An Effective Approach Of Compressing Encrypted Images
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 10
Abstract
In this paper proposing a novel scheme of scalable coding for encrypted images. In the encryption phase, the original pixel values are masked by a modulo- 256 addition with nonrandom numbers that are derived from a secret key. After decomposing the encrypted data into a down sampled subimage and several data sets with a multiple-resolution construction, an encoder calculates the subimage and the Hadamard coefficients of each data set to reduce the data amount. Then, the data calculates subimage and coefficients are regarded as a set of bitstreams. Because of the hierarchical coding mechanism, the principal original content with higher resolution can be reconstructed when more bitstreams are received.
Authors and Affiliations
s. v. v. d Jagadeesh, T Sudha Rani
Real-Time 3D Game Using Sixth Sense and Haptic Technology: A Review
This paper is about design of an efficient Game focusing more on combination of Technologies. The purpose of this is to integrate various technologies and develop 3D Game which will enhance game capabilities in Gamin...
Person Authentication by voice and image using ANFIS and Shifted MFCC
In security systems, the interest in using biometric technologies for person authentication has grown rapidly. Voice is one of the most promising and mature biometric modalities for secured access control. Here prese...
A Stochastic Model to Evaluate The Performance of An IAAS Cloud System
Cloud systems are different from usual distributed systems.First of all; they are branded by an extremely big numeral of resources that can distance different administrative domains. Presentation assessment of cloud...
The Effect of NCT Techniques on SC-FDMA System in presence of HPA
In this paper, a companding technique is used to reduce the Peak-to-Average Power Ratio (PAPR) in Single-Carrier Frequency Division Multiple Access (SC-FDMA) systems. By Nonlinear Companding Transform (NCT) technique...
Intelligent encoding with added puzzle & TESLA security of packets Against Jamming Attacks in Wireless Network
Wireless network never has certain defined boundaries that can’t be extended due to this nature security flaws may get developed. Broadcast nature of wireless network makes it easy for intentional attacks to disturb...