Designing an Efficient Image Encryption-Then

advertisement
Designing an Efficient Image Encryption-Then-Compression System via Prediction Error
Clustering and Random Perm
Designing an Efficient Image Encryption-Then-Compression System via
Prediction Error Clustering and Random Perm
ABSTRACT
In many practical scenarios, image encryption has to be conducted prior to image compression.
This has led to the problem of how to design a pair of image encryption and compression
algorithms such that compressing the encrypted images can still be efficiently performed. In this
paper, we design a highly efficient image encryption-then-compression (ETC) system, where
both lossless and lossy compressions are considered. The proposed image encryption scheme
operated in the prediction error domain is shown to be able to provide a reasonably high level of
security. We also demonstrate that an arithmetic coding-based approach can be exploited to
efficiently compress the encrypted images. More notably, the proposed compression approach
applied to encrypted images is only slightly worse, in terms of compression efficiency, than the
state-of-the-art lossless/lossy image coders, which take original, unencrypted images as inputs. In
contrast, most of the existing ETC solutions induce significant penalty on the compression
efficiency.
EXISTING SYSTEM:
 Existing ETC solutions induce significant penalty on the compression efficiency.
DISADVANTAGES OF EXISTING SYSTEM:
 More Prediction error.
 Lossy Image Compression.
PROPOSED SYSTEM:
 In this paper, we design a highly efficient image encryption-then-compression (ETC)
system, where both lossless and lossy compression are considered.
 The proposed image encryption scheme operated in the predic tion error domain is shown
to be able to provide a reasonably high level of security.
Contact: 9703109334, 9533694296
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
Designing an Efficient Image Encryption-Then-Compression System via Prediction Error
Clustering and Random Perm
 We also demonstrate that an arithmetic coding-based approach can be exploited to
efficiently compress the encrypted images.
ADVANTAGES OF PROPOSED SYSTEM:
 The ability of controlling the lowest achievable rate by the content owner may be treated
as an advantageous feature of the proposed ETC scheme, since the quality of the decoded
image at receiver side is guaranteed, though the manipulation of the encrypted data is
completely handled by an untrusted party.
 Attack model applicable to our proposed encryption scheme is the ciphertext-only attack
in which the attacker can only access the ciphertext and attempts to recover the original
image.
 Our proposed compression method on encrypted images is very close to that of the stateof-the-art lossless/lossy image codecs, which receive original, unencrypted images as
inputs
SYSTEM ARCHITECTURE:
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System
:
Pentium IV 2.4 GHz.
Contact: 9703109334, 9533694296
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
Designing an Efficient Image Encryption-Then-Compression System via Prediction Error
Clustering and Random Perm
 Hard Disk
 Floppy Drive
:
:
 Monitor
40 GB.
1.44 Mb.
:
15 VGA Colour.
 Mouse
:
Logitech.
 Ram
:
512 Mb.
 Operating system
:
Windows XP/7.
 Coding Language
:
ASP.net, C#.net
 Tool
:
Visual Studio 2010
 Database
:
SQL SERVER 2008
SOFTWARE REQUIREMENTS:
REFERENCE:
Jiantao Zhou,Xianming Liu, Oscar C. Au, and Yuan Yan Tang, “Designing an Efficient Image
Encryption-Then-Compression System via Prediction Error Clustering and Random
Permutation”, VOL. 9, NO. 1, JANUARY 2014.
Contact: 9703109334, 9533694296
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
Download