SlideShare a Scribd company logo
Designing an Efficient Image Encryption-Then-Compression System via Prediction Error 
Clustering and Random Perm 
Designing an Efficient Image Encryption-Then-Compression System via 
Prediction Error Clustering and Random Perm 
Contact: 9703109334, 9533694296 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in 
ABSTRACT 
In many practical scenarios, image encryption has to be conducted prior to image compression. 
This has led to the problem of how to design a pair of image encryption and compression 
algorithms such that compressing the encrypted images can still be efficiently performed. In this 
paper, we design a highly efficient image encryption-then-compression (ETC) system, where 
both lossless and lossy compressions are considered. The proposed image encryption scheme 
operated in the prediction error domain is shown to be able to provide a reasonably high level of 
security. We also demonstrate that an arithmetic coding-based approach can be exploited to 
efficiently compress the encrypted images. More notably, the proposed compression approach 
applied to encrypted images is only slightly worse, in terms of compression efficiency, than the 
state-of-the-art lossless/lossy image coders, which take original, unencrypted images as inputs. In 
contrast, most of the existing ETC solutions induce significant penalty on the compression 
efficiency. 
EXISTING SYSTEM: 
 Existing ETC solutions induce significant penalty on the compression efficiency. 
DISADVANTAGES OF EXISTING SYSTEM: 
 More Prediction error. 
 Lossy Image Compression. 
PROPOSED SYSTEM: 
 In this paper, we design a highly efficient image encryption-then-compression (ETC) 
system, where both lossless and lossy compression are considered. 
 The proposed image encryption scheme operated in the predic tion error domain is shown 
to be able to provide a reasonably high level of security.
Designing an Efficient Image Encryption-Then-Compression System via Prediction Error 
Clustering and Random Perm 
 We also demonstrate that an arithmetic coding-based approach can be exploited to 
efficiently compress the encrypted images. 
ADVANTAGES OF PROPOSED SYSTEM: 
 The ability of controlling the lowest achievable rate by the content owner may be treated 
as an advantageous feature of the proposed ETC scheme, since the quality of the decoded 
image at receiver side is guaranteed, though the manipulation of the encrypted data is 
completely handled by an untrusted party. 
 Attack model applicable to our proposed encryption scheme is the ciphertext-only attack 
in which the attacker can only access the ciphertext and attempts to recover the original 
image. 
 Our proposed compression method on encrypted images is very close to that of the state-of- 
the-art lossless/lossy image codecs, which receive original, unencrypted images as 
Contact: 9703109334, 9533694296 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in 
inputs 
SYSTEM ARCHITECTURE: 
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz.
Designing an Efficient Image Encryption-Then-Compression System via Prediction Error 
Clustering and Random Perm 
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb. 
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7. 
 Coding Language : ASP.net, C#.net 
 Tool : Visual Studio 2010 
 Database : SQL SERVER 2008 
Jiantao Zhou,Xianming Liu, Oscar C. Au, and Yuan Yan Tang, “Designing an Efficient Image 
Encryption-Then-Compression System via Prediction Error Clustering and Random 
Permutation”, VOL. 9, NO. 1, JANUARY 2014. 
Contact: 9703109334, 9533694296 
REFERENCE: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in

More Related Content

What's hot (20)

DOCX
Lossless and reversible data hiding in encrypted images with public key crypt...
LogicMindtech Nologies
 
DOCX
Image encryption using aes key expansion
Sreeda Perikamana
 
PPTX
Learnable Image Encryption
Masayuki Tanaka
 
PDF
Secured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
CSCJournals
 
PPTX
Image Security
Satyendra Rajput
 
PDF
Image Cryptography using Nearest Prime Pixels
muhammed jassim k
 
PDF
Image encryption
rakshit2105
 
DOCX
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Designing an efficient image encr...
IEEEBEBTECHSTUDENTPROJECTS
 
PDF
separable reversible data hiding in encrypted image
ZTech Proje
 
PDF
IJAER Publishes
AmAl C
 
PDF
Fx3610771081
IJERA Editor
 
PDF
Secure image encryption using aes
eSAT Publishing House
 
PDF
Nesting of five modulus method with improved lsb subtitution to hide an image...
eSAT Publishing House
 
PDF
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
IOSR Journals
 
PDF
Keyless approach of separable hiding data into encrypted image
prjpublications
 
PPTX
steganography using genetic algorithm along with visual cryptography for wire...
Aparna Nk
 
PDF
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
IJNSA Journal
 
PDF
Image Encryption-Then-Compression System via Prediction Error Clustering and ...
AM Publications,India
 
PPTX
Visual cryptography
Shahid Zargar
 
PPTX
Visual cryptography for hybrid approach
Suprajareddy Allu
 
Lossless and reversible data hiding in encrypted images with public key crypt...
LogicMindtech Nologies
 
