Image Encryption and Iterative Reconstruction of an Encrypted Image
Journal Title: UNKNOWN - Year 2013, Vol 2, Issue 12
Abstract
Encryption is one of the ways to ensure high security for real time applications. In advanced Encryption and data-hiding, Encryption is done only on primary part of image and remaining part is sent as a plain image for secure data communication .A channel provider without the knowledge of a cryptographic key and original content may tend to reduce the data amount due to the limited channel resource. After encoding and on compression of encrypted data into a down sampled sub image and several data sets with a multiple-resolution construction, an encoder quantizes the sub image and the Hadamard-coefficients of each data set are obtained which tend to reduce the data amount. Obtained set of bit streams can be used to reconstruct the detailed content with an iteratively updating procedure and then decryption of data is performed. Because of this iteratively updating coding procedure, the principal original content with higher resolution can be reconstructed when more bit streams are received.
Extended Best Peer: A Peer-to-Peer Based System by Corporate Network for Data Sharing
The corporate network is always used for sharing information where share common among the contribute company and make easy association in a certain industry sector. Ultimately reply to the ever changing business demands...
Smart Antenna System for DOA Estimation using Nyström Based MUSIC Algorithm
This paper presents the high efficiency and low complexity MUltiple Signal Classification (MUSIC) algorithms for accurate direction of arrival (DOA) estimation. In this work, we proposed modified MUSIC algorithm for high...
A Survey Paper on Clustering-based Collaborative Filtering Approach to Generate Recommendations
The rapid development of information technology takes our shopping into the orbit of information. With the network construction of resources, the amount of shopping resources increases rapidly. Collaborative filtering (C...
Kayser-Fleischer Ring as the Initial Presentation of Wilson Disease - A Case Report and Review of Literature
An 18 year old female presented with bilateral Kayser Fleischer ring and bilateral sunflower cataract..There were coexisting hepatic symptoms.Her serology was positive for hepatitis B...Her ceruloplasmin levels were abn...
Database Privilege Management and Data Dictionary: Security Issues and Avoidance
Oracle is a relational database utilized by large number of organizations. Within a database management system every user will have certain privilege limitations, but Database Administrator (DBA) will have all the acces...