An Effective Approach Of Compressing Encrypted Images

Abstract

In this paper proposing a novel scheme of scalable coding for encrypted images. In the encryption phase, the original pixel values are masked by a modulo- 256 addition with nonrandom numbers that are derived from a secret key. After decomposing the encrypted data into a down sampled subimage and several data sets with a multiple-resolution construction, an encoder calculates the subimage and the Hadamard coefficients of each data set to reduce the data amount. Then, the data calculates subimage and coefficients are regarded as a set of bitstreams. Because of the hierarchical coding mechanism, the principal original content with higher resolution can be reconstructed when more bitstreams are received.

Authors and Affiliations

s. v. v. d Jagadeesh, T Sudha Rani

Keywords

Related Articles

Mobility Prediction: A review of Techniques used in MANETS

Mobility prediction for individual path is a fascinating topic. Mobility prediction in mobile ad-hoc networks is a simple and effective scheme to predict when the user will leave from the current location and where he...

A Protective Scheme To Prevent The Attacker From Forging Acknowledgment Packets In Manets’s Using Eaack

Amongst all the modern wireless networks Mobile Ad hoc network (MANET) is one of the most significant and exclusive applications. MANET does not necessitate a fixed network infrastructure every single node works as b...

Implementation of Grid Based Distributed 3P4W System Using ANFIS Control

The increase in global energy demand and load demand, the Renewable Energy Sources (RES) are increasingly connected in the distribution systems which utilises power electronics Converters/Inverters. This paper sugges...

Invalid Detachment centered Outlier Recognition acquired from Reverse Nearest Neighbors

Data Mining essentially alludes to the extraction of exceptionally fascinating examples of the Data from the gigantic Data sets. Anomaly recognition is one of the imperative parts of Data mining which really discover...

Detect Sinking Ship in Wireless Sensor Networks By Using Dcd

A cut is nothing but a part of wireless sensor networks which is splited into different connection components because of some node failures in the network. This paper proposes a new algorithm to detect these cuts by...

Download PDF file
  • EP ID EP27716
  • DOI -
  • Views 270
  • Downloads 4

How To Cite

s. v. v. d Jagadeesh, T Sudha Rani (2013). An Effective Approach Of Compressing Encrypted Images. International Journal of Research in Computer and Communication Technology, 2(10), -. https://europub.co.uk./articles/-A-27716