Downloads: 117
M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015
Hueristic Approch for Image Encryption and then Compression by Tree Pattern Approach
Devashri Anil Vyawahare [2] | Anil Gujar [2]
Abstract: Most of the times while any message is transferring across the network for security reasons they are normally encrypted directly to make user visibly unreadable or it will be encrypted (hidden) in an image. And now a days data hacker becomes too intelligent to break the encrypted images to get the original contents. So many systems are designed to combine the encryption and compression in single mould to provide greater security. So we are presenting a novel approach of encryption by maintaining run time LSB (least significant bit) using image decomposition method. This actually enhances the encryption processes by converting image into small blocks of hierarchical cluster of the LSBs. These blocks can be holding the users message in many different patterns which is actually highly difficult to predict by the hackers. And then all individual blocks can be put in a tree to compress in the same hierarchy of decomposition. Numbers of techniques are proposed to do so. Image encryption is one of them, it provides a high level security to the image. Larger images are difficult to process hence image compression can be done after encryption process. Proposed approach designs the image encryption and then compression (ETC) which is suitable for both lossy and loss less images. Also the proposed scheme is operated on the prediction error domain. An arithmetic code based approach is used for the compression of the image because it performs well than any others.
Keywords: Encryption, Compression, normalization, byte tree
Edition: Volume 4 Issue 7, July 2015,
Pages: 2603 - 2607
Similar Articles with Keyword 'Encryption'
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
Downloads: 0
Informative Article, Computer Science & Engineering, United States of America, Volume 14 Issue 3, March 2025
Pages: 92 - 94Strengthening Key Management Systems with Dedicated HSM Solution
Pankaj Bhandula