SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 10 | Oct -2015, Available @ http://www.ijret.org 53
HIGHLY SECURE SCALABLE COMPRESSION OF ENCRYPTED
IMAGES
Maria Joseph1
, Tomson Devis2
1
M.Tech student, Department of Electronics & Communication Engg., St. Joseph’s College of Engineering &
Technology-Palai, Kerala, India, hellomariajoseph@gmail.com
2
Assistant Professor, Department of Electronics & Communication Engg., St. Joseph’s College of Engineering &
Technology-Palai, Kerala, India, tomsondevis@yahoo.com
Abstract
A highly secure scalable compression method for stream cipher encrypted images is described in this journal. The input image
first undergoes encryption and then shuffling. This shuffling in the image pixels enhances the security. For shuffling, Henon map
is used. There are two layers for the scalable compression namely base layer and enhancement layer. Base layer bits are
produced by coding a series of non-overlapping patches of uniformly down sampled version of encrypted image. In the
enhancement layer pixels are selected by random permutation and then coded. From all the available pixel samples an iterative
multi scale technique is used to reconstruct the image and finally performs decryption. The proposed method has high security.
Key Words: Encryption, Decryption, Shuffling, Scalable compression
--------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
The role of computers and networks has made considerable
change in human life. So one of the important issues we
should consider is that protecting our data from a third party.
Most of the data that we send through our network is clear
and it is easy for an unwanted person to capture it.
Encryption is considered as the method of transforming the
data into a secret code. To read an encrypted data there must
access to the secret key so that we can decrypt it. Modern
encryption algorithm uses a key to decrypt it.
Encryption is actually a technique used to convert the data
into an unreadable format. Each encryption algorithm uses a
set of strings called key. Larger the length of key greater is
the security. This is because when length of the key
increases the possible number of combinations increases and
thus make a third party to difficult to decrypt. A system used
for encrypting and decrypting data is called cryptosystems.
These usually involve combining plain text with one or
more strings called key and making cipher text. The security
of cryptosystems lies in the security of a key rather than the
secrecy of algorithm. A strong cryptosystems has a wide
range of possible key combinations and it is not possible to
try all these key pairs. At the same time a strong
cryptosystems will produce random output to all statistical
methods and will resist to all methods for breaking codes.
Consider redundant data is transmitting through an insecure
bandwidth limited channel. The traditional way to transmit
this is to first compress it and then encrypt the data.
Compression itself means removing the redundant patterns.
Compression also means that reducing the dimensions. After
compression there will be fewer bits. But there will contain
more information per bit.
Fig -1: Traditional way of sending message
In this figure -1 an information source wants to send a
message through a public channel. The traditional way to do
this is to first compress and then encrypt. So the data is first
compressed and then encryption takes place by using a
secure key. At the receiver side, reverse process happens.
i.e, first decryption and decompression happens. For
decryption the same key used for encryption should be used.
This is symmetric cryptography. That is, same key is used
for both encryption and decryption. But there exist always
an eavesdropper in the public channel for attacking the
secure message.
Fig -2: Compression Then Encryption (CTE) System
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 10 | Oct -2015, Available @ http://www.ijret.org 54
Consider a case in figure -2 in which Alice wants to send a
message securely and efficiently to Bob through an
untrusted channel provider Charlie. Conventionally this
could be done as follows: Alice first compress the data into
B and then encrypts into E using an encryption function
E(K), where K is used as the secret key. The encrypted data
E is then forwarded to Bob by Charlie, where Charlie is the
network provider. Upon receiving E, Bob sequentially
decode and decompress the message to retrieve the data I.
This conventional system meets many requirements but
even though in some situations we have to reverse the order
of encryption and compression. Alice is always interested in
securing her data. So she is only performing the encryption
algorithm when she has limited number of computational
resources. So in this case encryption is done by Alice at first
and then Compression is done by Charlie. So this has led to
Encryption Then Compression (ETC) System as in Figure -
3. The main task here is that compression has to be carried
out in the encryption domain as Charlie has no access to the
secret key.
Fig -3: Encryption Then Compression (ETC) System
2. RELATED WORK
Jiantao et. al proposed a scalable compression method for
stream cipher encrypted images [1]. They used standard
stream cipher format. The bit stream in the base layer is
produced by first down sampling the encrypted image and
then a series of non-overlapping patches are formed which
are uniform in nature. Johnson et. al examined the
possibility of encrypting a data stream and compressing it
without knowledge of key [2]. Using distributed source
coding principles the encrypted data can be compressed
because key will be available at the decoder. Schonberg et.
al extended Johnson’s work by considering information
source with memory [3] [4]. Using minimal number of bits
they transmitted encrypted source in this work. By applying
LDPC codes in various bit planes and exploiting the
intra/inter correlation Lazzeretti and Barni suggested
method for lossless compression of gray/color images [5].
By using the principle of source coding with side
information principle they recently demonstrated the
possibility of lossless compression of encrypted images.
Kumar and Makur applied Johnson et. al approach to the
prediction error domain by using the iid property of
prediction error sequences and achieved higher lossless
compression performance for both gray scale and color
images [6]. After the compression of gray scale and color
images which is carried out in lossless domain only
encryption is performed here. In addition to the lossless
compression, lossy compression was also investigated which
has higher compression ratios. Kumar and Makur proposed
compressive sensing mechanism to compress encrypted
images [7]. By using a modified pursuit algorithm the
original image could be estimated from the compressed and
encrypted data. Liu et. al proposed a lossless progressive
compression technique for gray / color scale images [8].
Through Slepian Wolf coding lossless compression of
encrypted images can be possible. Zhang designed an image
encryption method by performing permutation operations in
the pixel domain and showed that the resultant file can be
compressed by discarding the fine and rough coefficients in
the transform domain [9]. Here lossy compression of
encrypted image is discussed with flexible compression
ratio. Zhang et. al proposed a scalable lossy coding of
encrypted images through a multi resolution construction.
Here scalable coding of encrypted images is described [10].
Klinc et. al extended Johnson’s work to efficiently compress
block cipher encrypted data [11]. Here compression of block
cipher is considered. Zhang et. al proposed a new technique
for the compression of encrypted images through multi-layer
decomposition [12]. This is lossy compression of encrypted
gray images. Kang et. al proposed an interpolation based
