We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

An Evaluation on Irretrievable Compression of Encrypted Image

by K. Porkumaran, S. Manimurugan, Pradeep P Mathew
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 42 - Number 2
Year of Publication: 2012
Authors: K. Porkumaran, S. Manimurugan, Pradeep P Mathew
10.5120/5665-7697

K. Porkumaran, S. Manimurugan, Pradeep P Mathew . An Evaluation on Irretrievable Compression of Encrypted Image. International Journal of Computer Applications. 42, 2 ( March 2012), 17-20. DOI=10.5120/5665-7697

@article{ 10.5120/5665-7697,
author = { K. Porkumaran, S. Manimurugan, Pradeep P Mathew },
title = { An Evaluation on Irretrievable Compression of Encrypted Image },
journal = { International Journal of Computer Applications },
issue_date = { March 2012 },
volume = { 42 },
number = { 2 },
month = { March },
year = { 2012 },
issn = { 0975-8887 },
pages = { 17-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume42/number2/5665-7697/ },
doi = { 10.5120/5665-7697 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:30:35.044246+05:30
%A K. Porkumaran
%A S. Manimurugan
%A Pradeep P Mathew
%T An Evaluation on Irretrievable Compression of Encrypted Image
%J International Journal of Computer Applications
%@ 0975-8887
%V 42
%N 2
%P 17-20
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper may deals with the diverse troubles that may be occurs during the irretrievable compression applied on an encrypted image. This work is a relative learn with different methods of irretrievable compression such as Compressive sensing technique and Iterative reconstruction technique on encrypted image. But they practiced a variety of limitations. The major obscurity is to attain a higher compression ratio as well as the better quality of the reconstructed image. The higher compression ratio and the smoother the original image may supply the better quality of the reconstructed image.

References
  1. Xinpeng Zhang, "Lossy Compression and Iterative Reconstruction for Encrypted Images," IEEE Trans. Information Forensics and Security. , Vol. 6, No. 1, pp. 53-58, Mar. 2011.
  2. A. Kumar and A. Makur, "Lossy compression of encrypted image by compressing sensing technique," in Proc. IEEE Region 10 Conf. (TENCON 2009), 2009, pp. 1–6.
  3. Z. Xiong, A. D. Liveris and S. Cheng, "Distributed source coding for sensor networks", IEEE Signal Processing Magazine, Vol. 21, pp. 80-94, Sep. 2004.
  4. M. Johnson, P. Ishwar, V. Prabhakaran, D. Schonberg and K. Ramachandran, "On compressing encrypted data", IEEE Trans. Signal Processing Vol. 52, pp. 2992-3006, Oct. 2004.
  5. D. Schonberg, S. Draper and K. Ramachandran, "On compression of encrypted images", Proc. International conference on Image processing, Atlanta, GA, pp. 269-272, Oct. 2006.
  6. A. Kumar and A. Makur, "Distributed source coding based encryption and lossless compression of gray scale and color images", Proc. IEEE 10th workshop on multimedia and signal processing, Cairns, Australia, pp. 760-764, Oct. 2008.
  7. Y. Rachlin and D. Baron, "The secrecy of compressive sensing measurements", Proc. 46th Allerton conference on commun. , control, and computing, Monticello, IL, Sep. 2008.
  8. E. J. Candes and M. B. Wakin, "An introduction to compressive sampling", IEEE signal processing magazine, Vol. 25, pp. 21-30, Mar. 2008.
  9. S. S. Chen, D. L. Donoho, and M. A. Saunders, "Atomic decomposition by basis pursuit", SIAM J. Sci. Comput. , Vol. 20, No. 1, pp. 3361, 1988.
  10. R. Baranuik, "Compressive Sensing", IEEE signal processing magazine, Vol. 24, pp. 118-120, July 2007.
  11. A. M. Bruckstein, D. L. Donoho and M. Elad, "From sparse solutions of systems of equations to sparse modeling of signals and images", to appear in SIAM review.
  12. A. Mitra, Y. V. S. Rao and S. R. M. Prasanna, " A new image encryption approach using combinational permutation techniques", International J. of comp. Sc. , Vol. 1, pp. 127-131, May 2006.
  13. S. Sridharan, E. Dawson and B. Goldburg, "Fast Fourier transform based speech encryption system", IEE Proceedings - I, Vol. 138, pp. 215-223, June 1991.
  14. Y. Wu and B. P. Ng, "Speech scrambling with hadamard transform in transform domain", Proc. 6th International conference on signal processing, pp. 1560-1563, Aug. 2002.
  15. M. Johnson, P. Ishwar, V. M. Prabhakaran, D. Schonberg, and K. Ramchandran, "On compressing encrypted data," IEEE Trans. Signal Process. , Vol. 52, No. 10, Pt. 2, pp. 2992–3006, Oct. 2004.
  16. R. G. Gallager, "Low Density Parity Check Codes," Ph. D. dissertation, Mass. Inst. Technol. , Cambridge, MA, 1963.
  17. D. Schonberg, S. C. Draper, and K. Ramchandran, "On blind compression of encrypted correlated data approaching the source entropy rate," in Proc. 43rd Annu. Allerton Conf. , Allerton, IL, 2005.
  18. R. Lazzeretti and M. Barni, "Lossless compression of encrypted grey-level and color images," in Proc. 16th Eur. Signal Processing Conf. (EUSIPCO 2008), Lausanne, Switzerland, Aug. 2008 [Online] Available: http://www. eurasip. org/Proceedings/Eusipco/Eusipco2008/pap-ers/1569105134. pdf
  19. W. Liu, W. Zeng, L. Dong, and Q. Yao, "Ef?cient compression of encrypted grayscale images," IEEE Trans. Image Process. , Vol. 19, No. 4, pp. 1097–1102, Apr. 2010.
  20. W. Liu, W. Zeng, L. Dong, and Q. Yao, "Ef?cient compression of encrypted grayscale images," IEEE Trans. Image Process. , Vol. 19, No. 4, pp. 1097–1102, Apr. 2010.
  21. D. Schonberg, S. C. Draper, C. Yeo, and K. Ramchandran, "Toward compression of encrypted images and video sequences," IEEE Trans. Inf. Forensics Security, Vol. 3, No. 4, pp. 749–762, Dec. 2008.
  22. T. Bianchi, A. Piva, and M. Barni, "Composite signal representation for fast and storage-ef?cient processing of encrypted signals," IEEE Trans. Inf. Forensics Security, Vol. 5, No. 1, pp. 180–187, Mar. 2010.
  23. J. -C. Yen and J. -I. Guo, "Ef?cient hierarchical chaotic image encryption algorithm and its VLSI realization," Proc. Inst. Elect. Eng. , Vis. Image Signal Process. , Vol. 147, No. 2, pp. 167–175, 2000.
  24. N. Bourbakis and C. Alexopoulos, "Picture data encryption using SCAN patterns," Pattern Recognit. , Vol. 25, No. 6, pp. 567–581, 1992.
Index Terms

Computer Science
Information Sciences

Keywords

Image Compression Image Encryption Image Decryption Image Decompression Image Reconstruction