Modified Scheme For Lossy Compression An
Modified Scheme For Lossy Compression An
are elastic pixels. It is called decomposition. Here, with the knowledge of M and L1, the receiver may calculate
2. Pixels in first part as p1, p2, p3,…………,p(α. N) and pixels in L2, and then get the values of Sk by converting binary blocks with
second part as q1, q2,…,q(1 - α ). N L2 bits into digit pieces in an M-ary notational system. Obtain Sk
The value of α is within (0, 1). and all the parameters from compressed data.
3. Perform an orthogonal transform in the elastic pixels to calculate 2. According to the secret key, the receiver can retrieve the
the coefficients positions of rigid pixels. That means the original gray values
Q1, Q2……… Q (1 - α). N at the positions, which distribute over the entire image, can be
[Q1, Q2……… Q(1 - α). N] = [q1, q2……………….q(1 - α). N]. H exactly recovered.
Here, H is a public orthogonal matrix with a size of (1 - α). N x 3. For the pixels at other positions, i.e., the elastic pixels, their
(1 - α).N and it can be generated from orthogonal zing a random values are firstly estimated as the values of rigid pixels nearest to
matrix. them. That means, for each elastic pixel, we find the nearest rigid
Size of H = (1 - α). N x (1 - α). N pixel and regard the value of the rigid pixel as the estimated value
4. For each coefficient Q, calculate of the elastic pixel. If there are several nearest rigid pixels with the
same distance, regard their average value as the estimated value of
the elastic pixel. Because of spatial correlation in the natural image,
k = 1, 2 … (1 - α). N the estimated values are similar to the corresponding original
Where ∆ and M are system parameters. values. In the following, the estimation will be iteratively updated
The round operation returns the nearest integer and the mod by exploiting the information of Sk.
operation gets the remainder. Qk is converted into an integer Sk 4. Rearrange the estimated values of elastic pixels using the same
within permutation way, and denote them as q’1 q’2 ……….. q’(1 - α). N
[0, M -1]. 5. Calculate the coefficients
5. Then Qk = rk. ∆ + Sk. (∆/M) + tk [ Q’1 , Q’2 ……… Q’(1 - α). N ]
rk = rough information and = [ q’1 q’2 ……….. q’(1 - α). N ] . H
tk = fine information 6. Calculate the differences
The rough information rk and the fine information tk are discarded.
While only the information Sk on the medium level remains.
The rough information rk will be retrieved by an iterative image k = 1,2,………….. (1 - α). N
reconstruction procedure, and the loss of the fine information tk 7. Modify the coefficients to the closest values consistent with
cannot seriously affect the quality of the reconstructed image, the corresponding Sk.
Where 8. Perform inverse transform
[ q’’1 q’’2 ……….. q’’(1 - α). N]
= [ Q’’1 , Q’’2 ……… Q’’(1 - α). N ] . H-1
9. Calculate the average energy of difference between the two
versions of elastic pixels
6. Segment the set of sk into many pieces with L1 digits and
calculate the decimal value of each digit piece. Then, convert each
decimal value into L2 bits in a binary notational system, • If D is greater than a threshold T (recommended 0.05), go
where back to step 5 –iterating.
L2= [L1.Log2 M] • Otherwise, terminate the iteration and output the image made
The total length of bits generated from all pieces of sk is up of the rigid pixels and the final version of elastic pixels.
L=(1-α).N.Log2 M
Then each value of sk is represented by Log2 M bits. III. System Design
7. Collect the data of rigid pixels, the bits generated from all 1. In encryption the pixel values are same after encryption but
pieces of Sk, and the values of parameters including N1, N2, their position will be changed.
α, ∆, M and L1 to produce the compressed data of encrypted 2. Permuted pixels are divided in to rigid and elastic pixels.
image. Compression ratio R is a ratio between the amounts of the Perform orthogonal transform in elastic pixels. Remove rough and
compressed data and the original image data, is approximately fine information and keep Sk. Finally collecting all data calculate
compression ratio.
3. In reconstruction according to the secret key, the receiver can
retrieve the positions of rigid pixels.
4. For each elastic pixel, we find the nearest rigid pixel and
regard the value of the rigid pixel as the estimated value of the
elastic pixel. If there are several nearest rigid pixels with the same
D. Image Reconstruction distance, regard their average value as the estimated value of the
In this system, iterative reconstruction is used because iterative elastic pixel. Because of spatial correlation in the natural image,
approach includes improved insensitivity to noise and capability the estimated values are similar to the corresponding original
of reconstructing an optimal image in the case of incomplete data values.
with the compressed data and the secret key. 5. Modify the coefficients to the closest values consistent with
the corresponding Sk.
E. Steps of Image Reconstruction 7. Perform inverse transform.
1. Decompose the compressed data and obtain the gray values 8. Calculate the average energy of difference between the two
of rigid pixels, the values of all Sk, and the values of parameters. versions of elastic pixels.
Fig. 3: (a) Original image Lena, (b) its encrypted version, (c).
the medium reconstructed image from compressed data with less
PSNR, and (d) the final reconstructed image with more PSNR
V. Conclusion
In this work, image encryption is obtained by changing the position
of pixels. Performing orthogonal transform in permuted pixels
and then removing rough and fine information compression is
Fig. 2: Total Procedure of Encryption, Compression and obtained. In iterative procedure in each step update the values of
Reconstruction coefficients and reconstruction of original principal content. The
compression ratio and the quality of reconstructed image vary with
IV. Result different values of compression parameters. In general higher the
The test image Lena, shown in fig. 3(a) sized 512 x 512 used as compression ratio and the smoother the original image, the better
the original image. After pixel permutation, the encrypted data of the quality of the reconstructed image.
the image were produced, fig. 3(b). For showing their disorder, the
encrypted pixel sequence is rearranged as a matrix with size of References
512 x 512. Then, we compressed the encrypted data with different [1] A. Mitra, Y. V. Subba Rao, S. R. M. Prasanna,“A New Image
values of and M and then calculate the compression ratio R with Encryption Approach using Combinational Permutation
different values ofand M. With the compressed data, the receiver Techniques”, International Journal of Electrical and Computer
can retrieve the original content by using the image reconstruction Engineering, 1, 2 pp. 127-131, 2006.
procedure, fig. 3(c) and fig. 3(d). In which all rigid pixels are [2] Xinpeng Zhang,“Lossy Compression and Iterative
recovered and the elastic pixels are estimated as the values of Reconstruction for Encrypted Image”, IEEE transactions
their nearest rigid pixels. on Information Forensics and Security, Vol. 6, No. 1, March
2011.
[3] Wei Liu, Wenjun Zeng, Lina Dong, and Qiuming Yao
“Efficient Compression of Encrypted Grayscale Images”,
IEEE Transactions on Image Processing, Vol. 19, No. 4, pp.
10971102, April 2010.
[4] D. Schonberg, S. C. Draper, C. Yeo, K. Ramchandran, “Toward
compression of encrypted images and video sequences”,
IEEE Transactions Information Forensics Security, Vol. 3,
No. 4, pp. 749–762, Dec. 2008.
[5] Daniel Schonberg, Stark C. Draper, Chuohao Yeo, Kannan
Ramchandran,“Towards Compression of Encrypted Images
and Video Sequences”.
[6] Ibrahim Fathy El-Ashry,“Digital Image Encryption”, A Thesis
Submitted for The Degree of M. Sc. of Communications
Engineering.