Research Article

Security and Privacy of Image by Encryption, Lossy Compression and Iterative Reconstruction

by  Asha P. Ghodake, Sujata Mendgudle
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 62 - Issue 1
Published: January 2013
Authors: Asha P. Ghodake, Sujata Mendgudle
10.5120/10044-4628
PDF

Asha P. Ghodake, Sujata Mendgudle . Security and Privacy of Image by Encryption, Lossy Compression and Iterative Reconstruction. International Journal of Computer Applications. 62, 1 (January 2013), 16-20. DOI=10.5120/10044-4628

                        @article{ 10.5120/10044-4628,
                        author  = { Asha P. Ghodake,Sujata Mendgudle },
                        title   = { Security and Privacy of Image by Encryption, Lossy Compression and Iterative Reconstruction },
                        journal = { International Journal of Computer Applications },
                        year    = { 2013 },
                        volume  = { 62 },
                        number  = { 1 },
                        pages   = { 16-20 },
                        doi     = { 10.5120/10044-4628 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2013
                        %A Asha P. Ghodake
                        %A Sujata Mendgudle
                        %T Security and Privacy of Image by Encryption, Lossy Compression and Iterative Reconstruction%T 
                        %J International Journal of Computer Applications
                        %V 62
                        %N 1
                        %P 16-20
                        %R 10.5120/10044-4628
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Now a days, large files such as digital images, to be easily transmitted over the internet. New problems associated with this are security and privacy of image. Using pseudorandom permutation, image encryption is obtained. Confidentiality and access control is done by encryption. Encrypted image is compressed by using orthogonal transform. Irrelevance and redundancy of the image data is reduced by image compression because this is easy to store or transmit data in an efficient form. Reconstruct the original image by iterative reconstruction procedure. In this, flexible compression ratio is used and significantly improves the compression efficiency.

References
  • Mitra, Y. V. Subba Rao, S. R. M. Prasanna, "A New Image Encryption Approach using Combinational Permutation Techniques"
  • Xinpeng Zhang, "Lossy Compression and Iterative Reconstruction for Encrypted Image" IEEE transactions on information forensics and security, vol. 6, no. 1, march 2011.
  • Daniel Schonberg, Stark C. Draper, Chuohao Yeo, Kannan Ramchandran, "Towards Compression of Encrypted Images and Video Sequences"
  • Ibrahim Fathy El-Ashry, "Digital Image Encryption" A Thesis Submitted for The Degree of M. Sc. of Communications Engineering.
  • D. Schonberg, S. C. Draper, C. Yeo, K. Ramchandran, "Toward compression of encrypted images and video sequences" IEEE Trans. Inf. Forensics Security, vol. 3, no. 4, pp. 749–762, Dec. 2008.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Pseudorandom permutations encryption orthogonal transform iterative reconstruction

Powered by PhDFocusTM