Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology
ISSN: 2321-3337 Impact Factor:1.521 Volume:4 Issue:3 Year: 20 April,2015 Pages:397-400
Most of the times while any message is transferring across the network for security reasons they are normally encrypted directly to make user visibly unreadable or it will be encrypted in an image. And now a day’s data hacker becomes too intelligent to break the encrypted images to get the original contents. So many systems are designed to combine the encryption and compression in single mould to provide greater security. So we are presenting a novel approach of encryption and compression using permutation and predictive coding. This actually enhances the encryption and compression processes by converting image into small blocks cluster and encryption is applied on each block. After encryption compression method is applied to encrypted image. At the Receiver end exactly reverse process takes place.
Image encryption, Image compression, predictive coding.
[1] Secure Transformation of Data in Encrypted Image Using Reversible Data hiding Technique (IJESIT) Volume 2, Issue 4, July 2013. [2] A Survey based on Designing an Efficient Image Encryption-then-Compression System National Level Technical Conference “X-PLORE 14. [3] D. Schonberg, S. C. Draper, and K. Ramchandran, “On compression of encrypted images,” in Proc. IEEE Int. Conf. Image Process., Oct. 2006,pp. 269–272. [4] R. Lazzeretti and M. Barni, “Lossless compression of encrypted grey level and color images,” in Proc. 16th Eur. Signal Process.Conf.,Aug. 2008, pp. 1–5. [5] X. Zhang, “Lossy compression and iterative reconstru ction for encrypted image,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 1, pp. 53–58 Mar. 2011 [6] X. Zhang, G. Sun, L. Shen, and C. Qin, “Compression of encrypted images with multilayer decomposition,” Multimed. Tools Appl., vol. 78,no. 3, pp. 1–13, Feb. 2013. [7] Subramanya A, “Image Compression Technique,” Potentials IEEE, Vol. 20, Issue 1, pp 19-23, Feb-March 2001 [8] A. Mitra, , Y V. Subba Rao, and S. R. M. Prasnna, "A new image encryption approach using combinational permutation techniques,"Journal of computer Science,vol. 1, no. 1, p.127, 2006. [9] S. Trivedi and R. Chandramouli, “Secret Key Estimation in Sequential Steganography,” IEEE Trans. Signal Processing, vol. 53, no.2, pp. 746-757, Feb. 2005. [10] Y. T. Wu and F. Y. Shih, “An adjusted-purpose digital watermarking technique,” Pattern Recognition 37, pp. 2349-2359, 2004. [11] Aloha Sinha, Kehar Singh, “A technique for image encryption using digital signature”, Optics Communications, Vol-2 I8 (2203),229-234. [12] Shuqun Zhang and Mohammed A. Karim, “Color image encryption using double random phase encoding”, Microwave and Optical Technology Letters Vol. 21, No. 5, 318-322 , June 5 1999. [13] Mohammad Ali Bani Younes and Aman Jantan, “An ImageEncryption Approach Using a Combination of PermutationTechnique Followed by Encryption” ,IJCSNS International Journalof Computer Science and Network Security, VOL.8 , April 2008. [14] Qiudong Sun, Wenying Yan, Jiangwei Huang, Wenxin Ma, “Image Encryption Based on Bit-plane Decomposition and Random Scrambling”, Journal of Shanghai Second Polytechnic University ,vol. 09 IEEE, 2012.