Downloads: 132 | Views: 311
M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 10, October 2015 | Popularity: 6.6 / 10
An Efficient Compression of Strongly Encrypted Images using Error Prediction, AES and Run Length Coding
Stebin Sunny, Chinju Jacob, Justin Jose T
Abstract: We implement an efficient compression of strongly encrypted images using error prediction, AES encryption and Run Length Encoding. In normal cases image encryption has to be done before the image compression. In such cases will leads to a problem of how to design a couple of algorithm for image encryption and compression while preserving the quality and security of the image. In order to provide most priority to the security of the image in the Encryption-then-Compression (ETC) system, we implement an efficient error prediction mechanism before the strong encryption schema. Block cipher mode of encryption is used to enhance the security of the image. We also demonstrate run length coding based compression scenario to improve the efficiency of image compression. While testing, we are able to compress an encrypted 640000 bit image to 278656 bits and the results shown that the proposed system is more promising and convenient.
Keywords: Encryption-then-Compression, Prediction Error, Run Length Coding, Advanced Encryption Standard
Edition: Volume 4 Issue 10, October 2015
Pages: 90 - 95
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2001
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 719
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 699
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 698
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 688
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera