1 / 18

A Scheme for Encrypted Image Data Compression

A Scheme for Encrypted Image Data Compression. By: A. B. Xyssss (19) S. F. Bdfjjjjj (23) A. B. Xyssss (07) S. F. Bdfjjjjj (67). Guide Dr. Nileshsingh V. Thakur. Department of Computer Science and Engineering Prof Ram Meghe College of Engineering and Management Badnera-Amravati, India.

childa
Download Presentation

A Scheme for Encrypted Image Data Compression

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A Scheme for Encrypted Image Data Compression By: A. B. Xyssss (19) S. F. Bdfjjjjj (23) A. B. Xyssss (07) S. F. Bdfjjjjj (67) Guide Dr. Nileshsingh V. Thakur Department of Computer Science and Engineering Prof Ram Meghe College of Engineering and Management Badnera-Amravati, India.

  2. Content • Introduction • Literature Analysis • Problem Definition • Requirement Analysis • Function, Program, etc. to be Developed • Technology and Platform to be Used • Block Schematic • AFD, DFD, CFD • Summary of Work Carried Out • References Project Seminar-I

  3. Introduction • Image Compression: • The objective of Image Compression is to reduce irrelevance and redundancy of the image data in order to be able to store or transmit data in an efficient form. • Types of image Compression are: • Lossless Image Compression: • Lossy Image Compression • Image Encryption: • Image encryption techniques try to convert original image to another image that is hard to understand; to keep the image confidential between users, in other word, it is essential that nobody should get to know the content without a key for decryption. Project Seminar-I

  4. Introduction • Image Compression Standards: • Different compression standard exists • Image Compression Standrds are: • JPEG: • Encryption Standards: • Symmetric Encryption • Asymmetric Encryption Project Seminar-I

  5. Literature Analysis Project Seminar-I

  6. Literature Analysis Project Seminar-I

  7. Problem Definition After analyzing the literature, following problem definition is formulated: Data compression plays a very important role in the information transmission domain. In transmission of information, security is the key issue. To address the issue of security and optimal use of bandwidth, there is a need of some mechanism which can perform both these tasks. Here, the objective is to develop a scheme to perform compression of encrypted image data. Firstly, the encryption mechanism will be developed and later the compression mechanism. Project Seminar-I

  8. Requirement Analysis • To develop an Algorithm for Image Compression. • To develop an Algorithm for Image Encryption. • To develop a model by combining Image Compression and Image Encryption. • To Decompressed and Decrypt an Image using some Auxiliary Information. • To analyze difference between Compression mechanism and Encryption prior to Compression mechanism. Project Seminar-I

  9. Function, Program, etc. To Be Developed • To develop a function to perform interfacing between…….. • To develop a program for the conversion of integer data into character data. Project Seminar-I

  10. Technology and Platform To Be Used • Technology • Platform Project Seminar-I

  11. Block Schematic of Proposed Approach • Block Schematic Diagram of Proposed Approach Project Seminar-I

  12. AFD, DFD, CFD • Architectural Flow Diagram (AFD) • Data Flow Diagram (DFD) • Control Flow Diagram (CFD) Project Seminar-I

  13. Summary of Work Carried Out • Relevant Literature is analyzed • Problem definition is formulated • Relevant logic for the implementation of identified requirements is in development phase • Implementation Technology and Platform is identified • Relevant data flow from processing point of view is identified Project Seminar-I

