SlideShare a Scribd company logo
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
DESIGNING AN EFFICIENT IMAGE ENCRYPTION-THEN-COMPRESSION 
SYSTEM VIA PREDICTION ERROR CLUSTERING 
AND RANDOM PERMUTATION 
ABSTRACT 
Image encryption has to be conducted prior to image compression in many 
applications. This has led to the problem of how to design a pair of image 
encryption and compression algorithms such that compressing the encrypted 
images can still be efficiently performed. In this paper, we design a highly efficient 
image encryption-then-compression (ETC) system, where both lossless and lossy 
compression are considered. The proposed image encryption scheme operated in 
the prediction error domain is shown to be able to provide a reasonably high level 
of security. We also demonstrate that an arithmetic coding-based approach can be 
exploited to efficiently compress the encrypted images. More notably, the 
proposed compression approach applied to encrypted images is only slightly 
worse, in terms of compression efficiency, than the state-of-the-art lossless/lossy 
image coders, which take original, unencrypted images as inputs. In contrast, most 
of the existing ETC solutions induce significant penalty on the compression 
efficiency.
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
INTRODUCTION 
Consider an application scenario in which a content owner Alice wants to securely 
and efficiently transmit an image I to a recipient Bob, via an untrusted channel 
provider Charlie. Conventionally, this could be done as follows. Alice first 
compresses I into B, and then encrypts B into Ie using an encryption function EK 
(¡), where K denotes the secret key. The encrypted data Ie is then passed to 
Charlie, who simply forwards it to Bob. Upon receiving Ie, Bob sequentially 
performs decryption to get a reconstructed image ˆ I. 
SCOPE OF WORK 
Even though Compression-then-Encryption (CTE) paradigm meets the 
requirements in many secure transmission scenarios, the order of applying the 
compression and encryption needs to be reversed in some other situations. As the 
content owner, is always interested in protecting the privacy of the image data 
through encryption. Nevertheless, he has no incentive to compress her data, and 
hence, will not use her limited computational resources to run a compression 
algorithm before encrypting the data. This is especially true when content owner 
uses a resource-deprived mobile device. In contrast, the channel provider has an 
overriding interest in compressing all the network traffic so as to maximize the 
network utilization. It is therefore much desired if the compression task can be
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
delegated by channel provider, who typically has abundant computational 
resources. 
PROBLEM DEFINITION 
A content owner wants to securely and efficiently transmit an image I to a 
recipient, via an untrusted channel provider. Content owner first compresses the 
image I, and then encrypts the image into Ie using an encryption function EK (¡), 
where K denotes the secret key. The encrypted data Ie is then passed to content 
receiver, who simply forwards through untrusted channel provider. After receiving 
Ie, content sequentially performs decryption to get a reconstructed image. To 
design a framework, which securely transfer the image via untrusted channel 
provider is to be studied. 
PROBLEM SOLUTION 
The primary focus of this work is on the practical design of a pair of image 
encryption and compression schemes, in such a way that compressing the 
encrypted images is almost equally efficient as compressing their original, 
unencrypted counterparts.
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
CHALLENGES 
A big challenge within such Encryption-then-Compression (ETC) framework is 
that compression has to be conducted in the encrypted domain. The possibility of 
processing encrypted signals directly in the encrypted domain has been receiving 
increasing attention. At the first glance, it seems to be infeasible for channel 
provider to compress the encrypted data, since no signal structure can be exploited 
to enable a traditional compressor. 
EXISTING SYSTEM 
 By applying LDPC codes in various bit-planes and exploiting the inter/intra 
correlation, several methods available for lossless compression of encrypted 
grayscale/color images. 
 Aided by rate-compatible punctured turbo codes a progressive method was 
proposed to losslessly compress stream cipher encrypted grayscale/color 
images. 
 Compressing block cipher encrypted data was studied, to achieve higher 
compression ratios, lossy compression of encrypted data was also studied. 
 A scalable lossy coding framework of encrypted images via a multi-resolution 
construction was proposed. 
 A compressive sensing (CS) mechanism was utilized to compress encrypted 
images resulted from linear encryption. A modified basis pursuit algorithm
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
can then be applied to estimate the original image from the compressed and 
encrypted data. Another CS-based approach for encrypting compressed 
images was reported. 
 An image encryption scheme via pixel-domain permutation, and 
demonstrated that the encrypted file can be efficiently compressed by 
discarding the excessively rough and fine information of coefficients in the 
transform domain. 
Disadvantages 
 Even though the above Compression-then-Encryption (CTE) paradigm 
meets the requirements in many secure transmission scenarios, the order of 
applying the compression and encryption needs to be reversed in some other 
situations. 
PROPOSED SYSTEM 
The primary focus of this work is on the practical design of a pair of image 
encryption and compression schemes, in such a way that compressing the 
encrypted images is almost equally efficient as compressing their original, 
unencrypted counterparts. 
To propose a permutation-based image encryption approach conducted over the 
prediction error domain.
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
A context-adaptive arithmetic coding (AC) is then shown to be able to efficiently 
compress the encrypted data. 
Thanks to the nearly i.i.d property of the prediction error sequence, negligible 
compression penalty (< 0.1% coding loss for lossless case) will be introduced. 
Furthermore, due to the high sensitivity of prediction error sequence against 
disturbances, reasonably high level of security could be retained. 
Advantages 
 Reasonably high level of security needs is ensured. 
HARDWARE REQUIREMENTS 
Processor : Any Processor above 500 MHz. 
Ram : 128Mb. 
Hard Disk : 10 Gb. 
Compact Disk : 650 Mb. 
Input device : Standard Keyboard and Mouse. 
Output device : VGA and High Resolution Monitor. 
SOFTWARE SPECIFICATION
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
Operating System : Windows Family. 
Pages developed using : Java Swing 
Techniques : JDK 1.5 or higher 
LITERATURE SUMMARY 
 Schonberg et. al later investigated the problem of compressing encrypted 
images when the underlying source statistics is unknown and the sources 
have memory. 
 By applying LDPC codes in various bit-planes and exploiting the inter/intra 
correlation, Lazzeretti and Barni presented several methods for lossless 
compression of encrypted grayscale/color images. 
 Kumar and Makur applied the approach to the prediction error domain and 
achieved better lossless compression performance on the encrypted 
grayscale/color images. 
 Aided by rate-compatible punctured turbo codes, Liu et. al developed a 
progressive method to losslessly compress stream cipher encrypted 
grayscale/color images. 
 Klinc et al. extended Johnson’s framework to the case of compressing block 
cipher encrypted data. To achieve higher compression ratios, lossy 
compression of encrypted data was also studied.
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
 Zhang et. Al proposed a scalable lossy coding framework of encrypted 
images via a multi-resolution construction. 
 A compressive sensing (CS) mechanism was utilized to compress encrypted 
images resulted from linear encryption. A modified basis pursuit algorithm 
can then be applied to estimate the original image from the compressed and 
encrypted data. Another CS-based approach for encrypting compressed 
images was reported. 
 Zhang designed an image encryption scheme via pixel-domain permutation, 
and demonstrated that the encrypted file can be efficiently compressed by 
discarding the excessively rough and fine information of coefficients in the 
transform domain. 
 Zhang et. al suggested a new compression approach for encrypted images 
through multi-layer decomposition. 
 Extensions to blind compression of encrypted videos were developed. 
 Despite extensive efforts in recent years, the existing ETC systems still fall 
significantly short in the compression performance, compared with the state-of- 
the-art lossless/lossy image compression performance on the encrypted 
grayscale/color images.