technique for decompressing and there compression is
gained by down sampling and bit plane decomposition [13].
When more bit planes are transmitted higher quality of
reconstructed image can be achieved. Zhang et. al proposes
a method for compressing encrypted images in which the
information owner Alice also generates some auxiliary
information that can be used for compression and
reconstruction [14].
3. PROPOSED METHODOLOGY
In this we consider conventional stream cipher which is
applied in the standard format. That means cipher text is
produced by bitwise XORing the plain text with the key
stream. The scenario of scalable coding of encrypted image
is shown in figure -4. This work proposes a novel scalable
compression for shuffled encrypted images which has better
security. The input image first undergoes encryption in the
standard format (AES-CTR). For encryption we use AES-
128. That means the secure key that we used here is of 128
bit length. After encryption, the encrypted image undergoes
shuffling in order to increase the security. For shuffling we
use Henon map. A Henon map has the most chaotic
behavior. Here the Henon map takes a point and maps into
another point by using these two equations.
Xn+1 = 1-axn
2
+yn
Yn+1 = bxn
The shuffled image undergoes scalable compression. There
are two layers namely base layer and enhancement layer in
the scalable compression. The base layer bits Bb and
enhancement layer bits Be are generated here. From those
bits image is reconstructed and then undergoes
rearrangement of pixels. After that, it is given to the
decryption block where decryption is performed using the
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 10 | Oct -2015, Available @ http://www.ijret.org 55
same key stream. The scalable image encoding scheme is
shown in figure -5. In order to generate base layer bits we
first uniformly down sample the shuffled image which then
undergoes wavelet decomposition. After that we divide the
latter into different patches which must be a series of non-
overlapping patches. Then we apply lossless encoding to
each of the patch to produce the base layer bit stream. The
final bit stream is generated by concatenating all the bits
from patches. Extra bits for reconstruction other than base
bits are produced by the enhancement layer. In this layer we
select pixels by random permutation. The same procedure to
generate base layer bits is adopted to this selected pixels and
by applying lossless encoding enhancement bits is finally
generated.
Fig -4: Scenario of scalable coding of encrypted images
Fig -5: Scalable image coding scheme
At the receiver side reverse process happens. That is lossless
decoding and wavelet reconstruction is done. And then the
image is decoded. Then the pixels are rearranged by using
sorting and Henon map. For final reconstruction of the
image an iterative interpolation technique called Soft
Adaptive Interpolation (SAI) is used. Finally the original
image is retrieved by using decryption. Same 128 bit key
that is used for encryption must be used for the proper
decryption.
4. RESULTS AND DISCUSSION
The proposed method has been tested for different gray
scale images. And it is possible to reconstruct the image
with more security. It is implemented by using MATLAB
2012. For input image AES - CTR encryption is applied.
Key used here is of 128 bit length. Figure -6 shows the input
image which undergoes encryption and figure -7 shows the
encrypted image. This encrypted image undergoes shuffling
by using Henon map for better security. This is shown in
figure -8. The shuffled image undergoes compression. This
means that the shuffled image is the input to both the base
and enhancement layer.
At the base layer the shuffled image is down sampled and
then undergoes wavelet decomposition at level 3. This is
shown in figure -9. After that it is divided into different
patches and apply Slepian wolf encoding. The bits generated
are shown in figure -10. Similarly enhancement layer bits
are produced by applying wavelet decomposition and
Slepian wolf encoding. This is shown in figure -11 and
figure -12.
At the receiver side reverse process happens and the image
is decoded. It is shown in figure -13. Rearrangement of
pixels is then done. After that image is reconstructed by
using Soft decision Adaptive Interpolation (SAI). This is
shown in figure -14. Finally, decryption is performed and
image is decrypted. It is shown in figure -15.
Fig -6: Input image
Fig -7: Encrypted image
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 10 | Oct -2015, Available @ http://www.ijret.org 56
Fig -8: Shuffled image
Fig -9: Wavelet decomposition at level 3 (base layer)
Fig -10: Base layer bits
Fig -11: Wavelet decomposition (Enhancement layer)
Fig -12: Enhancement layer bits
Fig -13: Decoded image
Fig -14: Reconstructed image
Fig -15: Decrypted image
5. CONCLUSION
This work proposes a highly secure scalable compression of
stream cipher encrypted images. Security is achieved by
shuffling the encrypted image by Henon map. Henon map
has the highly chaotic behavior and pixel position will be
mapped to a new position. The value of the pixel remains
same here. The entire pixels will be shuffled and thus an
eavesdropper cannot able to identify the original data. From
the base layer and enhancement layer bits the decoder
applies an iterative multi scale technique to reconstruct the
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 10 | Oct -2015, Available @ http://www.ijret.org 57
image. It has been tested on a large database and realized
that the proposed method has high security.
REFERENCES
[1]. Jiantao Zhou, Oscar C. Au, Guangtao Zhai, Yuan
Yan Tang and Xianming Liu, “Scalable compression
of stream cipher encrypted images through context
adaptive sampling”, IEEE transactions on
Information Forensics and Security, Vol. 9, No. 11,
November 2014.
[2]. M. Johnson, P. Ishwar, V. Prabhakaran, D.
Schonberg and K. Ramachandran, “On compressing
encrypted data”, IEEE Trans. Signal Process.,Vol.
52, No. 10, Oct 2004.
[3]. D. Schonberg, S. C. Draper and K. Ramachandran,
“On blind compression of encrypted correlated data
approaching the source entropy rate”, in Proc.43rd
Annu. Allerton Conf. Commun., Control, Comput.,
2005.
[4]. D. Schonberg, S. Draper and K. Ramachandran, “On
compression of encrypted images”, in Proc. IEEE
Int. Conf. Image Process., Oct. 2006.
[5]. R. Lazzeretti and M. Barni, “Lossless compression of
encrypted grey level and color images”, in Proc. 16th
Eur. Signal Process. Conf. (EUSIPCO), 2008.
[6]. Kumar and A. Makur, “Distributed source coding
based encryption and lossless compression of gray
scale and color images”, in Proc. 10th
Workshop
MMSP, Oct. 2008.
[7]. A Kumar and A. Makur, “Lossy compression of
encrypted image by compressive sensing technique”,
in Proc. IEEE Region 10th
Conf., Jan. 2009.
[8]. W. Liu, W. Zeng, L. Dong and Q. Yao, “Efficient
compression of encrypted grayscale images”, IEEE
Tans. Image Process., Vol. 19, No. 4, Apr. 2010.
[9]. X. Zhang, Y. Ren, G. Feng and Z. Qian,
“Compressing encrypted image using compressive
sensing”, in Proc. 7th
IEEE Int. Conf., IIH-MSP, Oct.
2011.
[10]. X. Zhang, G. Feng, Y. Ren and Z. Qian , “Scalable
coding of encrypted images”, IEEE Trans. Image
Process., Vol. 21, No.6, Jun. 2012.
[11]. D. Klinc, C. Hazay, A. Jagmohan, H. Krawczyk and
T. Rabin, “On compression of data encrypted with
block ciphers” IEEE Trans. Inf. Theory, Vol. 58, No.
11, Nov. 2012.
[12]. X. Zhang, G. Sun, L. Shen and C. Qin, “Compression
of encrypted images with multi-layer
decomposition”, Multimedia Tools Appl., Vol. 72,
No. 1, Feb. 2013.
[13]. X. Kang, A. Peng , X. Xu and X. Cao , “Performing
scalable lossy compression on pixel encrypted
images”, EURASIP J. Image Video Process, Vol.
2013, No. 32, May 2013.
[14]. X. Zhang, Y. Ren, L. Shen, Z. Qian and G. Freng,
“Compressing encrypted images with auxiliary
information”, IEEE Trans. Multimedia Vol. 16, No.
5, Aug. 2014.

