International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 62 - Number 1 |
Year of Publication: 2013 |
Authors: Asha P. Ghodake, Sujata Mendgudle |
10.5120/10044-4628 |
Asha P. Ghodake, Sujata Mendgudle . Security and Privacy of Image by Encryption, Lossy Compression and Iterative Reconstruction. International Journal of Computer Applications. 62, 1 ( January 2013), 16-20. DOI=10.5120/10044-4628
Now a days, large files such as digital images, to be easily transmitted over the internet. New problems associated with this are security and privacy of image. Using pseudorandom permutation, image encryption is obtained. Confidentiality and access control is done by encryption. Encrypted image is compressed by using orthogonal transform. Irrelevance and redundancy of the image data is reduced by image compression because this is easy to store or transmit data in an efficient form. Reconstruct the original image by iterative reconstruction procedure. In this, flexible compression ratio is used and significantly improves the compression efficiency.