More Related Content

What's hot (20)

PPTX
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
alphin jose
 
DOCX
Secure reversible image data hiding over encrypted domain via key modulation
I3E Technologies
 
PPTX
Image encryption and decryption
Aashish R
 
DOCX
Reversible data hiding in encrypted images by reserving room before encryption
IEEEFINALYEARPROJECTS
 
DOCX
Image encryption using aes key expansion
Sreeda Perikamana
 
PDF
Secured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
CSCJournals
 
PDF
Transmission of cryptic text using rotational visual
eSAT Publishing House
 
PDF
Transmission of cryptic text using rotational visual cryptography
eSAT Journals
 
DOCX
(Sample) image encryption
AnsabArshad
 
PPTX
Learnable Image Encryption
Masayuki Tanaka
 
PDF
A new image steganography algorithm based
IJNSA Journal
 
PPTX
Image Security
Satyendra Rajput
 
PDF
Image encryption
rakshit2105
 
PDF
Image Cryptography using Nearest Prime Pixels
muhammed jassim k
 
PDF
Reversible Data Hiding in Encrypted Image: A Review
Editor IJMTER
 
PDF
IJAER Publishes
AmAl C
 
PPTX
Reversible data hiding using histogram shifting method
Himanshu Bal
 
PDF
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijripublishers Ijri
 
PPTX
PVD BASED STEGNO.
Abhishek Dhara
 
PDF
F1803063236
IOSR Journals
 
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
alphin jose
 
Secure reversible image data hiding over encrypted domain via key modulation
I3E Technologies
 
