SlideShare a Scribd company logo
GLOBALSOFT TECHNOLOGIES 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com 
Designing an Efficient Image Encryption-Then-Compression 
System via Prediction Error Clustering and Random 
Permutation 
ABSTRACT: 
In many practical scenarios, image encryption has to be conducted prior to image 
compression. This has led to the problem of how to design a pair of image 
encryption and compression algorithms such that compressing the encrypted 
images can still be efficiently performed. In this paper, we design a highly efficient 
image encryption-then-compression (ETC) system, where both lossless and lossy 
compression are considered. The proposed image encryption scheme operated in 
the prediction error domain is shown to be able to provide a reasonably high level 
of security. We also demonstrate that an arithmetic coding-based approach can be 
exploited to efficiently compress the encrypted images. More notably, the 
proposed compression approach applied to encrypted images is only slightly 
worse, in terms of compression efficiency, than the state-of-the-art lossless/lossy
image coders, which take original, unencrypted images as inputs. In contrast, most 
of the existing ETC solutions induce significant penalty on the compression 
efficiency. 
EXISTING SYSTEM: 
Compression-then-Encryption (CTE) paradigm meets the requirements in many 
secure transmission scenarios, the order of applying the compression and 
encryption needs to be reversed in some other situations. As the content owner, 
Alice is always interested in protecting the privacy of the image data through 
encryption. Nevertheless, Alice has no incentive to compress her data, and hence, 
will not use her limited computational resources to run a compression algorithm 
before encrypting the data. This is especially true when Alice uses a resource-deprived 
mobile device. In contrast, the channel provider Charlie has an overriding 
interest in compressing all the network traffic so as to maximize the network 
utilization. It is therefore much desired if the compression task can be delegated by 
Charlie, who typically has abundant computational resources. 
DISADVANTAGES OF EXISTING SYSTEM: 
 the existing ETC systems still fall significantly short in the 
compression performance, compared with the state-of-the-art 
lossless/lossy image and video coders that require unencrypted inputs. 
The primary focus of this work is on the practical design of a pair of 
image encryption and compression schemes, in such a way that 
compressing the encrypted images is almost equally efficient as 
compressing their original, unencrypted counterparts.
PROPOSED SYSTEM: 
To achieve higher compression ratios, lossy compression of encrypted data was 
also studied . Zhang et. Al proposed a scalable lossy coding framework of 
encrypted images via a multi-resolution construction. In a compressive sensing 
(CS) mechanism was utilized to compress encrypted images resulted from linear 
encryption. A modified basis pursuit algorithm can then be applied to estimate the 
original image from the compressed and encrypted data. Another CS-based 
approach for encrypting compressed images was reported. Furthermore, Zhang 
designed an image encryption scheme via pixel-domain permutation, and 
demonstrated that the encrypted file can be efficiently compressed by discarding 
the excessively rough and fine information of coefficients in the transform domain. 
Recently, Zhang et. al suggested a new compression approach for encrypted 
images through multi-layer decomposition. Extensions to blind compression of 
encrypted videos were developed 
ADVANTAGES OF PROPOSED SYSTEM: 
 Highly efficient compression of the encrypted data has then been realized by 
a context-adaptive arithmetic coding approach. 
 Within the proposed framework, the image encryption has been achieved via 
prediction error clustering and random permutation.
SYSTEM ARCHITECTURE: 
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb. 
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7. 
 Coding Language : MATLAB 
 Tool : MATLAB R 2007B
REFERENCE: 
Jiantao Zhou, Member, IEEE, Xianming Liu, Member, IEEE, Oscar C. Au, 
Fellow, IEEE, and Yuan Yan Tang, Fellow, IEEE ,“Designing an Efficient Image 
Encryption-Then-Compression System via Prediction Error Clustering and 
Random Permutation”, IEEE TRANSACTIONS ON INFORMATION 
FORENSICS AND SECURITY, VOL. 9, NO. 1, JANUARY 2014.

