An Effective Approach Of Compressing Encrypted Images
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 10
Abstract
In this paper proposing a novel scheme of scalable coding for encrypted images. In the encryption phase, the original pixel values are masked by a modulo- 256 addition with nonrandom numbers that are derived from a secret key. After decomposing the encrypted data into a down sampled subimage and several data sets with a multiple-resolution construction, an encoder calculates the subimage and the Hadamard coefficients of each data set to reduce the data amount. Then, the data calculates subimage and coefficients are regarded as a set of bitstreams. Because of the hierarchical coding mechanism, the principal original content with higher resolution can be reconstructed when more bitstreams are received.
Authors and Affiliations
s. v. v. d Jagadeesh, T Sudha Rani
Mobility Prediction: A review of Techniques used in MANETS
Mobility prediction for individual path is a fascinating topic. Mobility prediction in mobile ad-hoc networks is a simple and effective scheme to predict when the user will leave from the current location and where he...
A Protective Scheme To Prevent The Attacker From Forging Acknowledgment Packets In Manets’s Using Eaack
Amongst all the modern wireless networks Mobile Ad hoc network (MANET) is one of the most significant and exclusive applications. MANET does not necessitate a fixed network infrastructure every single node works as b...
Implementation of Grid Based Distributed 3P4W System Using ANFIS Control
The increase in global energy demand and load demand, the Renewable Energy Sources (RES) are increasingly connected in the distribution systems which utilises power electronics Converters/Inverters. This paper sugges...
Invalid Detachment centered Outlier Recognition acquired from Reverse Nearest Neighbors
Data Mining essentially alludes to the extraction of exceptionally fascinating examples of the Data from the gigantic Data sets. Anomaly recognition is one of the imperative parts of Data mining which really discover...
Detect Sinking Ship in Wireless Sensor Networks By Using Dcd
A cut is nothing but a part of wireless sensor networks which is splited into different connection components because of some node failures in the network. This paper proposes a new algorithm to detect these cuts by...