Image encryption and decryption
Aashish R
 
Reversible data hiding in encrypted images by reserving room before encryption
IEEEFINALYEARPROJECTS
 
Image encryption using aes key expansion
Sreeda Perikamana
 
Secured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
CSCJournals
 
Transmission of cryptic text using rotational visual
eSAT Publishing House
 
Transmission of cryptic text using rotational visual cryptography
eSAT Journals
 
(Sample) image encryption
AnsabArshad
 
Learnable Image Encryption
Masayuki Tanaka
 
A new image steganography algorithm based
IJNSA Journal
 
Image Security
Satyendra Rajput
 
Image encryption
rakshit2105
 
Image Cryptography using Nearest Prime Pixels
muhammed jassim k
 
Reversible Data Hiding in Encrypted Image: A Review
Editor IJMTER
 
IJAER Publishes
AmAl C
 
Reversible data hiding using histogram shifting method
Himanshu Bal
 
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijripublishers Ijri
 
PVD BASED STEGNO.
Abhishek Dhara
 
F1803063236
IOSR Journals
 

Viewers also liked (14)

PDF
A fast acquisition all-digital delay-locked loop using a starting-bit predict...
LeMeniz Infotech
 
PDF
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
CSCJournals
 
PDF
Cryptanalysis of image encryption using traditional encryption tecnhniques
Ritwik MG
 
PPT
A hybrid genetic algorithm and chaotic function model for image encryption
sadique_ghitm
 
PPTX
Blogger did you know!
JustyC
 
PPTX
Images
Patri Nista
 
PPSX
The middle ages
TEACHERSONLINE
 
PPTX
Secco @ AppsWorld London Nov 2015
Chris Gledhill
 
PDF
Hazmat suits and content zero: How I learned to study digital marketing like ...
Jessica Hale
 
PDF
Алексей Янин (Websellers): эффективная реклама в социальных медиа
Ekaterina Giganova
 
DOCX
TecnologĂ­a
Karito Grisales
 
PPTX
Telemno Life Agency Marketing & Compensation plan
TELEMNO LIFE AGENCY
 
PDF
Wave 2 - Mobility | UM | Social Media Tracker
UM Wave
 
PDF
Emr a scalable graph based ranking model for content-based image retrieval .
LeMeniz Infotech
 
A fast acquisition all-digital delay-locked loop using a starting-bit predict...
LeMeniz Infotech
 
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
CSCJournals
 
Cryptanalysis of image encryption using traditional encryption tecnhniques
Ritwik MG
 
A hybrid genetic algorithm and chaotic function model for image encryption
sadique_ghitm
 
Blogger did you know!
JustyC
 
Images
Patri Nista
 
The middle ages
TEACHERSONLINE
 
Secco @ AppsWorld London Nov 2015
Chris Gledhill
 
Hazmat suits and content zero: How I learned to study digital marketing like ...
Jessica Hale
 
Алексей Янин (Websellers): эффективная реклама в социальных медиа
Ekaterina Giganova
 
TecnologĂ­a
Karito Grisales
 
Telemno Life Agency Marketing & Compensation plan
TELEMNO LIFE AGENCY
 
Wave 2 - Mobility | UM | Social Media Tracker
UM Wave
 
Emr a scalable graph based ranking model for content-based image retrieval .
LeMeniz Infotech
 
Ad

Similar to Designing an efficient image encryption then-compression system via prediction error clustering and random permutation (20)

DOCX
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Designing an efficient image encr...
IEEEBEBTECHSTUDENTPROJECTS
 
PPT
Presentation_Format (1).ppt
PavanNagre6
 
PDF
Image Encryption-Then-Compression System via Prediction Error Clustering and ...
AM Publications,India
 
DOCX
IEEE 2014 DOTNET IMAGE PROCESSING PROJECTS Designing an-efficient-image encry...
IEEEBEBTECHSTUDENTPROJECTS
 
DOCX
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Designing an-efficient-image
IEEEBEBTECHSTUDENTSPROJECTS
 