More Related Content

What's hot (20)

Image Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding TechniqueImage Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding Technique
IOSR Journals
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT Approach
IJERA Editor
 
A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication
cscpconf
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
inventy
 
A novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptographyA novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptography
Zac Darcy
 
New approach in symmetric block cipher security using a new cubical technique
New approach in symmetric block cipher security using a new cubical techniqueNew approach in symmetric block cipher security using a new cubical technique
New approach in symmetric block cipher security using a new cubical technique
ijcsit
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
Sreeda Perikamana
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
Pradeep Vishwakarma
 
Image Security
Image SecurityImage Security
Image Security
Satyendra Rajput
 
A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images
IJECEIAES
 
H43064650
H43064650H43064650
H43064650
IJERA Editor
 
Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniquePerformance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption technique
Ancy Mariam Babu
 
Ew4301904907
Ew4301904907Ew4301904907
Ew4301904907
IJERA Editor
 
An improved color image encryption algorithm with
An improved color image encryption algorithm withAn improved color image encryption algorithm with
An improved color image encryption algorithm with
eSAT Publishing House
 
An improved color image encryption algorithm with pixel permutation and bit s...
An improved color image encryption algorithm with pixel permutation and bit s...An improved color image encryption algorithm with pixel permutation and bit s...
An improved color image encryption algorithm with pixel permutation and bit s...
eSAT Journals
 
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGDATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
IJNSA Journal
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
IJERD Editor
 
Ijariie1132
Ijariie1132Ijariie1132
Ijariie1132
IJARIIE JOURNAL
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
IRJET Journal
 
Image Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding TechniqueImage Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding Technique
IOSR Journals
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT Approach
IJERA Editor
 
A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication
cscpconf
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
inventy
 
A novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptographyA novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptography
Zac Darcy
 
New approach in symmetric block cipher security using a new cubical technique
New approach in symmetric block cipher security using a new cubical techniqueNew approach in symmetric block cipher security using a new cubical technique
New approach in symmetric block cipher security using a new cubical technique
ijcsit
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
Sreeda Perikamana
 
A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images
IJECEIAES
 
Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniquePerformance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption technique
Ancy Mariam Babu
 
An improved color image encryption algorithm with
An improved color image encryption algorithm withAn improved color image encryption algorithm with
An improved color image encryption algorithm with
eSAT Publishing House
 
An improved color image encryption algorithm with pixel permutation and bit s...
An improved color image encryption algorithm with pixel permutation and bit s...An improved color image encryption algorithm with pixel permutation and bit s...
An improved color image encryption algorithm with pixel permutation and bit s...
eSAT Journals
 
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGDATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
IJNSA Journal
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
IJERD Editor
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
IRJET Journal
 

Viewers also liked (17)

An octo coding technique to reduce energy transition in low power vlsi circuits
An octo coding technique to reduce energy transition in low power vlsi circuitsAn octo coding technique to reduce energy transition in low power vlsi circuits
An octo coding technique to reduce energy transition in low power vlsi circuits
eSAT Journals
 
Design and development of load sharing multipath routing protcol for mobile a...
Design and development of load sharing multipath routing protcol for mobile a...Design and development of load sharing multipath routing protcol for mobile a...
Design and development of load sharing multipath routing protcol for mobile a...
eSAT Journals
 
An analysis of drivers affecting the implementation of green supply chain man...
An analysis of drivers affecting the implementation of green supply chain man...An analysis of drivers affecting the implementation of green supply chain man...
An analysis of drivers affecting the implementation of green supply chain man...
eSAT Journals
 
Morphology and characterization of srxcu1 xo [x=0.1]
Morphology and characterization of srxcu1 xo [x=0.1]Morphology and characterization of srxcu1 xo [x=0.1]
Morphology and characterization of srxcu1 xo [x=0.1]
eSAT Journals
 
Innovative concept of coiling machine integrated with rolling mill to replace...
Innovative concept of coiling machine integrated with rolling mill to replace...Innovative concept of coiling machine integrated with rolling mill to replace...
Innovative concept of coiling machine integrated with rolling mill to replace...
eSAT Journals
 
Performance characteristics of a hybrid wing for uav
Performance characteristics of a hybrid wing for uavPerformance characteristics of a hybrid wing for uav
Performance characteristics of a hybrid wing for uav
eSAT Journals
 
Photovoltaic thermal hybrid solar system for residential applications
Photovoltaic thermal hybrid solar system for residential applicationsPhotovoltaic thermal hybrid solar system for residential applications
Photovoltaic thermal hybrid solar system for residential applications
eSAT Journals
 
Quantifying modelingon risk of travel demand and measure to sustaining road s...
Quantifying modelingon risk of travel demand and measure to sustaining road s...Quantifying modelingon risk of travel demand and measure to sustaining road s...
Quantifying modelingon risk of travel demand and measure to sustaining road s...
eSAT Journals
 
Finite element based static and dynamic analysis of tensairity spindle structure
Finite element based static and dynamic analysis of tensairity spindle structureFinite element based static and dynamic analysis of tensairity spindle structure
Finite element based static and dynamic analysis of tensairity spindle structure
eSAT Journals
 
Preliminary study of multi view imaging for accurate 3 d reconstruction using...
Preliminary study of multi view imaging for accurate 3 d reconstruction using...Preliminary study of multi view imaging for accurate 3 d reconstruction using...
Preliminary study of multi view imaging for accurate 3 d reconstruction using...
eSAT Journals
 
Pyramid type plate bending machine
Pyramid type plate bending machinePyramid type plate bending machine
Pyramid type plate bending machine
eSAT Journals
 
Road signs
Road signsRoad signs
Road signs
eSAT Journals
 
Performance investigation of re shuffling packet attack on transport layer pr...
Performance investigation of re shuffling packet attack on transport layer pr...Performance investigation of re shuffling packet attack on transport layer pr...
Performance investigation of re shuffling packet attack on transport layer pr...
eSAT Journals
 