Image encryption using aes key expansion
Sreeda Perikamana
 
Learnable Image Encryption
Masayuki Tanaka
 
Secured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
CSCJournals
 
Image Security
Satyendra Rajput
 
Image Cryptography using Nearest Prime Pixels
muhammed jassim k
 
Image encryption
rakshit2105
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Designing an efficient image encr...
IEEEBEBTECHSTUDENTPROJECTS
 
separable reversible data hiding in encrypted image
ZTech Proje
 
IJAER Publishes
AmAl C
 
Fx3610771081
IJERA Editor
 
Secure image encryption using aes
eSAT Publishing House
 
Nesting of five modulus method with improved lsb subtitution to hide an image...
eSAT Publishing House
 
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
IOSR Journals
 
Keyless approach of separable hiding data into encrypted image
prjpublications
 
steganography using genetic algorithm along with visual cryptography for wire...
Aparna Nk
 
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
IJNSA Journal
 
Image Encryption-Then-Compression System via Prediction Error Clustering and ...
AM Publications,India
 
Visual cryptography
Shahid Zargar
 
Visual cryptography for hybrid approach
Suprajareddy Allu
 

Similar to designing an efficient image encryption-then-compression system via prediction error clustering and random perm (20)

DOCX
IEEE 2014 DOTNET IMAGE PROCESSING PROJECTS Designing an-efficient-image encry...
IEEEBEBTECHSTUDENTPROJECTS
 
DOCX
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Designing an-efficient-image
IEEEBEBTECHSTUDENTSPROJECTS
 
DOCX
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Designing an-efficient-image encrypt...
IEEEFINALYEARSTUDENTPROJECTS
 
DOCX
2014 IEEE JAVA IMAGE PROCESSING PROJECT Designing an-efficient-image encryption
IEEEBEBTECHSTUDENTSPROJECTS
 
DOCX
JPM1406 Dual-Geometric Neighbor Embedding for Image Super Resolution With Sp...
chennaijp
 
PPT
Presentation_Format (1).ppt
PavanNagre6
 
PDF
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
ijcisjournal
 
PDF
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
ijcisjournal
 
PDF
Psdot 17 new channel selection rule for jpeg steganography
ZTech Proje
 
PDF
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
sipij
 
PDF
Color image encryption based on chaotic shit keying with lossless compression
IJECEIAES
 
PDF
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
CSCJournals
 
PDF
I1803035762
IOSR Journals
 
PDF
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
IJNSA Journal
 
PDF
Highly secure scalable compression of encrypted images
eSAT Journals
 
PDF
IRJET- Image Encryption based on Non-Subsampled Contourlet Transform with Dif...
IRJET Journal
 
PDF
Unified Approach With Neural Network for Authentication, Security and Compres...
CSCJournals
 
PDF
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
CSCJournals
 
PDF
IRJET- LS Chaotic based Image Encryption System Via Permutation Models
IRJET Journal
 
PDF
37de29c2ae88c046317fcfbebd7a66784874
hemant gupta
 
IEEE 2014 DOTNET IMAGE PROCESSING PROJECTS Designing an-efficient-image encry...
IEEEBEBTECHSTUDENTPROJECTS
 
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Designing an-efficient-image
IEEEBEBTECHSTUDENTSPROJECTS
 
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Designing an-efficient-image encrypt...
IEEEFINALYEARSTUDENTPROJECTS
 
2014 IEEE JAVA IMAGE PROCESSING PROJECT Designing an-efficient-image encryption
IEEEBEBTECHSTUDENTSPROJECTS
 
JPM1406 Dual-Geometric Neighbor Embedding for Image Super Resolution With Sp...
chennaijp
 
Presentation_Format (1).ppt
PavanNagre6
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
ijcisjournal
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
ijcisjournal
 
Psdot 17 new channel selection rule for jpeg steganography
ZTech Proje
 
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
sipij
 
Color image encryption based on chaotic shit keying with lossless compression
IJECEIAES
 
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
CSCJournals
 
I1803035762
IOSR Journals
 
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
IJNSA Journal
 
Highly secure scalable compression of encrypted images
eSAT Journals
 
IRJET- Image Encryption based on Non-Subsampled Contourlet Transform with Dif...
IRJET Journal
 
Unified Approach With Neural Network for Authentication, Security and Compres...
CSCJournals
 
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
CSCJournals
 
IRJET- LS Chaotic based Image Encryption System Via Permutation Models
IRJET Journal
 
37de29c2ae88c046317fcfbebd7a66784874
hemant gupta
 
Ad

More from swathi78 (20)

DOC
secure mining of association rules in horizontally distributed databases
swathi78
 
DOCX
a system for denial-of-service attack detection based on multivariate correla...
swathi78
 
DOCX
web service recommendation via exploiting location and qo s information
swathi78
 