DOCX
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Designing an-efficient-image encrypt...
IEEEFINALYEARSTUDENTPROJECTS
 
DOCX
2014 IEEE JAVA IMAGE PROCESSING PROJECT Designing an-efficient-image encryption
IEEEBEBTECHSTUDENTSPROJECTS
 
DOCX
JPM1406 Dual-Geometric Neighbor Embedding for Image Super Resolution With Sp...
chennaijp
 
PDF
Highly secure scalable compression of encrypted images
eSAT Journals
 
PPTX
Presentation
Ganesh Gunjal
 
PDF
Scalable Image Encryption Based Lossless Image Compression
IJERA Editor
 
PDF
Color image encryption based on chaotic shit keying with lossless compression
IJECEIAES
 
PDF
Psdot 17 new channel selection rule for jpeg steganography
ZTech Proje
 
PPTX
Biometric Hashing technique for Authentication
AnIsh Kumar
 
PDF
A secured data transmission system by reversible data hiding with scalable co...
IAEME Publication
 
PDF
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
sipij
 
PPTX
research review committe review paper for discussion
deanacademics47
 
PPTX
research review committee review status new
deanacademics47
 
PDF
Comparison of different Fingerprint Compression Techniques
sipij
 
PDF
I1803035762
IOSR Journals
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Designing an efficient image encr...
IEEEBEBTECHSTUDENTPROJECTS
 
Presentation_Format (1).ppt
PavanNagre6
 
Image Encryption-Then-Compression System via Prediction Error Clustering and ...
AM Publications,India
 
IEEE 2014 DOTNET IMAGE PROCESSING PROJECTS Designing an-efficient-image encry...
IEEEBEBTECHSTUDENTPROJECTS
 
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Designing an-efficient-image
IEEEBEBTECHSTUDENTSPROJECTS
 
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Designing an-efficient-image encrypt...
IEEEFINALYEARSTUDENTPROJECTS
 
2014 IEEE JAVA IMAGE PROCESSING PROJECT Designing an-efficient-image encryption
IEEEBEBTECHSTUDENTSPROJECTS
 
JPM1406 Dual-Geometric Neighbor Embedding for Image Super Resolution With Sp...
chennaijp
 
Highly secure scalable compression of encrypted images
eSAT Journals
 
Presentation
Ganesh Gunjal
 
Scalable Image Encryption Based Lossless Image Compression
IJERA Editor
 
Color image encryption based on chaotic shit keying with lossless compression
IJECEIAES
 
Psdot 17 new channel selection rule for jpeg steganography
ZTech Proje
 
Biometric Hashing technique for Authentication
AnIsh Kumar
 
A secured data transmission system by reversible data hiding with scalable co...
IAEME Publication
 
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
sipij
 
research review committe review paper for discussion
deanacademics47
 
research review committee review status new
deanacademics47
 
Comparison of different Fingerprint Compression Techniques
sipij
 
I1803035762
IOSR Journals
 
Ad

More from LeMeniz Infotech (20)

PDF
A fast fault tolerant architecture for sauvola local image thresholding algor...
LeMeniz Infotech
 
PDF
A dynamically reconfigurable multi asip architecture for multistandard and mu...
LeMeniz Infotech
 
PDF
Interleaved digital power factor correction based on the sliding mode approach
LeMeniz Infotech
 
PDF
Bumpless control for reduced thd in power factor correction circuits
LeMeniz Infotech
 
PDF
A bidirectional single stage three phase rectifier with high-frequency isolat...
LeMeniz Infotech
 
PDF
A bidirectional three level llc resonant converter with pwam control
LeMeniz Infotech
 
PDF
Efficient single phase transformerless inverter for grid tied pvg system with...
LeMeniz Infotech
 
PDF
Highly reliable transformerless photovoltaic inverters with leakage current a...
LeMeniz Infotech
 
PDF
Grid current-feedback active damping for lcl resonance in grid-connected volt...
LeMeniz Infotech
 
PDF
Delay dependent stability of single-loop controlled grid-connected inverters ...
LeMeniz Infotech
 
PDF
Connection of converters to a low and medium power dc network using an induct...
LeMeniz Infotech
 
PDF
Stamp enabling privacy preserving location proofs for mobile users
LeMeniz Infotech
 
PDF
Sbvlc secure barcode based visible light communication for smartphones
LeMeniz Infotech
 