More Related Content

Similar to IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Designing an efficient image encryption then-compression system via prediction error clustering and random permutation (20)

DOCX
JPM1404 Designing an Efficient Image Encryption-Then-Compression System via...
chennaijp
 
DOCX
2014 IEEE JAVA IMAGE PROCESSING PROJECT Designing an-efficient-image encryption
IEEEBEBTECHSTUDENTSPROJECTS
 
DOCX
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Designing an-efficient-image encrypt...
IEEEFINALYEARSTUDENTPROJECTS
 
DOCX
IEEE 2014 DOTNET IMAGE PROCESSING PROJECTS Designing an-efficient-image encry...
IEEEBEBTECHSTUDENTPROJECTS
 
DOCX
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Designing an-efficient-image
IEEEBEBTECHSTUDENTSPROJECTS
 
DOCX
designing an efficient image encryption-then-compression system via predictio...
swathi78
 
DOCX
JPM1406 Dual-Geometric Neighbor Embedding for Image Super Resolution With Sp...
chennaijp
 
DOCX
Designing an efficient image encryption then-compression system via predictio...
LeMeniz Infotech
 
DOCX
Image encryption using aes key expansion
Sreeda Perikamana
 
PDF
A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...
International Journal of Technical Research & Application
 
PDF
I1803035762
IOSR Journals
 
PDF
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
PDF
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
IRJET Journal
 
PDF
Psdot 17 new channel selection rule for jpeg steganography
ZTech Proje
 
PDF
Unified Approach With Neural Network for Authentication, Security and Compres...
CSCJournals
 
DOC
Seminar Report on image compression
Pradip Kumar
 
PDF
Secure Image Hiding Algorithm using Cryptography and Steganography
IOSR Journals
 
PPTX
Image Encryption in java ppt.
Pradeep Vishwakarma
 
PDF
A Novel Approach for Compressing Surveillance System Videos
INFOGAIN PUBLICATION
 
PPTX
Reversible data hiding in encrypted images by reserving room before encryption
Papitha Velumani
 
JPM1404 Designing an Efficient Image Encryption-Then-Compression System via...
chennaijp
 
2014 IEEE JAVA IMAGE PROCESSING PROJECT Designing an-efficient-image encryption
IEEEBEBTECHSTUDENTSPROJECTS
 
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Designing an-efficient-image encrypt...
IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 DOTNET IMAGE PROCESSING PROJECTS Designing an-efficient-image encry...
IEEEBEBTECHSTUDENTPROJECTS
 
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Designing an-efficient-image
IEEEBEBTECHSTUDENTSPROJECTS
 
designing an efficient image encryption-then-compression system via predictio...
swathi78
 
JPM1406 Dual-Geometric Neighbor Embedding for Image Super Resolution With Sp...
chennaijp
 
Designing an efficient image encryption then-compression system via predictio...
LeMeniz Infotech
 
Image encryption using aes key expansion
Sreeda Perikamana
 
A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...
International Journal of Technical Research & Application
 
I1803035762
IOSR Journals
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
IRJET Journal
 
Psdot 17 new channel selection rule for jpeg steganography
ZTech Proje
 
Unified Approach With Neural Network for Authentication, Security and Compres...
CSCJournals
 
Seminar Report on image compression
Pradip Kumar
 
Secure Image Hiding Algorithm using Cryptography and Steganography
IOSR Journals
 
Image Encryption in java ppt.
Pradeep Vishwakarma
 
A Novel Approach for Compressing Surveillance System Videos
INFOGAIN PUBLICATION
 
Reversible data hiding in encrypted images by reserving room before encryption
Papitha Velumani
 

More from IEEEBEBTECHSTUDENTPROJECTS (20)

