International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 111 | Views: 224

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 6, June 2016 | Popularity: 6.7 / 10


     

DCT Image Compression and Secure Deduplication with Efficient Convergent Key Management

Soofiya MS, Sreetha V Kumar


Abstract: As our use and reliance of computer grows day by day we need an efficient way to manage our large amount of data. Sometimes a person has to use large amount of images like webpages or catalogs need to use some techniques for image compression. This is because the amount of space required to hold large amount of image can be prohibitively large in terms of cost. Fortunately we have several method of image compression available today. Discrete Cosine Transform separates images into parts of different frequencies. In a step called quantization in DCT the less important frequencies are discarded. Then for decompression process only most important frequencies are considered to recover the image. Management of large amount of data has become one of the greatest problem in todays cloud storage services. For data management a technique called Deduplication is introduced. Deduplication avoids duplicate copies being stored in the cloud. Convergent encryption is an efficient way to enforce deduplication. But the problem in making convergent encryption possible is the management of large number of keys. To this end for the management of keys we propose a new technique called Dekey. We implement Dekey using visual cryptography. This paper proposes Dekey for convergent key management, DCT image compression for minimizing storage space and for improving security and deduplication for avoiding redundant copies.


Keywords: DCT image compression, Deduplication, Dekey, convergent encryption, visual cryptography


Edition: Volume 5 Issue 6, June 2016


Pages: 1491 - 1494



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Soofiya MS, Sreetha V Kumar, "DCT Image Compression and Secure Deduplication with Efficient Convergent Key Management", International Journal of Science and Research (IJSR), Volume 5 Issue 6, June 2016, pp. 1491-1494, https://www.ijsr.net/getabstract.php?paperid=NOV164473, DOI: https://www.doi.org/10.21275/NOV164473



Similar Articles

Downloads: 101

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1054 - 1058

Colour Extended Visual Cryptography based on MKGED

T. Anuradha, Dr. K. Usha Rani

Share this Article

Downloads: 101

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1526 - 1530

A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention

Anju Mohan

Share this Article

Downloads: 106

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2545 - 2549

Implementation of Random Grid Visual Cryptography for Color Images

Snehal N. Meshram, Sneha U. Bohra

Share this Article

Downloads: 107

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2657 - 2659

An Outline of Various Secret Sharing Techniques

Kavita Choudhary, Kumar Vaibhav

Share this Article

Downloads: 107 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1155 - 1157

Avoidance of Unauthorized user using Visual Cryptography

Dayanand G Savakar, Pandurang H Biradar

Share this Article



Top