PDF
Read2 me a cloud based reading aid for the visually impaired
LeMeniz Infotech
 
PDF
Privacy preserving location sharing services for social networks
LeMeniz Infotech
 
PDF
Pass byo bring your own picture for securing graphical passwords
LeMeniz Infotech
 
PDF
Eplq efficient privacy preserving location-based query over outsourced encryp...
LeMeniz Infotech
 
PDF
Analyzing ad library updates in android apps
LeMeniz Infotech
 
PDF
An exploration of geographic authentication scheme
LeMeniz Infotech
 
PDF
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017
LeMeniz Infotech
 
A fast fault tolerant architecture for sauvola local image thresholding algor...
LeMeniz Infotech
 
A dynamically reconfigurable multi asip architecture for multistandard and mu...
LeMeniz Infotech
 
Interleaved digital power factor correction based on the sliding mode approach
LeMeniz Infotech
 
Bumpless control for reduced thd in power factor correction circuits
LeMeniz Infotech
 
A bidirectional single stage three phase rectifier with high-frequency isolat...
LeMeniz Infotech
 
A bidirectional three level llc resonant converter with pwam control
LeMeniz Infotech
 
Efficient single phase transformerless inverter for grid tied pvg system with...
LeMeniz Infotech
 
Highly reliable transformerless photovoltaic inverters with leakage current a...
LeMeniz Infotech
 
Grid current-feedback active damping for lcl resonance in grid-connected volt...
LeMeniz Infotech
 
Delay dependent stability of single-loop controlled grid-connected inverters ...
LeMeniz Infotech
 
Connection of converters to a low and medium power dc network using an induct...
LeMeniz Infotech
 
Stamp enabling privacy preserving location proofs for mobile users
LeMeniz Infotech
 
Sbvlc secure barcode based visible light communication for smartphones
LeMeniz Infotech
 
Read2 me a cloud based reading aid for the visually impaired
LeMeniz Infotech
 
Privacy preserving location sharing services for social networks
LeMeniz Infotech
 
Pass byo bring your own picture for securing graphical passwords
LeMeniz Infotech
 
Eplq efficient privacy preserving location-based query over outsourced encryp...
LeMeniz Infotech
 
Analyzing ad library updates in android apps
LeMeniz Infotech
 
An exploration of geographic authentication scheme
LeMeniz Infotech
 
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017
LeMeniz Infotech
 

Recently uploaded (20)

PDF
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Priyanka Aash
 
PDF
Java 25 and Beyond - A Roadmap of Innovations
Ana-Maria Mihalceanu
 
PPTX
Paycifi - Programmable Trust_Breakfast_PPTXT
FinTech Belgium
 
PDF
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) Slides
Ravi Tamada
 
PDF
2025_06_18 - OpenMetadata Community Meeting.pdf
OpenMetadata
 
DOCX
Daily Lesson Log MATATAG ICT TEchnology 8
LOIDAALMAZAN3
 
PDF
FME as an Orchestration Tool with Principles From Data Gravity
Safe Software
 
PPTX
Practical Applications of AI in Local Government
OnBoard
 
PDF
“Scaling i.MX Applications Processors’ Native Edge AI with Discrete AI Accele...
Edge AI and Vision Alliance
 
PDF
LLM Search Readiness Audit - Dentsu x SEO Square - June 2025.pdf
Nick Samuel
 
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Priyanka Aash
 
PDF
ArcGIS Utility Network Migration - The Hunter Water Story
Safe Software
 
PDF
How to Visualize the ​Spatio-Temporal Data Using CesiumJS​
SANGHEE SHIN
 
PDF
My Journey from CAD to BIM: A True Underdog Story
Safe Software
 
PDF
Plugging AI into everything: Model Context Protocol Simplified.pdf
Abati Adewale
 
PDF
Enhancing Environmental Monitoring with Real-Time Data Integration: Leveragin...
Safe Software
 
PDF
5 Things to Consider When Deploying AI in Your Enterprise
Safe Software
 
PPTX
MARTSIA: A Tool for Confidential Data Exchange via Public Blockchain - Pitch ...
Michele Kryston
 
PDF
Redefining Work in the Age of AI - What to expect? How to prepare? Why it mat...
Malinda Kapuruge
 