DOCX
IEEE 2014 NS2 NETWORKING PROJECTS Temporal traffic dynamics improve the conn...
IEEEBEBTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 NS2 NETWORKING PROJECTS Proportional fair coding for wireless mesh...
IEEEBEBTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 NS2 NETWORKING PROJECTS Optical networking with variable code-rate...
IEEEBEBTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 NS2 NETWORKING PROJECTS Improving spectrum efficiency via in netwo...
IEEEBEBTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 NS2 NETWORKING PROJECTS Fast regular expression matching using sma...
IEEEBEBTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 NS2 NETWORKING PROJECTS Distributed detection in mobile access wir...
IEEEBEBTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 NS2 NETWORKING PROJECTS Discount counting for fast flow statistics...
IEEEBEBTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 NS2 NETWORKING PROJECTS Cloudy computing leveraging weather foreca...
IEEEBEBTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 NS2 NETWORKING PROJECTS Certificateless remote anonymous authentic...
IEEEBEBTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 NS2 NETWORKING PROJECTS Asymptotic analysis on secrecy capacity in...
IEEEBEBTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 NS2 NETWORKING PROJECTS Algorithms for enhanced inter cell interfe...
IEEEBEBTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 NS2 NETWORKING PROJECTS A hybrid hardware architecture for high sp...
IEEEBEBTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Phase based-binarization-of-ancie...
IEEEBEBTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Fingerprint compression-based-on-...
IEEEBEBTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Digital image-sharing-by-diverse-...
IEEEBEBTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS An efficient-parallel-approach-fo...
IEEEBEBTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Tension in active shapes
IEEEBEBTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Seamless view synthesis through te...
IEEEBEBTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Scale adaptive dictionary learning
IEEEBEBTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Saliency aware video compression
IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 NS2 NETWORKING PROJECTS Temporal traffic dynamics improve the conn...
IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 NS2 NETWORKING PROJECTS Proportional fair coding for wireless mesh...
IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 NS2 NETWORKING PROJECTS Optical networking with variable code-rate...
IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 NS2 NETWORKING PROJECTS Improving spectrum efficiency via in netwo...
IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 NS2 NETWORKING PROJECTS Fast regular expression matching using sma...
IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 NS2 NETWORKING PROJECTS Distributed detection in mobile access wir...
IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 NS2 NETWORKING PROJECTS Discount counting for fast flow statistics...
IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 NS2 NETWORKING PROJECTS Cloudy computing leveraging weather foreca...
IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 NS2 NETWORKING PROJECTS Certificateless remote anonymous authentic...
IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 NS2 NETWORKING PROJECTS Asymptotic analysis on secrecy capacity in...
IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 NS2 NETWORKING PROJECTS Algorithms for enhanced inter cell interfe...
IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 NS2 NETWORKING PROJECTS A hybrid hardware architecture for high sp...
IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Phase based-binarization-of-ancie...
IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Fingerprint compression-based-on-...
IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Digital image-sharing-by-diverse-...
IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS An efficient-parallel-approach-fo...
IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Tension in active shapes
IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Seamless view synthesis through te...
IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Scale adaptive dictionary learning
IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Saliency aware video compression
IEEEBEBTECHSTUDENTPROJECTS
 
Ad

Recently uploaded (20)

PPTX
Stability of IBR Dominated Grids - IEEE PEDG 2025 - short.pptx
ssuser307730
 
PDF
bs-en-12390-3 testing hardened concrete.pdf
ADVANCEDCONSTRUCTION
 
PDF
Module - 4 Machine Learning -22ISE62.pdf
Dr. Shivashankar
 
PDF
Python Mini Project: Command-Line Quiz Game for School/College Students
MPREETHI7
 
PPTX
Precooling and Refrigerated storage.pptx
ThongamSunita
 
PDF
Bayesian Learning - Naive Bayes Algorithm
Sharmila Chidaravalli
 
PDF
LLC CM NCP1399 SIMPLIS MODEL MANUAL.PDF
ssuser1be9ce
 
PPT
دراسة حاله لقرية تقع في جنوب غرب السودان
محمد قصص فتوتة
 
PPTX
Comparison of Flexible and Rigid Pavements in Bangladesh
Arifur Rahman
 
DOCX
Engineering Geology Field Report to Malekhu .docx
justprashant567
 
PDF
FSE-Journal-First-Automated code editing with search-generate-modify.pdf
cl144
 
PPTX
Explore USA’s Best Structural And Non Structural Steel Detailing
Silicon Engineering Consultants LLC
 
PPT
SF 9_Unit 1.ppt software engineering ppt
AmarrKannthh
 
PDF
NFPA 10 - Estandar para extintores de incendios portatiles (ed.22 ENG).pdf
Oscar Orozco
 
PPTX
FSE_LLM4SE1_A Tool for In-depth Analysis of Code Execution Reasoning of Large...
cl144
 
PPTX
Work at Height training for workers .pptx
cecos12
 
PDF
June 2025 - Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
PPTX
Bharatiya Antariksh Hackathon 2025 Idea Submission PPT.pptx
AsadShad4
 
PDF
June 2025 Top 10 Sites -Electrical and Electronics Engineering: An Internatio...
elelijjournal653
 
PPTX
Unit_I Functional Units, Instruction Sets.pptx
logaprakash9
 
Stability of IBR Dominated Grids - IEEE PEDG 2025 - short.pptx
ssuser307730
 
bs-en-12390-3 testing hardened concrete.pdf
ADVANCEDCONSTRUCTION
 
Module - 4 Machine Learning -22ISE62.pdf
Dr. Shivashankar
 
Python Mini Project: Command-Line Quiz Game for School/College Students
MPREETHI7
 