A novel approach to information security using safe exchange of encrypted dat...
A novel approach to information security using safe exchange of encrypted dat...A novel approach to information security using safe exchange of encrypted dat...
A novel approach to information security using safe exchange of encrypted dat...
eSAT Journals
 
Power system solution provided by facts and hvdc
Power system solution provided by facts and hvdcPower system solution provided by facts and hvdc
Power system solution provided by facts and hvdc
eSAT Journals
 
Optimization of extrusion process for production of texturized flaxseed defat...
Optimization of extrusion process for production of texturized flaxseed defat...Optimization of extrusion process for production of texturized flaxseed defat...
Optimization of extrusion process for production of texturized flaxseed defat...
eSAT Journals
 
Seismic response of transmission tower a case study
Seismic response of transmission tower   a case studySeismic response of transmission tower   a case study
Seismic response of transmission tower a case study
eSAT Journals
 
An octo coding technique to reduce energy transition in low power vlsi circuits
An octo coding technique to reduce energy transition in low power vlsi circuitsAn octo coding technique to reduce energy transition in low power vlsi circuits
An octo coding technique to reduce energy transition in low power vlsi circuits
eSAT Journals
 
Design and development of load sharing multipath routing protcol for mobile a...
Design and development of load sharing multipath routing protcol for mobile a...Design and development of load sharing multipath routing protcol for mobile a...
Design and development of load sharing multipath routing protcol for mobile a...
eSAT Journals
 
An analysis of drivers affecting the implementation of green supply chain man...
An analysis of drivers affecting the implementation of green supply chain man...An analysis of drivers affecting the implementation of green supply chain man...
An analysis of drivers affecting the implementation of green supply chain man...
eSAT Journals
 
Morphology and characterization of srxcu1 xo [x=0.1]
Morphology and characterization of srxcu1 xo [x=0.1]Morphology and characterization of srxcu1 xo [x=0.1]
Morphology and characterization of srxcu1 xo [x=0.1]
eSAT Journals
 
Innovative concept of coiling machine integrated with rolling mill to replace...
Innovative concept of coiling machine integrated with rolling mill to replace...Innovative concept of coiling machine integrated with rolling mill to replace...
Innovative concept of coiling machine integrated with rolling mill to replace...
eSAT Journals
 
Performance characteristics of a hybrid wing for uav
Performance characteristics of a hybrid wing for uavPerformance characteristics of a hybrid wing for uav
Performance characteristics of a hybrid wing for uav
eSAT Journals
 
Photovoltaic thermal hybrid solar system for residential applications
Photovoltaic thermal hybrid solar system for residential applicationsPhotovoltaic thermal hybrid solar system for residential applications
Photovoltaic thermal hybrid solar system for residential applications
eSAT Journals
 
Quantifying modelingon risk of travel demand and measure to sustaining road s...
Quantifying modelingon risk of travel demand and measure to sustaining road s...Quantifying modelingon risk of travel demand and measure to sustaining road s...
Quantifying modelingon risk of travel demand and measure to sustaining road s...
eSAT Journals
 
Finite element based static and dynamic analysis of tensairity spindle structure
Finite element based static and dynamic analysis of tensairity spindle structureFinite element based static and dynamic analysis of tensairity spindle structure
Finite element based static and dynamic analysis of tensairity spindle structure
eSAT Journals
 
Preliminary study of multi view imaging for accurate 3 d reconstruction using...
Preliminary study of multi view imaging for accurate 3 d reconstruction using...Preliminary study of multi view imaging for accurate 3 d reconstruction using...
Preliminary study of multi view imaging for accurate 3 d reconstruction using...
eSAT Journals
 
Pyramid type plate bending machine
Pyramid type plate bending machinePyramid type plate bending machine
Pyramid type plate bending machine
eSAT Journals
 
Performance investigation of re shuffling packet attack on transport layer pr...
Performance investigation of re shuffling packet attack on transport layer pr...Performance investigation of re shuffling packet attack on transport layer pr...
Performance investigation of re shuffling packet attack on transport layer pr...
eSAT Journals
 
A novel approach to information security using safe exchange of encrypted dat...
A novel approach to information security using safe exchange of encrypted dat...A novel approach to information security using safe exchange of encrypted dat...
A novel approach to information security using safe exchange of encrypted dat...
eSAT Journals
 
Power system solution provided by facts and hvdc
Power system solution provided by facts and hvdcPower system solution provided by facts and hvdc
Power system solution provided by facts and hvdc
eSAT Journals
 
Optimization of extrusion process for production of texturized flaxseed defat...
Optimization of extrusion process for production of texturized flaxseed defat...Optimization of extrusion process for production of texturized flaxseed defat...
Optimization of extrusion process for production of texturized flaxseed defat...
eSAT Journals
 
Seismic response of transmission tower a case study
Seismic response of transmission tower   a case studySeismic response of transmission tower   a case study
Seismic response of transmission tower a case study
eSAT Journals
 

Similar to Highly secure scalable compression of encrypted images (20)

Presentation_Format (1).ppt
Presentation_Format (1).pptPresentation_Format (1).ppt
Presentation_Format (1).ppt
PavanNagre6
 
37de29c2ae88c046317fcfbebd7a66784874
37de29c2ae88c046317fcfbebd7a6678487437de29c2ae88c046317fcfbebd7a66784874
37de29c2ae88c046317fcfbebd7a66784874
hemant gupta
 
Color image encryption based on chaotic shit keying with lossless compression
Color image encryption based on chaotic shit keying with lossless compression Color image encryption based on chaotic shit keying with lossless compression
Color image encryption based on chaotic shit keying with lossless compression
IJECEIAES
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
IJERA Editor
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
IJERA Editor
 
Scalable Image Encryption Based Lossless Image Compression
Scalable Image Encryption Based Lossless Image CompressionScalable Image Encryption Based Lossless Image Compression
Scalable Image Encryption Based Lossless Image Compression
IJERA Editor
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd Iaetsd
 
01337277
0133727701337277
01337277
Manju Siwach
 
A survey of rgb color image
A survey of rgb color imageA survey of rgb color image
A survey of rgb color image
ZiadAlqady
 
A survey of rgb color image
A survey of rgb color imageA survey of rgb color image
A survey of rgb color image
ZiadAlqady
 
A survey of rgb color image
A survey of rgb color imageA survey of rgb color image
A survey of rgb color image
ZiadAlqady
 
A survey of rgb color image
A survey of rgb color imageA survey of rgb color image
A survey of rgb color image
ZiadAlqady
 
Sub1584
Sub1584Sub1584
Sub1584
International Journal of Science and Research (IJSR)
 
Encrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image SlicingEncrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image Slicing
IRJET Journal
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
eSAT Publishing House
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
eSAT Journals
 