  14. References [1] Xinpeng Zhang; Yanli Ren; Liquan Shen; Zhenxing Qian; Guorui Feng, "Compressing Encrypted Images With Auxiliary Information," Multimedia, IEEE Transactions on , vol.16, no.5, pp.1327,1336, Aug. 2014 [2] M. Johnson, P. Ishwar, V. M. Prabhakaran, D. Schonberg, and K. Ramchandran, “On compressing encrypted data,” IEEE Trans. SignalProcess., vol. 52, no. 10, pp. 2992–3006, Oct. 2004.  [3] Z. Erkin, A. Piva, S. Katzenbeisser, R. L. Lagendijk, J. Shokrollahi, G. Neven, and M. Barni, “Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing,” EURASIP J. Inf. Security, pp. 1–20, 2007. [4] G. Jakimoski and K. P. Subbalakshmi, “Security of compressing encrypted sources,” in Proc. 41st Asilomar Conf. Signals, Systems andComputers (ACSSC 2007), 2007, pp. 901–903. [5] R. Lazzeretti and M. Barni, “Lossless compression of encrypted greylevel and color images,” in Proc. 16th Eur. Signal Processing Conf.(EUSIPCO 2008), Lausanne, Switzerland, Aug. 2008. [6] A. Kumar and A. Makur, “Distributed source coding based encryption and lossless compression of gray scale and color images,” in Proc. IEEE 10th Workshop Multimedia Signal Processing, 2008, pp. 760–764. [7] W. Liu, W. Zeng, L. Dong, and Q. Yao, “Efficient compression of encrypted grayscale images,” IEEE Trans. Signal Process, vol. 19, no. 4, pp. 1097–1102, Apr. 2010. [8] D. Schonberg, S. C. Draper, C. Yeo, and K. Ramchandran, “Toward compression of encrypted images and video sequences,” IEEE Trans.Inf. Forensics Security, vol. 3, no. 4, pp. 749–762, 2008. [9] D. Klinc, C. Hazayy, A. Jagmohan, H. Krawczyk, and T. Rabinz, “On compression of data encrypted with block ciphers,” in Proc. IEEE DataCompression Conf. (DCC ’09), 2009, pp. 213–222. [10] E. J. Candes and M. B. Wakin, “An introduction to compressive sampling,” IEEE Signal Process. Mag., vol. 25, no. 2, pp. 21–30, Mar-2008. Project Seminar-I

  15. References [9] D. Klinc, C. Hazayy, A. Jagmohan, H. Krawczyk, and T. Rabinz, “On compression of data encrypted with block ciphers,” in Proc. IEEE DataCompression Conf. (DCC ’09), 2009, pp. 213–222. [10] E. J. Candes and M. B. Wakin, “An introduction to compressive sampling,” IEEE Signal Process. Mag., vol. 25, no. 2, pp. 21–30, Mar-2008. [11] A. Kumar and A. Makur, “Lossy compression of encrypted image by compressing sensing technique,” in Proc. TENCON 2009 IEEE Region10 Conf., 2009, pp. 1–6. [12] X. Zhang, “Lossy compression and iterative reconstruction for encrypted image,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 1, pp. 53–58, 2011. [13] X. Zhang, G. Feng, Y. Ren, and Z. Qian, “Scalable coding of encrypted images,” IEEE Trans. Image Process., vol. 21, no. 6, pp. 3108 3114, Jun. 2012. [14] S.-W. Ho, L. Lai, and A. Grant, “On the separation of encryption and compression in secure distributed source coding,” in Proc. IEEE InformationTheory Workshop, 2011, pp. 653–657. [15] Jiantao Zhou; Xianming Liu; Au, O.C.; Yuan Yan Tang, "Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation," Information Forensics and Security, IEEE Transactions on , vol.9, no.1, pp.39,50, Jan. 2014. [16] Reichel, J.; Menegaz, G.; Nadenau, M.J.; Kunt, M., "Integer wavelet transform for embedded lossy to lossless image compression," Image Processing, IEEE Transactions on , vol.10, no.3, pp.383,392, Mar 2001 [17] B. Eswara Reddy, K Venkata Narayana,” A lossless image compression using traditional and lifting based wavelets”, Signal & Image Processing : An International Journal (SIPIJ) ,Vol.3, No.2, April 2012 Project Seminar-I