DOCX
privacy-enhanced web service composition
swathi78
 
DOCX
optimal distributed malware defense in mobile networks with heterogeneous dev...
swathi78
 
DOCX
friend book a semantic-based friend recommendation system for social networks
swathi78
 
DOCX
efficient authentication for mobile and pervasive computing
swathi78
 
DOCX
cooperative caching for efficient data access in disruption tolerant networks
swathi78
 
DOCX
an incentive framework for cellular traffic offloading
swathi78
 
DOCX
secure outsourced attribute-based signatures
swathi78
 
DOCX
traffic pattern-based content leakage detection for trusted content delivery ...
swathi78
 
DOCX
the design and evaluation of an information sharing system for human networks
swathi78
 
DOCX
the client assignment problem for continuous distributed interactive applicat...
swathi78
 
DOCX
sos a distributed mobile q&a system based on social networks
swathi78
 
DOCX
securing broker-less publish subscribe systems using identity-based encryption
swathi78
 
DOCX
rre a game-theoretic intrusion response and recovery engine
swathi78
 
DOCX
on false data-injection attacks against power system state estimation modelin...
swathi78
 
DOCX
loca ward a security and privacy aware location-based rewarding system
swathi78
 
DOCX
exploiting service similarity for privacy in location-based search queries
swathi78
 
DOCX
enabling trustworthy service evaluation in service-oriented mobile social net...
swathi78
 
secure mining of association rules in horizontally distributed databases
swathi78
 
a system for denial-of-service attack detection based on multivariate correla...
swathi78
 
web service recommendation via exploiting location and qo s information
swathi78
 
privacy-enhanced web service composition
swathi78
 
optimal distributed malware defense in mobile networks with heterogeneous dev...
swathi78
 
friend book a semantic-based friend recommendation system for social networks
swathi78
 
efficient authentication for mobile and pervasive computing
swathi78
 
cooperative caching for efficient data access in disruption tolerant networks
swathi78
 
an incentive framework for cellular traffic offloading
swathi78
 
secure outsourced attribute-based signatures
swathi78
 
traffic pattern-based content leakage detection for trusted content delivery ...
swathi78
 
the design and evaluation of an information sharing system for human networks
swathi78
 
the client assignment problem for continuous distributed interactive applicat...
swathi78
 
sos a distributed mobile q&a system based on social networks
swathi78
 
securing broker-less publish subscribe systems using identity-based encryption
swathi78
 
rre a game-theoretic intrusion response and recovery engine
swathi78
 
on false data-injection attacks against power system state estimation modelin...
swathi78
 
loca ward a security and privacy aware location-based rewarding system
swathi78
 
exploiting service similarity for privacy in location-based search queries
swathi78
 
enabling trustworthy service evaluation in service-oriented mobile social net...
swathi78
 
Ad

Recently uploaded (20)

PPTX
Introduction to File Transfer Protocol with commands in FTP
BeulahS2
 
PDF
Designing for Tomorrow – Architecture’s Role in the Sustainability Movement
BIM Services
 
PDF
Rapid Prototyping for XR: Lecture 1 Introduction to Prototyping
Mark Billinghurst
 
PDF
Rapid Prototyping for XR: Lecture 5 - Cross Platform Development
Mark Billinghurst
 
PDF
輪読会資料_Miipher and Miipher2 .
NABLAS株式会社
 
PDF
تقرير عن التحليل الديناميكي لتدفق الهواء حول جناح.pdf
محمد قصص فتوتة
 
PPTX
How to Un-Obsolete Your Legacy Keypad Design
Epec Engineered Technologies
 
PDF
June 2025 Top 10 Sites -Electrical and Electronics Engineering: An Internatio...
elelijjournal653
 
PPT
FINAL plumbing code for board exam passer
MattKristopherDiaz
 
PDF
Python Mini Project: Command-Line Quiz Game for School/College Students
MPREETHI7
 
PDF
Rapid Prototyping for XR: Lecture 6 - AI for Prototyping and Research Directi...
Mark Billinghurst
 
PPTX
Bharatiya Antariksh Hackathon 2025 Idea Submission PPT.pptx
AsadShad4
 
PPTX
Functions in Python Programming Language
BeulahS2
 
PDF
lesson4-occupationalsafetyandhealthohsstandards-240812020130-1a7246d0.pdf
arvingallosa3
 
PPTX
Comparison of Flexible and Rigid Pavements in Bangladesh
Arifur Rahman
 
PPTX
CST413 KTU S7 CSE Machine Learning Clustering K Means Hierarchical Agglomerat...
resming1
 
PPTX
Bitumen Emulsion by Dr Sangita Ex CRRI Delhi
grilcodes
 
PDF
CLIP_Internals_and_Architecture.pdf sdvsdv sdv
JoseLuisCahuanaRamos3
 
PDF
13th International Conference of Security, Privacy and Trust Management (SPTM...
ijcisjournal
 