JPM1404 Designing an Efficient Image Encryption-Then-Compression System via...
JPM1404   Designing an Efficient Image Encryption-Then-Compression System via...JPM1404   Designing an Efficient Image Encryption-Then-Compression System via...
JPM1404 Designing an Efficient Image Encryption-Then-Compression System via...
chennaijp
 
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
IRJET Journal
 
Bt32444450
Bt32444450Bt32444450
Bt32444450
IJERA Editor
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Designing an efficient image encr...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Designing an efficient image encr...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Designing an efficient image encr...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Designing an efficient image encr...
IEEEBEBTECHSTUDENTPROJECTS
 
Presentation_Format (1).ppt
Presentation_Format (1).pptPresentation_Format (1).ppt
Presentation_Format (1).ppt
PavanNagre6
 
37de29c2ae88c046317fcfbebd7a66784874
37de29c2ae88c046317fcfbebd7a6678487437de29c2ae88c046317fcfbebd7a66784874
37de29c2ae88c046317fcfbebd7a66784874
hemant gupta
 
Color image encryption based on chaotic shit keying with lossless compression
Color image encryption based on chaotic shit keying with lossless compression Color image encryption based on chaotic shit keying with lossless compression
Color image encryption based on chaotic shit keying with lossless compression
IJECEIAES
 
Scalable Image Encryption Based Lossless Image Compression
Scalable Image Encryption Based Lossless Image CompressionScalable Image Encryption Based Lossless Image Compression
Scalable Image Encryption Based Lossless Image Compression
IJERA Editor
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd Iaetsd
 
A survey of rgb color image
A survey of rgb color imageA survey of rgb color image
A survey of rgb color image
ZiadAlqady
 
A survey of rgb color image
A survey of rgb color imageA survey of rgb color image
A survey of rgb color image
ZiadAlqady
 
A survey of rgb color image
A survey of rgb color imageA survey of rgb color image
A survey of rgb color image
ZiadAlqady
 
A survey of rgb color image
A survey of rgb color imageA survey of rgb color image
A survey of rgb color image
ZiadAlqady
 
Encrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image SlicingEncrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image Slicing
IRJET Journal
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
eSAT Publishing House
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
eSAT Journals
 
JPM1404 Designing an Efficient Image Encryption-Then-Compression System via...
JPM1404   Designing an Efficient Image Encryption-Then-Compression System via...JPM1404   Designing an Efficient Image Encryption-Then-Compression System via...
JPM1404 Designing an Efficient Image Encryption-Then-Compression System via...
chennaijp
 
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
IRJET Journal
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Designing an efficient image encr...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Designing an efficient image encr...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Designing an efficient image encr...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Designing an efficient image encr...
IEEEBEBTECHSTUDENTPROJECTS
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
eSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
eSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
eSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
eSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
eSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
eSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
eSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
eSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
eSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
eSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
eSAT Journals
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
eSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
eSAT Journals
 
Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
eSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
eSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
eSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
eSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
eSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
eSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
eSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
eSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
eSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
eSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
eSAT Journals
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
eSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
eSAT Journals
 

Recently uploaded (20)

Introduction-to-Prestressed-Concrete.pdf
Introduction-to-Prestressed-Concrete.pdfIntroduction-to-Prestressed-Concrete.pdf
Introduction-to-Prestressed-Concrete.pdf
Bharti Shinde
 
DIGITAL ELECTRONICS: UNIT-III SYNCHRONOUS SEQUENTIAL CIRCUITS
DIGITAL ELECTRONICS: UNIT-III SYNCHRONOUS SEQUENTIAL CIRCUITSDIGITAL ELECTRONICS: UNIT-III SYNCHRONOUS SEQUENTIAL CIRCUITS
DIGITAL ELECTRONICS: UNIT-III SYNCHRONOUS SEQUENTIAL CIRCUITS
Sridhar191373
 
Silent-Aire Quality Orientation - OFCI_GC - EVAP Unit REV2.pdf
Silent-Aire Quality Orientation - OFCI_GC - EVAP Unit REV2.pdfSilent-Aire Quality Orientation - OFCI_GC - EVAP Unit REV2.pdf
Silent-Aire Quality Orientation - OFCI_GC - EVAP Unit REV2.pdf
EfrainGarrilloRuiz1
 
ISO 4548-7 Filter Vibration Fatigue Test Rig Catalogue.pdf
ISO 4548-7 Filter Vibration Fatigue Test Rig Catalogue.pdfISO 4548-7 Filter Vibration Fatigue Test Rig Catalogue.pdf
ISO 4548-7 Filter Vibration Fatigue Test Rig Catalogue.pdf
FILTRATION ENGINEERING & CUNSULTANT
 
BEC602- Module 3-2-Notes.pdf.Vlsi design and testing notes
BEC602- Module 3-2-Notes.pdf.Vlsi design and testing notesBEC602- Module 3-2-Notes.pdf.Vlsi design and testing notes
BEC602- Module 3-2-Notes.pdf.Vlsi design and testing notes
VarshithaP6
 
Air Filter Flat Sheet Media-Catalouge-Final.pdf
Air Filter Flat Sheet Media-Catalouge-Final.pdfAir Filter Flat Sheet Media-Catalouge-Final.pdf
Air Filter Flat Sheet Media-Catalouge-Final.pdf
FILTRATION ENGINEERING & CUNSULTANT
 
Unit 6 Message Digest Message Digest Message Digest
Unit 6  Message Digest  Message Digest  Message DigestUnit 6  Message Digest  Message Digest  Message Digest
Unit 6 Message Digest Message Digest Message Digest
ChatanBawankar
 
Prediction of Unconfined Compressive Strength of Expansive Soil Amended with ...
Prediction of Unconfined Compressive Strength of Expansive Soil Amended with ...Prediction of Unconfined Compressive Strength of Expansive Soil Amended with ...
Prediction of Unconfined Compressive Strength of Expansive Soil Amended with ...
Journal of Soft Computing in Civil Engineering
 
Software_Engineering_in_6_Hours_lyst1728638742594.pdf
Software_Engineering_in_6_Hours_lyst1728638742594.pdfSoftware_Engineering_in_6_Hours_lyst1728638742594.pdf
Software_Engineering_in_6_Hours_lyst1728638742594.pdf
VanshMunjal7
 
Better Builder Magazine, Issue 53 / Spring 2025
Better Builder Magazine, Issue 53 / Spring 2025Better Builder Magazine, Issue 53 / Spring 2025
Better Builder Magazine, Issue 53 / Spring 2025
Better Builder Magazine
 