  16. References [18] S. Dutta, A. Abhinav, P. Dutta, P.Kumar, A. Halder,” An Efficient Image Compression Algorithm Based on Histogram Based Block Optimization and Arithmetic Coding”, International Journal of Computer Theory and Engineering, Vol. 4, No. 6, December 2012 [19] Xin Zhang; Weibin Chen, "A new chaotic algorithm for image encryption," Audio, Language and Image Processing, 2008. ICALIP 2008. International Conference on , vol., no., pp.889,892, 7-9 July 2008 [20] Jianji Wang; Nanning Zheng, "A Novel Fractal Image Compression Scheme With Block Classification and Sorting Based on Pearson's Correlation Coefficient," Image Processing, IEEE Transactions on , vol.22, no.9, pp.3690,3702, Sept. 2013 [21] K. G. Nimbokar ,M. V.Sarode, M. M.Ghonge ,”A Survey based on Designing an Efficient Image Encryption-then-Compression System ”,International Journal of Computer Applications , vol., no., pp.0975 – 8887,2014 [22]V. Sharma, H. C. Agnihotri, C. H. Patil,” An Image Encryption and Decryption Techniques Using Two Chaotic Schemes”, International Journal of Research in Advent Technology, Vol.2, No.2, February 2014 [23] Bouguezel, S.; Ahmad, M.O.; Swamy, M.N.S., "Binary Discrete Cosine and Hartley Transforms," Circuits and Systems I Regular Papers, IEEE Transactions on , vol.60, no.4, pp.989,1002, April 2013 [24] Dogaru, R.; Dogaru, I.; Hyongsuk Kim, "Chaotic Scan: A Low Complexity Video Transmission System for Efficiently Sending Relevant Image Features," Circuits and Systems for Video Technology, IEEE Transactions on , vol.20, no.2, pp.317,321, Feb. 2010 [25] Rajendra Acharya, U.; Acharya, D.; Subbanna Bhat, P.; Niranjan, U.C., "Compact storage of medical images with patient information," Information Technology in Biomedicine, IEEE Transactions on , vol.5, no.4, pp.320,323, Dec. 2001 [26] Wei Liu; Zeng, Wenjun; Lina Dong; Qiuming Yao, "Efficient Compression of Encrypted Grayscale Images," Image Processing, IEEE Transactions on , vol.19, no.4, pp.1097,1102, April 2010 Project Seminar-I

  17. References [27] A. Loussert, A. Alfalou, R. El Sawda, A. Alkholidi,” Enhanced System for image's compression and encryption by addition of biometric characteristics”, International Journal of Software Engineering and Its Applications, Vol. 2, No. 2, April, 2008 [28] Aiping Jiang, Bingliang Zhou, Can He,” Image Encryption Algorithm Based on Contourlet and Chua’s circuit”, International Journal of Digital Content Technology and its Applications(JDCTA), Vol. 6,No.15,Aug 2012 [29] Dang, P.P.; Chau, P.M., "Image encryption for secure Internet multimedia applications," Consumer Electronics, 2000. ICCE. 2000 Digest of Technical Papers. International Conference on , vol., no., pp.6,7, 13-15 June 2000 [30] Chen Ying; Pengwei Hao, "Integer reversible transformation to make JPEG lossless," Signal Processing, 2004. Proceedings. ICSP '04. 2004 7th International Conference on , vol.1, no., pp.835,838 vol.1, 31 Aug.-4 Sept. 2004 [31] Hua Cai; Jiang Li, "Lossless image compression with tree coding of magnitude levels," Multimedia and Expo, 2005. ICME 2005. IEEE International Conference on , vol., no., pp.4 pp.,, 6-8 July 2005 [32] Yerva, S.; Nair, S.; Kutty, K., "Lossless image compression based on data folding," Recent Trends in Information Technology (ICRTIT), 2011 International Conference on , vol., no., pp.999,1004, 3-5 June 2011 [33] Xin Chen; Ju-Fu Feng; Sam Kwong, "Lossy and lossless compression for color-quantized images," Image Processing, 2001. Proceedings. 2001 International Conference on , vol.1, no., pp.870,873 vol.1, 2001 [34] Xinpeng Zhang, "Lossy Compression and Iterative Reconstruction for Encrypted Image," Information Forensics and Security, IEEE Transactions on , vol.6, no.1, pp.53,58, March 2011 [35] Heng Chen; Braeckman, G.; Munteanu, A.; Schelkens, P., "Reversible DCT-based lossy-to-lossless still image compression," Image Processing (ICIP), 2013 20th IEEE International Conference on , vol., no.,  Project Seminar-I

  18. Thank You………

More Related