Downloads: 111 | Views: 224
Research Paper | Computer Science & Engineering | India | Volume 5 Issue 6, June 2016 | Popularity: 6.7 / 10
DCT Image Compression and Secure Deduplication with Efficient Convergent Key Management
Soofiya MS, Sreetha V Kumar
Abstract: As our use and reliance of computer grows day by day we need an efficient way to manage our large amount of data. Sometimes a person has to use large amount of images like webpages or catalogs need to use some techniques for image compression. This is because the amount of space required to hold large amount of image can be prohibitively large in terms of cost. Fortunately we have several method of image compression available today. Discrete Cosine Transform separates images into parts of different frequencies. In a step called quantization in DCT the less important frequencies are discarded. Then for decompression process only most important frequencies are considered to recover the image. Management of large amount of data has become one of the greatest problem in todays cloud storage services. For data management a technique called Deduplication is introduced. Deduplication avoids duplicate copies being stored in the cloud. Convergent encryption is an efficient way to enforce deduplication. But the problem in making convergent encryption possible is the management of large number of keys. To this end for the management of keys we propose a new technique called Dekey. We implement Dekey using visual cryptography. This paper proposes Dekey for convergent key management, DCT image compression for minimizing storage space and for improving security and deduplication for avoiding redundant copies.
Keywords: DCT image compression, Deduplication, Dekey, convergent encryption, visual cryptography
Edition: Volume 5 Issue 6, June 2016
Pages: 1491 - 1494
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 101
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 1054 - 1058Colour Extended Visual Cryptography based on MKGED
T. Anuradha, Dr. K. Usha Rani
Downloads: 101
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1526 - 1530A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention
Anju Mohan
Downloads: 106
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2545 - 2549Implementation of Random Grid Visual Cryptography for Color Images
Snehal N. Meshram, Sneha U. Bohra
Downloads: 107
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 2657 - 2659An Outline of Various Secret Sharing Techniques
Kavita Choudhary, Kumar Vaibhav
Downloads: 107 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 1155 - 1157Avoidance of Unauthorized user using Visual Cryptography
Dayanand G Savakar, Pandurang H Biradar