DE-UNIT-V MEMORY DEVICES AND DIGITAL INTEGRATED CIRCUITS
DE-UNIT-V MEMORY DEVICES AND DIGITAL INTEGRATED CIRCUITSDE-UNIT-V MEMORY DEVICES AND DIGITAL INTEGRATED CIRCUITS
DE-UNIT-V MEMORY DEVICES AND DIGITAL INTEGRATED CIRCUITS
Sridhar191373
 
ENERGY STORING DEVICES-Primary Battery.pdf
ENERGY STORING DEVICES-Primary Battery.pdfENERGY STORING DEVICES-Primary Battery.pdf
ENERGY STORING DEVICES-Primary Battery.pdf
TAMILISAI R
 
PPT on Grid resilience against Natural disasters.pptx
PPT on Grid resilience against Natural disasters.pptxPPT on Grid resilience against Natural disasters.pptx
PPT on Grid resilience against Natural disasters.pptx
manesumit66
 
22PCOAM16 Machine Learning Unit V Full notes & QB
22PCOAM16 Machine Learning Unit V Full notes & QB22PCOAM16 Machine Learning Unit V Full notes & QB
22PCOAM16 Machine Learning Unit V Full notes & QB
Guru Nanak Technical Institutions
 
microcontroller AHB Protocol presentation
microcontroller AHB Protocol presentationmicrocontroller AHB Protocol presentation
microcontroller AHB Protocol presentation
manohemanth1
 
Concept Learning - Find S Algorithm,Candidate Elimination Algorithm
Concept Learning - Find S Algorithm,Candidate Elimination AlgorithmConcept Learning - Find S Algorithm,Candidate Elimination Algorithm
Concept Learning - Find S Algorithm,Candidate Elimination Algorithm
Global Academy of Technology
 
Proposed EPA Municipal Waste Combustor Rule
Proposed EPA Municipal Waste Combustor RuleProposed EPA Municipal Waste Combustor Rule
Proposed EPA Municipal Waste Combustor Rule
AlvaroLinero2
 
Introduction to Machine Vision by Cognex
Introduction to Machine Vision by CognexIntroduction to Machine Vision by Cognex
Introduction to Machine Vision by Cognex
RicardoCunha203173
 
Attenuation Models for Estimation of Vertical Peak Ground Acceleration Based ...
Attenuation Models for Estimation of Vertical Peak Ground Acceleration Based ...Attenuation Models for Estimation of Vertical Peak Ground Acceleration Based ...
Attenuation Models for Estimation of Vertical Peak Ground Acceleration Based ...
Journal of Soft Computing in Civil Engineering
 
Introduction-to-Prestressed-Concrete.pdf
Introduction-to-Prestressed-Concrete.pdfIntroduction-to-Prestressed-Concrete.pdf
Introduction-to-Prestressed-Concrete.pdf
Bharti Shinde
 
DIGITAL ELECTRONICS: UNIT-III SYNCHRONOUS SEQUENTIAL CIRCUITS
DIGITAL ELECTRONICS: UNIT-III SYNCHRONOUS SEQUENTIAL CIRCUITSDIGITAL ELECTRONICS: UNIT-III SYNCHRONOUS SEQUENTIAL CIRCUITS
DIGITAL ELECTRONICS: UNIT-III SYNCHRONOUS SEQUENTIAL CIRCUITS
Sridhar191373
 
Silent-Aire Quality Orientation - OFCI_GC - EVAP Unit REV2.pdf
Silent-Aire Quality Orientation - OFCI_GC - EVAP Unit REV2.pdfSilent-Aire Quality Orientation - OFCI_GC - EVAP Unit REV2.pdf
Silent-Aire Quality Orientation - OFCI_GC - EVAP Unit REV2.pdf
EfrainGarrilloRuiz1
 
BEC602- Module 3-2-Notes.pdf.Vlsi design and testing notes
BEC602- Module 3-2-Notes.pdf.Vlsi design and testing notesBEC602- Module 3-2-Notes.pdf.Vlsi design and testing notes
BEC602- Module 3-2-Notes.pdf.Vlsi design and testing notes
VarshithaP6
 
Unit 6 Message Digest Message Digest Message Digest
Unit 6  Message Digest  Message Digest  Message DigestUnit 6  Message Digest  Message Digest  Message Digest
Unit 6 Message Digest Message Digest Message Digest
ChatanBawankar
 
Software_Engineering_in_6_Hours_lyst1728638742594.pdf
Software_Engineering_in_6_Hours_lyst1728638742594.pdfSoftware_Engineering_in_6_Hours_lyst1728638742594.pdf
Software_Engineering_in_6_Hours_lyst1728638742594.pdf
VanshMunjal7
 
Better Builder Magazine, Issue 53 / Spring 2025
Better Builder Magazine, Issue 53 / Spring 2025Better Builder Magazine, Issue 53 / Spring 2025
Better Builder Magazine, Issue 53 / Spring 2025
Better Builder Magazine
 
DE-UNIT-V MEMORY DEVICES AND DIGITAL INTEGRATED CIRCUITS
DE-UNIT-V MEMORY DEVICES AND DIGITAL INTEGRATED CIRCUITSDE-UNIT-V MEMORY DEVICES AND DIGITAL INTEGRATED CIRCUITS
DE-UNIT-V MEMORY DEVICES AND DIGITAL INTEGRATED CIRCUITS
Sridhar191373
 
ENERGY STORING DEVICES-Primary Battery.pdf
ENERGY STORING DEVICES-Primary Battery.pdfENERGY STORING DEVICES-Primary Battery.pdf
ENERGY STORING DEVICES-Primary Battery.pdf
TAMILISAI R
 
PPT on Grid resilience against Natural disasters.pptx
PPT on Grid resilience against Natural disasters.pptxPPT on Grid resilience against Natural disasters.pptx
PPT on Grid resilience against Natural disasters.pptx
manesumit66
 
microcontroller AHB Protocol presentation
microcontroller AHB Protocol presentationmicrocontroller AHB Protocol presentation
microcontroller AHB Protocol presentation
manohemanth1
 
Concept Learning - Find S Algorithm,Candidate Elimination Algorithm
Concept Learning - Find S Algorithm,Candidate Elimination AlgorithmConcept Learning - Find S Algorithm,Candidate Elimination Algorithm
Concept Learning - Find S Algorithm,Candidate Elimination Algorithm
Global Academy of Technology
 
Proposed EPA Municipal Waste Combustor Rule
Proposed EPA Municipal Waste Combustor RuleProposed EPA Municipal Waste Combustor Rule
Proposed EPA Municipal Waste Combustor Rule
AlvaroLinero2
 
Introduction to Machine Vision by Cognex
Introduction to Machine Vision by CognexIntroduction to Machine Vision by Cognex
Introduction to Machine Vision by Cognex
RicardoCunha203173
 

