, Bobbli, Vijayanagaram, Mr. Bighneswar Panda| M.Tech Scholar, Assistant Professor ECE Dept., GITAS, Piridi, Bobbli, Vijayanagaram
A new Security approach for integrating wireless adhoc network using octant bit computation and routing test
Ad hoc networks are a kind of network that has no centralized body and in order to communicate with the nodes it has no fixed topology.In this paper we propose to use binary masking of octant bits and shared cryptogr...
A FLC Based DVR by Employing Z-Source Inverter For Voltage Sag/Swell Reduction
Today Power quality is an issue that is becoming increasingly important to electricity consumers at all levels of usage. Sensitive power electronic equipment and non-linear loads are widely used in industrial, commer...
Face Recognition Based Security System Using Sift Algorithm
Present days most of the door lock systems are organized by humans with the application of keys, secured password & unpredictable pattern to operate the door. The purpose of this paper is to help the users to develop...
The data stored in cloud environment can be accessed from anywhere and at anytime and by anyone. Many techniques effectively provide the security for cloud storage data. During transmission of data in cloud environme...
An Adapted Search on Mobile Devices With Shielded Web
Customized web pursuit could be customizing so as to promise because of enhance hunt quality indexed lists for people with individual information objectives. On the contrary hand, security isn't entirety, and occasio...