PDF
Hello I'm "AI" Your New _________________
Dr. Tathagat Varma
 
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Priyanka Aash
 
Java 25 and Beyond - A Roadmap of Innovations
Ana-Maria Mihalceanu
 
Paycifi - Programmable Trust_Breakfast_PPTXT
FinTech Belgium
 
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) Slides
Ravi Tamada
 
2025_06_18 - OpenMetadata Community Meeting.pdf
OpenMetadata
 
Daily Lesson Log MATATAG ICT TEchnology 8
LOIDAALMAZAN3
 
FME as an Orchestration Tool with Principles From Data Gravity
Safe Software
 
Practical Applications of AI in Local Government
OnBoard
 
“Scaling i.MX Applications Processors’ Native Edge AI with Discrete AI Accele...
Edge AI and Vision Alliance
 
LLM Search Readiness Audit - Dentsu x SEO Square - June 2025.pdf
Nick Samuel
 
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Priyanka Aash
 
ArcGIS Utility Network Migration - The Hunter Water Story
Safe Software
 
How to Visualize the ​Spatio-Temporal Data Using CesiumJS​
SANGHEE SHIN
 
My Journey from CAD to BIM: A True Underdog Story
Safe Software
 
Plugging AI into everything: Model Context Protocol Simplified.pdf
Abati Adewale
 
Enhancing Environmental Monitoring with Real-Time Data Integration: Leveragin...
Safe Software
 
5 Things to Consider When Deploying AI in Your Enterprise
Safe Software
 
MARTSIA: A Tool for Confidential Data Exchange via Public Blockchain - Pitch ...
Michele Kryston
 
Redefining Work in the Age of AI - What to expect? How to prepare? Why it mat...
Malinda Kapuruge
 
Hello I'm "AI" Your New _________________
Dr. Tathagat Varma
 

Designing an efficient image encryption then-compression system via prediction error clustering and random permutation