Highly secure scalable compression of encrypted images

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 10 | Oct -2015, Available @ http://www.ijret.org 53 HIGHLY SECURE SCALABLE COMPRESSION OF ENCRYPTED IMAGES Maria Joseph1 , Tomson Devis2 1 M.Tech student, Department of Electronics & Communication Engg., St. Joseph’s College of Engineering & Technology-Palai, Kerala, India, [email protected] 2 Assistant Professor, Department of Electronics & Communication Engg., St. Joseph’s College of Engineering & Technology-Palai, Kerala, India, [email protected] Abstract A highly secure scalable compression method for stream cipher encrypted images is described in this journal. The input image first undergoes encryption and then shuffling. This shuffling in the image pixels enhances the security. For shuffling, Henon map is used. There are two layers for the scalable compression namely base layer and enhancement layer. Base layer bits are produced by coding a series of non-overlapping patches of uniformly down sampled version of encrypted image. In the enhancement layer pixels are selected by random permutation and then coded. From all the available pixel samples an iterative multi scale technique is used to reconstruct the image and finally performs decryption. The proposed method has high security. Key Words: Encryption, Decryption, Shuffling, Scalable compression --------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION The role of computers and networks has made considerable change in human life. So one of the important issues we should consider is that protecting our data from a third party. Most of the data that we send through our network is clear and it is easy for an unwanted person to capture it. Encryption is considered as the method of transforming the data into a secret code. To read an encrypted data there must access to the secret key so that we can decrypt it. Modern encryption algorithm uses a key to decrypt it. Encryption is actually a technique used to convert the data into an unreadable format. Each encryption algorithm uses a set of strings called key. Larger the length of key greater is the security. This is because when length of the key increases the possible number of combinations increases and thus make a third party to difficult to decrypt. A system used for encrypting and decrypting data is called cryptosystems. These usually involve combining plain text with one or more strings called key and making cipher text. The security of cryptosystems lies in the security of a key rather than the secrecy of algorithm. A strong cryptosystems has a wide range of possible key combinations and it is not possible to try all these key pairs. At the same time a strong cryptosystems will produce random output to all statistical methods and will resist to all methods for breaking codes. Consider redundant data is transmitting through an insecure bandwidth limited channel. The traditional way to transmit this is to first compress it and then encrypt the data. Compression itself means removing the redundant patterns. Compression also means that reducing the dimensions. After compression there will be fewer bits. But there will contain more information per bit. Fig -1: Traditional way of sending message In this figure -1 an information source wants to send a message through a public channel. The traditional way to do this is to first compress and then encrypt. So the data is first compressed and then encryption takes place by using a secure key. At the receiver side, reverse process happens. i.e, first decryption and decompression happens. For decryption the same key used for encryption should be used. This is symmetric cryptography. That is, same key is used for both encryption and decryption. But there exist always an eavesdropper in the public channel for attacking the secure message. Fig -2: Compression Then Encryption (CTE) System
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 10 | Oct -2015, Available @ http://www.ijret.org 54 Consider a case in figure -2 in which Alice wants to send a message securely and efficiently to Bob through an untrusted channel provider Charlie. Conventionally this could be done as follows: Alice first compress the data into B and then encrypts into E using an encryption function E(K), where K is used as the secret key. The encrypted data E is then forwarded to Bob by Charlie, where Charlie is the network provider. Upon receiving E, Bob sequentially decode and decompress the message to retrieve the data I. This conventional system meets many requirements but even though in some situations we have to reverse the order of encryption and compression. Alice is always interested in securing her data. So she is only performing the encryption algorithm when she has limited number of computational resources. So in this case encryption is done by Alice at first and then Compression is done by Charlie. So this has led to Encryption Then Compression (ETC) System as in Figure - 3. The main task here is that compression has to be carried out in the encryption domain as Charlie has no access to the secret key. Fig -3: Encryption Then Compression (ETC) System 2. RELATED WORK Jiantao et. al proposed a scalable compression method for stream cipher encrypted images [1]. They used standard stream cipher format. The bit stream in the base layer is produced by first down sampling the encrypted image and then a series of non-overlapping patches are formed which are uniform in nature. Johnson et. al examined the possibility of encrypting a data stream and compressing it without knowledge of key [2]. Using distributed source coding principles the encrypted data can be compressed because key will be available at the decoder. Schonberg et. al extended Johnson’s work by considering information source with memory [3] [4]. Using minimal number of bits they transmitted encrypted source in this work. By applying LDPC codes in various bit planes and exploiting the intra/inter correlation Lazzeretti and Barni suggested method for lossless compression of gray/color images [5]. By using the principle of source coding with side information principle they recently demonstrated the possibility of lossless compression of encrypted images. Kumar and Makur applied Johnson et. al approach to the prediction error domain by using the iid property of prediction error sequences and achieved higher lossless compression performance for both gray scale and color images [6]. After the compression of gray scale and color images which is carried out in lossless domain only encryption is performed here. In addition to the lossless compression, lossy compression was also investigated which has higher compression ratios. Kumar and Makur proposed compressive sensing mechanism to compress encrypted images [7]. By using a modified pursuit algorithm the original image could be estimated from the compressed and encrypted data. Liu et. al proposed a lossless progressive compression technique for gray / color scale images [8]. Through Slepian Wolf coding lossless compression of encrypted images can be possible. Zhang designed an image encryption method by performing permutation operations in the pixel domain and showed that the resultant file can be compressed by discarding the fine and rough coefficients in the transform domain [9]. Here lossy compression of encrypted image is discussed with flexible compression ratio. Zhang et. al proposed a scalable lossy coding of encrypted images through a multi resolution construction. Here scalable coding of encrypted images is described [10]. Klinc et. al extended Johnson’s work to efficiently compress block cipher encrypted data [11]. Here compression of block cipher is considered. Zhang et. al proposed a new technique for the compression of encrypted images through multi-layer decomposition [12]. This is lossy compression of encrypted gray images. Kang et. al proposed an interpolation based technique for decompressing and there compression is gained by down sampling and bit plane decomposition [13]. When more bit planes are transmitted higher quality of reconstructed image can be achieved. Zhang et. al proposes a method for compressing encrypted images in which the information owner Alice also generates some auxiliary information that can be used for compression and reconstruction [14]. 