An Effective Approach Of Compressing Encrypted Images

Abstract

In this paper proposing a novel scheme of scalable coding for encrypted images. In the encryption phase, the original pixel values are masked by a modulo- 256 addition with nonrandom numbers that are derived from a secret key. After decomposing the encrypted data into a down sampled subimage and several data sets with a multiple-resolution construction, an encoder calculates the subimage and the Hadamard coefficients of each data set to reduce the data amount. Then, the data calculates subimage and coefficients are regarded as a set of bitstreams. Because of the hierarchical coding mechanism, the principal original content with higher resolution can be reconstructed when more bitstreams are received.

Authors and Affiliations

s. v. v. d Jagadeesh, T Sudha Rani

Keywords

Related Articles

Real-Time 3D Game Using Sixth Sense and Haptic Technology: A Review

This paper is about design of an efficient Game focusing more on combination of Technologies. The purpose of this is to integrate various technologies and develop 3D Game which will enhance game capabilities in Gamin...

Person Authentication by voice and image using ANFIS and Shifted MFCC

In security systems, the interest in using biometric technologies for person authentication has grown rapidly. Voice is one of the most promising and mature biometric modalities for secured access control. Here prese...

A Stochastic Model to Evaluate The Performance of An IAAS Cloud System

Cloud systems are different from usual distributed systems.First of all; they are branded by an extremely big numeral of resources that can distance different administrative domains. Presentation assessment of cloud...

The Effect of NCT Techniques on SC-FDMA System in presence of HPA

In this paper, a companding technique is used to reduce the Peak-to-Average Power Ratio (PAPR) in Single-Carrier Frequency Division Multiple Access (SC-FDMA) systems. By Nonlinear Companding Transform (NCT) technique...

Intelligent encoding with added puzzle & TESLA security of packets Against Jamming Attacks in Wireless Network

Wireless network never has certain defined boundaries that can’t be extended due to this nature security flaws may get developed. Broadcast nature of wireless network makes it easy for intentional attacks to disturb...

Download PDF file
  • EP ID EP27716
  • DOI -
  • Views 260
  • Downloads 4

How To Cite

s. v. v. d Jagadeesh, T Sudha Rani (2013). An Effective Approach Of Compressing Encrypted Images. International Journal of Research in Computer and Communication Technology, 2(10), -. https://europub.co.uk./articles/-A-27716