  • 1. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts DESIGNING AN EFFICIENT IMAGE ENCRYPTION-THEN-COMPRESSION SYSTEM VIA PREDICTION ERROR CLUSTERING AND RANDOM PERMUTATION ABSTRACT Image encryption has to be conducted prior to image compression in many applications. This has led to the problem of how to design a pair of image encryption and compression algorithms such that compressing the encrypted images can still be efficiently performed. In this paper, we design a highly efficient image encryption-then-compression (ETC) system, where both lossless and lossy compression are considered. The proposed image encryption scheme operated in the prediction error domain is shown to be able to provide a reasonably high level of security. We also demonstrate that an arithmetic coding-based approach can be exploited to efficiently compress the encrypted images. More notably, the proposed compression approach applied to encrypted images is only slightly worse, in terms of compression efficiency, than the state-of-the-art lossless/lossy image coders, which take original, unencrypted images as inputs. In contrast, most of the existing ETC solutions induce significant penalty on the compression efficiency.
  • 2. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts INTRODUCTION Consider an application scenario in which a content owner Alice wants to securely and efficiently transmit an image I to a recipient Bob, via an untrusted channel provider Charlie. Conventionally, this could be done as follows. Alice first compresses I into B, and then encrypts B into Ie using an encryption function EK (¡), where K denotes the secret key. The encrypted data Ie is then passed to Charlie, who simply forwards it to Bob. Upon receiving Ie, Bob sequentially performs decryption to get a reconstructed image ˆ I. SCOPE OF WORK Even though Compression-then-Encryption (CTE) paradigm meets the requirements in many secure transmission scenarios, the order of applying the compression and encryption needs to be reversed in some other situations. As the content owner, is always interested in protecting the privacy of the image data through encryption. Nevertheless, he has no incentive to compress her data, and hence, will not use her limited computational resources to run a compression algorithm before encrypting the data. This is especially true when content owner uses a resource-deprived mobile device. In contrast, the channel provider has an overriding interest in compressing all the network traffic so as to maximize the network utilization. It is therefore much desired if the compression task can be
  • 3. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts delegated by channel provider, who typically has abundant computational resources. PROBLEM DEFINITION A content owner wants to securely and efficiently transmit an image I to a recipient, via an untrusted channel provider. Content owner first compresses the image I, and then encrypts the image into Ie using an encryption function EK (¡), where K denotes the secret key. The encrypted data Ie is then passed to content receiver, who simply forwards through untrusted channel provider. After receiving Ie, content sequentially performs decryption to get a reconstructed image. To design a framework, which securely transfer the image via untrusted channel provider is to be studied. PROBLEM SOLUTION The primary focus of this work is on the practical design of a pair of image encryption and compression schemes, in such a way that compressing the encrypted images is almost equally efficient as compressing their original, unencrypted counterparts.
  • 4. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts CHALLENGES A big challenge within such Encryption-then-Compression (ETC) framework is that compression has to be conducted in the encrypted domain. The possibility of processing encrypted signals directly in the encrypted domain has been receiving increasing attention. At the first glance, it seems to be infeasible for channel provider to compress the encrypted data, since no signal structure can be exploited to enable a traditional compressor. EXISTING SYSTEM  By applying LDPC codes in various bit-planes and exploiting the inter/intra correlation, several methods available for lossless compression of encrypted grayscale/color images.  Aided by rate-compatible punctured turbo codes a progressive method was proposed to losslessly compress stream cipher encrypted grayscale/color images.  Compressing block cipher encrypted data was studied, to achieve higher compression ratios, lossy compression of encrypted data was also studied.  A scalable lossy coding framework of encrypted images via a multi-resolution construction was proposed.  A compressive sensing (CS) mechanism was utilized to compress encrypted images resulted from linear encryption. A modified basis pursuit algorithm
  • 5. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts can then be applied to estimate the original image from the compressed and encrypted data. Another CS-based approach for encrypting compressed images was reported.  An image encryption scheme via pixel-domain permutation, and demonstrated that the encrypted file can be efficiently compressed by discarding the excessively rough and fine information of coefficients in the transform domain. Disadvantages  Even though the above Compression-then-Encryption (CTE) paradigm meets the requirements in many secure transmission scenarios, the order of applying the compression and encryption needs to be reversed in some other situations. PROPOSED SYSTEM The primary focus of this work is on the practical design of a pair of image encryption and compression schemes, in such a way that compressing the encrypted images is almost equally efficient as compressing their original, unencrypted counterparts. To propose a permutation-based image encryption approach conducted over the prediction error domain.
  • 6. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts A context-adaptive arithmetic coding (AC) is then shown to be able to efficiently compress the encrypted data. Thanks to the nearly i.i.d property of the prediction error sequence, negligible compression penalty (< 0.1% coding loss for lossless case) will be introduced. Furthermore, due to the high sensitivity of prediction error sequence against disturbances, reasonably high level of security could be retained. Advantages  Reasonably high level of security needs is ensured. HARDWARE REQUIREMENTS Processor : Any Processor above 500 MHz. Ram : 128Mb. Hard Disk : 10 Gb. Compact Disk : 650 Mb. Input device : Standard Keyboard and Mouse. Output device : VGA and High Resolution Monitor. SOFTWARE SPECIFICATION
  • 7. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts Operating System : Windows Family. Pages developed using : Java Swing Techniques : JDK 1.5 or higher LITERATURE SUMMARY  Schonberg et. al later investigated the problem of compressing encrypted images when the underlying source statistics is unknown and the sources have memory.  By applying LDPC codes in various bit-planes and exploiting the inter/intra correlation, Lazzeretti and Barni presented several methods for lossless compression of encrypted grayscale/color images.  Kumar and Makur applied the approach to the prediction error domain and achieved better lossless compression performance on the encrypted grayscale/color images.  Aided by rate-compatible punctured turbo codes, Liu et. al developed a progressive method to losslessly compress stream cipher encrypted grayscale/color images.  Klinc et al. extended Johnson’s framework to the case of compressing block cipher encrypted data. To achieve higher compression ratios, lossy compression of encrypted data was also studied.
  • 8. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts  Zhang et. Al proposed a scalable lossy coding framework of encrypted images via a multi-resolution construction.  A compressive sensing (CS) mechanism was utilized to compress encrypted images resulted from linear encryption. A modified basis pursuit algorithm can then be applied to estimate the original image from the compressed and encrypted data. Another CS-based approach for encrypting compressed images was reported.  Zhang designed an image encryption scheme via pixel-domain permutation, and demonstrated that the encrypted file can be efficiently compressed by discarding the excessively rough and fine information of coefficients in the transform domain.  Zhang et. al suggested a new compression approach for encrypted images through multi-layer decomposition.  Extensions to blind compression of encrypted videos were developed.  Despite extensive efforts in recent years, the existing ETC systems still fall significantly short in the compression performance, compared with the state-of- the-art lossless/lossy image compression performance on the encrypted grayscale/color images.