Review of Image Compression and Encryption Techniques
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 2
Abstract
In line with a growing need for data and information transmission in a safe and quick manner, researches on image protection and security through a combination of cryptographic and compression techniques begin to take form. The combination of these two methods may include into three categories based on their process sequences. The first category, i.e. cryptographic technique followed by compression method, focuses more on image security than the reduction of a size of data. The second combination, compression technique followed by the cryptographic method, has an advantage where the compression technique can be lossy, lossless, or combination of both. The third category, i.e. compression and cryptographic technologies in a single process either partially or in the form of compressive sensing(CS) provides a good data safety assurance with such a low computational complexity that it is eligible for enhancing the efficiency and security of data/information transmission.
Authors and Affiliations
Emy Setyaningsih, Retantyo Wardoyo
Using Fuzzy Clustering Powered by Weighted Feature Matrix to Establish Hidden Semantics in Web Documents
Digital Data is growing exponentially exploding on the 'World Wide Web'. The orthodox clustering algorithms obligate various challenges to tackle, of which the most often faced challenge is the uncertainty. Web documents...
Physical Activity Identification using Supervised Machine Learning and based on Pulse Rate
Physical activity is one of the key components for elderly in order to be actively ageing. Pulse rate is a convenient physiological parameter to identify elderly’s physical activity since it increases with activity and d...
Multi-Agent System Testing: A Survey
In recent years, agent-based systems have received considerable attention in both academics and industry. The agent-oriented paradigm can be considered a natural extension to the object-oriented (OO) paradigm. Agents di...
Lempel - Ziv Implementation for a Compression System Model with Sliding Window Buffer
Proposed compression system architecture based on Lempel-Ziv algorithm with sliding window history buffer, this architecture may be realized on FPGA, and can provide input data streams from multiple sources and context s...
Competence Making on Computer Engineering Program by Using Analytical Hierarchy Process (AHP)
This paper shows competence election for the students of the Academy of Information Management and Computer (AIMC) Mataram on computer engineering courses who completed the study in semester 1, 2 and 3 and choose lesson...