Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

A Survey based on Designing an Efficient Image Encryption-then-Compression System

Print
PDF
IJCA Proceedings on National Level Technical Conference X-PLORE 2014
© 2014 by IJCA Journal
XPLORE 2014
Year of Publication: 2014
Authors:
Kalyani G. Nimbokar
Milind V. Sarode

Kalyani G Nimbokar and Milind V Sarode. Article: A Survey based on Designing an Efficient Image Encryption-then-Compression System. IJCA Proceedings on National Level Technical Conference X-PLORE 2014 XPLORE2014:6-8, May 2014. Full text available. BibTeX

@article{key:article,
	author = {Kalyani G. Nimbokar and Milind V. Sarode},
	title = {Article: A Survey based on Designing an Efficient Image Encryption-then-Compression System},
	journal = {IJCA Proceedings on National Level Technical Conference X-PLORE 2014},
	year = {2014},
	volume = {XPLORE2014},
	pages = {6-8},
	month = {May},
	note = {Full text available}
}

Abstract

Image encryption has to be conducted prior to image compression. In this paper how to design a pair of image encryption and compression algorithms such that compressing encrypted images can still be efficiently performed. This paper introduced a highly efficient image encryption-then compression (ETC) system. The proposed image encryption scheme operated in the prediction error domain is able to provide a reasonably high level of security. More notably, the proposed compression approach applied to encrypted images is only slightly worse, unencrypted images as inputs. In contrast, most of the existing ETC solutions induce significant penalty on the compression efficiency.

References

  • A. Kumar and A. Makur, "Distributed source coding based encryption and lossless compression of gray scale and color images," in Proc. MMSP, 2008, pp. 760–764.
  • D. Schonberg, S. C. Draper, and K. Ramchandran, "On blind compression of encrypted correlated data approaching the source entropy rate," in Proc. 43rd Annu. Allerton Conf. , 2005, pp. 1–3.
  • Z. Erkin, T. Veugen, T. Toft, and R. L. Lagendijk, "Generating private recommendations efficiently using homomorphic encryption and data packing," IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 1053–1066, Jun. 2012
  • T. Bianchi, A. Piva, and M. Barni, "On the implementation of the discrete Fourier transform in the encrypted domain," IEEE Trans. Inf. Forensics Security, vol. 4, no. 1, pp. 86–97, Mar. 2009.
  • X. Zhang, "Lossy compression and iterative recobstruction for encrypted image," IEEE Trans. Inf. Forensics Security, vol. 6, no. 1, pp. 53–58 Mar. 2011
  • X. Zhang, G. Sun, L. Shen, and C. Qin, "Compression of encrypted images with multilayer decomposition," Multimed. Tools Appl. , vol. 78,no. 3, pp. 1–13, Feb. 2013.
  • Jiantao Zhou, Member, IEEE, Xianming Liu, Member, IEEE, Oscar C. Au, Fellow, IEEE,
  • and Yuan Yan Tang, Fellow, IEEE" Designing an Efficient Image Encryption-Then Compression System via Prediction
  • Error Clustering and Random Permutation" IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 1, JANUARY 2014.
  • Sesha Pallavi Indrakanti Associate professor Department of Computer Applications, GVP Degree College (A),Visakhapatnam. "Permutation Based Image Encryption Technique" International Journal of Computer Applications (0975 – 8887) Volume 28– No. 8, August 2011