CFP last date
20 May 2024
Reseach Article

Security and Privacy of Image by Encryption, Lossy Compression and Iterative Reconstruction

by Asha P. Ghodake, Sujata Mendgudle
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 62 - Number 1
Year of Publication: 2013
Authors: Asha P. Ghodake, Sujata Mendgudle
10.5120/10044-4628

Asha P. Ghodake, Sujata Mendgudle . Security and Privacy of Image by Encryption, Lossy Compression and Iterative Reconstruction. International Journal of Computer Applications. 62, 1 ( January 2013), 16-20. DOI=10.5120/10044-4628

@article{ 10.5120/10044-4628,
author = { Asha P. Ghodake, Sujata Mendgudle },
title = { Security and Privacy of Image by Encryption, Lossy Compression and Iterative Reconstruction },
journal = { International Journal of Computer Applications },
issue_date = { January 2013 },
volume = { 62 },
number = { 1 },
month = { January },
year = { 2013 },
issn = { 0975-8887 },
pages = { 16-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume62/number1/10044-4628/ },
doi = { 10.5120/10044-4628 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:10:30.471888+05:30
%A Asha P. Ghodake
%A Sujata Mendgudle
%T Security and Privacy of Image by Encryption, Lossy Compression and Iterative Reconstruction
%J International Journal of Computer Applications
%@ 0975-8887
%V 62
%N 1
%P 16-20
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Now a days, large files such as digital images, to be easily transmitted over the internet. New problems associated with this are security and privacy of image. Using pseudorandom permutation, image encryption is obtained. Confidentiality and access control is done by encryption. Encrypted image is compressed by using orthogonal transform. Irrelevance and redundancy of the image data is reduced by image compression because this is easy to store or transmit data in an efficient form. Reconstruct the original image by iterative reconstruction procedure. In this, flexible compression ratio is used and significantly improves the compression efficiency.

References
  1. Mitra, Y. V. Subba Rao, S. R. M. Prasanna, "A New Image Encryption Approach using Combinational Permutation Techniques"
  2. Xinpeng Zhang, "Lossy Compression and Iterative Reconstruction for Encrypted Image" IEEE transactions on information forensics and security, vol. 6, no. 1, march 2011.
  3. Daniel Schonberg, Stark C. Draper, Chuohao Yeo, Kannan Ramchandran, "Towards Compression of Encrypted Images and Video Sequences"
  4. Ibrahim Fathy El-Ashry, "Digital Image Encryption" A Thesis Submitted for The Degree of M. Sc. of Communications Engineering.
  5. D. Schonberg, S. C. Draper, C. Yeo, K. Ramchandran, "Toward compression of encrypted images and video sequences" IEEE Trans. Inf. Forensics Security, vol. 3, no. 4, pp. 749–762, Dec. 2008.
Index Terms

Computer Science
Information Sciences

Keywords

Pseudorandom permutations encryption orthogonal transform iterative reconstruction