Designing an Efficient Image Encryption-Then
Compression System via Prediction Error Clustering and Random Permutation
ABSTRACT:
In many
practical scenarios, image encryption has to be conducted prior to image
compression. This has led to the problem of how to design a pair of image
encryption and compression algorithms such that compressing the encrypted
images can still be efficiently performed. In this paper, we design a highly
efficient image encryption-then-compression (ETC) system, where both lossless
and lossy compressions are considered. The proposed image encryption scheme
operated in the prediction error domain is shown to be able to provide a
reasonably high level of security. We also demonstrate that an arithmetic
coding-based approach can be exploited to efficiently compress the encrypted
images. More notably, the proposed compression approach applied to encrypted
images is only slightly worse, in terms of compression efficiency, than the
state-of-the-art lossless/lossy image coders, which take original, unencrypted
images as inputs. In contrast, most of the existing ETC solutions induce
significant penalty on the compression efficiency.
EXISTING SYSTEM:
] Existing ETC solutions induce significant penalty on
the compression efficiency.
DISADVANTAGES
OF EXISTING SYSTEM:
Ø More Prediction error.
Ø Lossy Image Compression.
PROPOSED SYSTEM:
Ø In this paper, we design a highly efficient image
encryption-then-compression (ETC) system, where both lossless and lossy
compression are considered.
Ø The proposed image encryption scheme operated in the
predic tion error domain is shown to be able to provide a reasonably high level
of security.
Ø We also demonstrate that an arithmetic coding-based
approach can be exploited to efficiently compress the encrypted images.
ADVANTAGES
OF PROPOSED SYSTEM:
Ø The ability of controlling the lowest achievable rate
by the content owner may be treated as an advantageous feature of the proposed
ETC scheme, since the quality of the decoded image at receiver side is
guaranteed, though the manipulation of the encrypted data is completely handled
by an untrusted party.
Ø Attack model applicable to our proposed encryption
scheme is the ciphertext-only attack in which the attacker can only access the
ciphertext and attempts to recover the original image.
Ø Our proposed compression method on encrypted images is
very close to that of the state- of-the-art lossless/lossy image codecs, which
receive original, unencrypted images as inputs
SYSTEM
REQUIREMENTS:
HARDWARE REQUIREMENTS:
Ø
System : Pentium IV 2.4 GHz.
Ø
Hard Disk :
40 GB.
Ø
Floppy Drive : 1.44
Mb.
Ø
Monitor : 15
VGA Colour.
Ø
Mouse :
Logitech.
Ø Ram : 512 Mb.
SOFTWARE
REQUIREMENTS:
Ø Operating system : Windows
XP/7.
Ø Coding Language : ASP.net,
C#.net
Ø Tool : Visual Studio 2010
Ø Database : SQL
SERVER 2008
REFERENCE:
Jiantao Zhou,Xianming
Liu, Oscar C. Au, and Yuan Yan Tang, “Designing an Efficient Image
Encryption-Then-Compression System via Prediction Error Clustering and Random
Permutation”, VOL. 9, NO. 1, JANUARY 2014.
No comments:
Post a Comment