Improvising Secured Compression scheme of color images based on permutation

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2016 by IJCTT Journal
Volume-40 Number-1
Year of Publication : 2016
Authors : S.Shunmugan
  10.14445/22312803/IJCTT-V40P101

MLA

S.Shunmugan "Improvising Secured Compression scheme of color images based on permutation". International Journal of Computer Trends and Technology (IJCTT) V40(1):1-4, October 2016. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
This paper proposes a novel scheme of Encryptionthen- compression of color images. In the encryption phase, the original pixel values are rearranged by using pseudorandom permutation with secret key. After decomposing the encrypted data it is divided in to rigid and elastic data. The elastic data alone is compressed by using orthogonal based transformation and closest value calculation. The salient features of the proposed method are near lossless with high security. Performance of this work is also compared with the traditional JPEG algorithm.

References
[1] Efficient Compression of Encrypted Grayscale Images, Wei Liu, Member, IEEE, Wenjun Zeng, Senior Member, IEEE, LinaDong, and Qiuming Yao.IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 19, NO. 4, APRIL 2010
[2] Toward Compression of Encrypted Images and Video Sequences, Daniel Schonberg, Member, IEEE, Stark C. Draper, Member, IEEE, Chuohao Yeo, Student Member, IEEE, and KannanRamchandran, Fellow, IEEE, IEEE Transactions on Information Forensics and Security, Vol. 3, No. 4, December 2008
[3] IMAGE COMPRESSION USING THE ITERATIONTUNED AND ALIGNED DICTIONARY, Joaquin Zepeda, Christine Guillemot, EwaKijak, 978-1-4577-0539-7/11/ ©2011 IEEE
[4] Block-Based Image Compression With Parameter-Assistant Inpainting, ZhiweiXiong, Member, IEEE, and Feng Wu, Senior Member, IEEE, IEEE Transactions on Image Processing, Vol. 19, NO. 6, June 2010.
[5] Lossless Compression of Encrypted Grey-Level and Color Images, Riccardo Lazzeretti, Mauro BarniDepartment of Information Engineering, University of Siena, 16th European Signal Processing Conference, Lausanne, Switzerland, August 25-29, 2008, copyright by EURASIP.
[6] On Blind Compression of Encrypted Correlated Data Approaching. The Source Entropy Rate, D. Schonberg, S. C. Draper, K. Ramchandran, EECS Dept. U. of California, Berkeley, IEEE Transactions on Signal Processing, vol. 22, no. 6, October 2009.
[7] Securing Image Transmission Using Compression Encryption Technique, Shaimaa A. El-said, Khalid F. A. Hussein, Mohamed M. Fouad, Electronics research institute, Microwaves Department, Researches National Institute, Dokki, Egypt, International Journal of Computer Science and Security, (IJCSS), Volume (4): Issue (5)
[8] Composite Signal Representation for Fast and Storage- Efficient Processing of Encrypted Signals, Tiziano Bianchi, Ale, and Mauro Barni, IEEE Transactions on Information Forensics and Security, Vol. 5, No. 1, March 2010

Keywords
Data security, data encryption, data decryption; permutation, rigid data, elastic data.