3. PROPOSED METHODOLOGY In this we consider conventional stream cipher which is applied in the standard format. That means cipher text is produced by bitwise XORing the plain text with the key stream. The scenario of scalable coding of encrypted image is shown in figure -4. This work proposes a novel scalable compression for shuffled encrypted images which has better security. The input image first undergoes encryption in the standard format (AES-CTR). For encryption we use AES- 128. That means the secure key that we used here is of 128 bit length. After encryption, the encrypted image undergoes shuffling in order to increase the security. For shuffling we use Henon map. A Henon map has the most chaotic behavior. Here the Henon map takes a point and maps into another point by using these two equations. Xn+1 = 1-axn 2 +yn Yn+1 = bxn The shuffled image undergoes scalable compression. There are two layers namely base layer and enhancement layer in the scalable compression. The base layer bits Bb and enhancement layer bits Be are generated here. From those bits image is reconstructed and then undergoes rearrangement of pixels. After that, it is given to the decryption block where decryption is performed using the
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 10 | Oct -2015, Available @ http://www.ijret.org 55 same key stream. The scalable image encoding scheme is shown in figure -5. In order to generate base layer bits we first uniformly down sample the shuffled image which then undergoes wavelet decomposition. After that we divide the latter into different patches which must be a series of non- overlapping patches. Then we apply lossless encoding to each of the patch to produce the base layer bit stream. The final bit stream is generated by concatenating all the bits from patches. Extra bits for reconstruction other than base bits are produced by the enhancement layer. In this layer we select pixels by random permutation. The same procedure to generate base layer bits is adopted to this selected pixels and by applying lossless encoding enhancement bits is finally generated. Fig -4: Scenario of scalable coding of encrypted images Fig -5: Scalable image coding scheme At the receiver side reverse process happens. That is lossless decoding and wavelet reconstruction is done. And then the image is decoded. Then the pixels are rearranged by using sorting and Henon map. For final reconstruction of the image an iterative interpolation technique called Soft Adaptive Interpolation (SAI) is used. Finally the original image is retrieved by using decryption. Same 128 bit key that is used for encryption must be used for the proper decryption. 4. RESULTS AND DISCUSSION The proposed method has been tested for different gray scale images. And it is possible to reconstruct the image with more security. It is implemented by using MATLAB 2012. For input image AES - CTR encryption is applied. Key used here is of 128 bit length. Figure -6 shows the input image which undergoes encryption and figure -7 shows the encrypted image. This encrypted image undergoes shuffling by using Henon map for better security. This is shown in figure -8. The shuffled image undergoes compression. This means that the shuffled image is the input to both the base and enhancement layer. At the base layer the shuffled image is down sampled and then undergoes wavelet decomposition at level 3. This is shown in figure -9. After that it is divided into different patches and apply Slepian wolf encoding. The bits generated are shown in figure -10. Similarly enhancement layer bits are produced by applying wavelet decomposition and Slepian wolf encoding. This is shown in figure -11 and figure -12. At the receiver side reverse process happens and the image is decoded. It is shown in figure -13. Rearrangement of pixels is then done. After that image is reconstructed by using Soft decision Adaptive Interpolation (SAI). This is shown in figure -14. Finally, decryption is performed and image is decrypted. It is shown in figure -15. Fig -6: Input image Fig -7: Encrypted image
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 10 | Oct -2015, Available @ http://www.ijret.org 56 Fig -8: Shuffled image Fig -9: Wavelet decomposition at level 3 (base layer) Fig -10: Base layer bits Fig -11: Wavelet decomposition (Enhancement layer) Fig -12: Enhancement layer bits Fig -13: Decoded image Fig -14: Reconstructed image Fig -15: Decrypted image 5. CONCLUSION This work proposes a highly secure scalable compression of stream cipher encrypted images. Security is achieved by shuffling the encrypted image by Henon map. Henon map has the highly chaotic behavior and pixel position will be mapped to a new position. The value of the pixel remains same here. The entire pixels will be shuffled and thus an eavesdropper cannot able to identify the original data. From the base layer and enhancement layer bits the decoder applies an iterative multi scale technique to reconstruct the
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 10 | Oct -2015, Available @ http://www.ijret.org 57 image. It has been tested on a large database and realized that the proposed method has high security. REFERENCES [1]. Jiantao Zhou, Oscar C. Au, Guangtao Zhai, Yuan Yan Tang and Xianming Liu, “Scalable compression of stream cipher encrypted images through context adaptive sampling”, IEEE transactions on Information Forensics and Security, Vol. 9, No. 11, November 2014. [2]. M. Johnson, P. Ishwar, V. Prabhakaran, D. Schonberg and K. Ramachandran, “On compressing encrypted data”, IEEE Trans. Signal Process.,Vol. 52, No. 10, Oct 2004. [3]. D. Schonberg, S. C. Draper and K. Ramachandran, “On blind compression of encrypted correlated data approaching the source entropy rate”, in Proc.43rd Annu. Allerton Conf. Commun., Control, Comput., 2005. [4]. D. Schonberg, S. Draper and K. Ramachandran, “On compression of encrypted images”, in Proc. IEEE Int. Conf. Image Process., Oct. 2006. [5]. R. Lazzeretti and M. Barni, “Lossless compression of encrypted grey level and color images”, in Proc. 16th Eur. Signal Process. Conf. (EUSIPCO), 2008. [6]. Kumar and A. Makur, “Distributed source coding based encryption and lossless compression of gray scale and color images”, in Proc. 10th Workshop MMSP, Oct. 2008. [7]. A Kumar and A. Makur, “Lossy compression of encrypted image by compressive sensing technique”, in Proc. IEEE Region 10th Conf., Jan. 2009. [8]. W. Liu, W. Zeng, L. Dong and Q. Yao, “Efficient compression of encrypted grayscale images”, IEEE Tans. Image Process., Vol. 19, No. 4, Apr. 2010. [9]. X. Zhang, Y. Ren, G. Feng and Z. Qian, “Compressing encrypted image using compressive sensing”, in Proc. 7th IEEE Int. Conf., IIH-MSP, Oct. 2011. [10]. X. Zhang, G. Feng, Y. Ren and Z. Qian , “Scalable coding of encrypted images”, IEEE Trans. Image Process., Vol. 21, No.6, Jun. 2012. [11]. D. Klinc, C. Hazay, A. Jagmohan, H. Krawczyk and T. Rabin, “On compression of data encrypted with block ciphers” IEEE Trans. Inf. Theory, Vol. 58, No. 11, Nov. 2012. [12]. X. Zhang, G. Sun, L. Shen and C. Qin, “Compression of encrypted images with multi-layer decomposition”, Multimedia Tools Appl., Vol. 72, No. 1, Feb. 2013. [13]. X. Kang, A. Peng , X. Xu and X. Cao , “Performing scalable lossy compression on pixel encrypted images”, EURASIP J. Image Video Process, Vol. 2013, No. 32, May 2013. [14]. X. Zhang, Y. Ren, L. Shen, Z. Qian and G. Freng, “Compressing encrypted images with auxiliary information”, IEEE Trans. Multimedia Vol. 16, No. 5, Aug. 2014.