Precooling and Refrigerated storage.pptx
ThongamSunita
 
Bayesian Learning - Naive Bayes Algorithm
Sharmila Chidaravalli
 
LLC CM NCP1399 SIMPLIS MODEL MANUAL.PDF
ssuser1be9ce
 
دراسة حاله لقرية تقع في جنوب غرب السودان
محمد قصص فتوتة
 
Comparison of Flexible and Rigid Pavements in Bangladesh
Arifur Rahman
 
Engineering Geology Field Report to Malekhu .docx
justprashant567
 
FSE-Journal-First-Automated code editing with search-generate-modify.pdf
cl144
 
Explore USA’s Best Structural And Non Structural Steel Detailing
Silicon Engineering Consultants LLC
 
SF 9_Unit 1.ppt software engineering ppt
AmarrKannthh
 
NFPA 10 - Estandar para extintores de incendios portatiles (ed.22 ENG).pdf
Oscar Orozco
 
FSE_LLM4SE1_A Tool for In-depth Analysis of Code Execution Reasoning of Large...
cl144
 
Work at Height training for workers .pptx
cecos12
 
June 2025 - Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
Bharatiya Antariksh Hackathon 2025 Idea Submission PPT.pptx
AsadShad4
 
June 2025 Top 10 Sites -Electrical and Electronics Engineering: An Internatio...
elelijjournal653
 
Unit_I Functional Units, Instruction Sets.pptx
logaprakash9
 
Ad

IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Designing an efficient image encryption then-compression system via prediction error clustering and random permutation

  • 1. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:[email protected] Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation ABSTRACT: In many practical scenarios, image encryption has to be conducted prior to image compression. This has led to the problem of how to design a pair of image encryption and compression algorithms such that compressing the encrypted images can still be efficiently performed. In this paper, we design a highly efficient image encryption-then-compression (ETC) system, where both lossless and lossy compression are considered. The proposed image encryption scheme operated in the prediction error domain is shown to be able to provide a reasonably high level of security. We also demonstrate that an arithmetic coding-based approach can be exploited to efficiently compress the encrypted images. More notably, the proposed compression approach applied to encrypted images is only slightly worse, in terms of compression efficiency, than the state-of-the-art lossless/lossy
  • 2. image coders, which take original, unencrypted images as inputs. In contrast, most of the existing ETC solutions induce significant penalty on the compression efficiency. EXISTING SYSTEM: Compression-then-Encryption (CTE) paradigm meets the requirements in many secure transmission scenarios, the order of applying the compression and encryption needs to be reversed in some other situations. As the content owner, Alice is always interested in protecting the privacy of the image data through encryption. Nevertheless, Alice has no incentive to compress her data, and hence, will not use her limited computational resources to run a compression algorithm before encrypting the data. This is especially true when Alice uses a resource-deprived mobile device. In contrast, the channel provider Charlie has an overriding interest in compressing all the network traffic so as to maximize the network utilization. It is therefore much desired if the compression task can be delegated by Charlie, who typically has abundant computational resources. DISADVANTAGES OF EXISTING SYSTEM:  the existing ETC systems still fall significantly short in the compression performance, compared with the state-of-the-art lossless/lossy image and video coders that require unencrypted inputs. The primary focus of this work is on the practical design of a pair of image encryption and compression schemes, in such a way that compressing the encrypted images is almost equally efficient as compressing their original, unencrypted counterparts.
  • 3. PROPOSED SYSTEM: To achieve higher compression ratios, lossy compression of encrypted data was also studied . Zhang et. Al proposed a scalable lossy coding framework of encrypted images via a multi-resolution construction. In a compressive sensing (CS) mechanism was utilized to compress encrypted images resulted from linear encryption. A modified basis pursuit algorithm can then be applied to estimate the original image from the compressed and encrypted data. Another CS-based approach for encrypting compressed images was reported. Furthermore, Zhang designed an image encryption scheme via pixel-domain permutation, and demonstrated that the encrypted file can be efficiently compressed by discarding the excessively rough and fine information of coefficients in the transform domain. Recently, Zhang et. al suggested a new compression approach for encrypted images through multi-layer decomposition. Extensions to blind compression of encrypted videos were developed ADVANTAGES OF PROPOSED SYSTEM:  Highly efficient compression of the encrypted data has then been realized by a context-adaptive arithmetic coding approach.  Within the proposed framework, the image encryption has been achieved via prediction error clustering and random permutation.
  • 4. SYSTEM ARCHITECTURE: SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : MATLAB  Tool : MATLAB R 2007B
  • 5. REFERENCE: Jiantao Zhou, Member, IEEE, Xianming Liu, Member, IEEE, Oscar C. Au, Fellow, IEEE, and Yuan Yan Tang, Fellow, IEEE ,“Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation”, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 1, JANUARY 2014.