PPTX
Introduction to Python Programming Language
merlinjohnsy
 
Introduction to File Transfer Protocol with commands in FTP
BeulahS2
 
Designing for Tomorrow – Architecture’s Role in the Sustainability Movement
BIM Services
 
Rapid Prototyping for XR: Lecture 1 Introduction to Prototyping
Mark Billinghurst
 
Rapid Prototyping for XR: Lecture 5 - Cross Platform Development
Mark Billinghurst
 
輪読会資料_Miipher and Miipher2 .
NABLAS株式会社
 
تقرير عن التحليل الديناميكي لتدفق الهواء حول جناح.pdf
محمد قصص فتوتة
 
How to Un-Obsolete Your Legacy Keypad Design
Epec Engineered Technologies
 
June 2025 Top 10 Sites -Electrical and Electronics Engineering: An Internatio...
elelijjournal653
 
FINAL plumbing code for board exam passer
MattKristopherDiaz
 
Python Mini Project: Command-Line Quiz Game for School/College Students
MPREETHI7
 
Rapid Prototyping for XR: Lecture 6 - AI for Prototyping and Research Directi...
Mark Billinghurst
 
Bharatiya Antariksh Hackathon 2025 Idea Submission PPT.pptx
AsadShad4
 
Functions in Python Programming Language
BeulahS2
 
lesson4-occupationalsafetyandhealthohsstandards-240812020130-1a7246d0.pdf
arvingallosa3
 
Comparison of Flexible and Rigid Pavements in Bangladesh
Arifur Rahman
 
CST413 KTU S7 CSE Machine Learning Clustering K Means Hierarchical Agglomerat...
resming1
 
Bitumen Emulsion by Dr Sangita Ex CRRI Delhi
grilcodes
 
CLIP_Internals_and_Architecture.pdf sdvsdv sdv
JoseLuisCahuanaRamos3
 
13th International Conference of Security, Privacy and Trust Management (SPTM...
ijcisjournal
 
Introduction to Python Programming Language
merlinjohnsy
 

designing an efficient image encryption-then-compression system via prediction error clustering and random perm

  • 1. Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Perm Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Perm Contact: 9703109334, 9533694296 Email id: [email protected], www.logicsystems.org.in ABSTRACT In many practical scenarios, image encryption has to be conducted prior to image compression. This has led to the problem of how to design a pair of image encryption and compression algorithms such that compressing the encrypted images can still be efficiently performed. In this paper, we design a highly efficient image encryption-then-compression (ETC) system, where both lossless and lossy compressions are considered. The proposed image encryption scheme operated in the prediction error domain is shown to be able to provide a reasonably high level of security. We also demonstrate that an arithmetic coding-based approach can be exploited to efficiently compress the encrypted images. More notably, the proposed compression approach applied to encrypted images is only slightly worse, in terms of compression efficiency, than the state-of-the-art lossless/lossy image coders, which take original, unencrypted images as inputs. In contrast, most of the existing ETC solutions induce significant penalty on the compression efficiency. EXISTING SYSTEM:  Existing ETC solutions induce significant penalty on the compression efficiency. DISADVANTAGES OF EXISTING SYSTEM:  More Prediction error.  Lossy Image Compression. PROPOSED SYSTEM:  In this paper, we design a highly efficient image encryption-then-compression (ETC) system, where both lossless and lossy compression are considered.  The proposed image encryption scheme operated in the predic tion error domain is shown to be able to provide a reasonably high level of security.
  • 2. Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Perm  We also demonstrate that an arithmetic coding-based approach can be exploited to efficiently compress the encrypted images. ADVANTAGES OF PROPOSED SYSTEM:  The ability of controlling the lowest achievable rate by the content owner may be treated as an advantageous feature of the proposed ETC scheme, since the quality of the decoded image at receiver side is guaranteed, though the manipulation of the encrypted data is completely handled by an untrusted party.  Attack model applicable to our proposed encryption scheme is the ciphertext-only attack in which the attacker can only access the ciphertext and attempts to recover the original image.  Our proposed compression method on encrypted images is very close to that of the state-of- the-art lossless/lossy image codecs, which receive original, unencrypted images as Contact: 9703109334, 9533694296 Email id: [email protected], www.logicsystems.org.in inputs SYSTEM ARCHITECTURE: SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.
  • 3. Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Perm  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : ASP.net, C#.net  Tool : Visual Studio 2010  Database : SQL SERVER 2008 Jiantao Zhou,Xianming Liu, Oscar C. Au, and Yuan Yan Tang, “Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation”, VOL. 9, NO. 1, JANUARY 2014. Contact: 9703109334, 9533694296 REFERENCE: Email id: [email protected], www.logicsystems.org.in