SlideShare a Scribd company logo
GLOBALSOFT TECHNOLOGIES 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com 
Designing an Efficient Image Encryption-Then Compression 
System via Prediction Error Clustering and Random 
Permutation 
ABSTRACT: 
In many practical scenarios, image encryption has to be conducted prior to image 
compression. This has led to the problem of how to design a pair of image 
encryption and compression algorithms such that compressing the encrypted 
images can still be efficiently performed. In this paper, we design a highly efficient 
image encryption-then-compression (ETC) system, where both lossless and lossy 
compressions are considered. The proposed image encryption scheme operated in 
the prediction error domain is shown to be able to provide a reasonably high level 
of security. We also demonstrate that an arithmetic coding-based approach can be 
exploited to efficiently compress the encrypted images. More notably, the 
proposed compression approach applied to encrypted images is only slightly 
worse, in terms of compression efficiency, than the state-of-the-art lossless/lossy 
image coders, which take original, unencrypted images as inputs. In contrast, most 
of the existing ETC solutions induce significant penalty on the compression 
efficiency.
EXISTING SYSTEM: 
 Existing ETC solutions induce significant penalty on the compression 
efficiency. 
DISADVANTAGES OF EXISTING SYSTEM: 
 More Prediction error. 
 Lossy Image Compression. 
PROPOSED SYSTEM: 
 In this paper, we design a highly efficient image encryption-then-compression 
(ETC) system, where both lossless and lossy compression are 
considered. 
 The proposed image encryption scheme operated in the predic tion error 
domain is shown to be able to provide a reasonably high level of security. 
 We also demonstrate that an arithmetic coding-based approach can be 
exploited to efficiently compress the encrypted images. 
ADVANTAGES OF PROPOSED SYSTEM: 
 The ability of controlling the lowest achievable rate by the content owner 
may be treated as an advantageous feature of the proposed ETC scheme, 
since the quality of the decoded image at receiver side is guaranteed, though
the manipulation of the encrypted data is completely handled by an untrusted 
party. 
 Attack model applicable to our proposed encryption scheme is the 
ciphertext-only attack in which the attacker can only access the ciphertext 
and attempts to recover the original image. 
 Our proposed compression method on encrypted images is very close to that 
of the state- of-the-art lossless/lossy image codecs, which receive original, 
unencrypted images as inputs 
SYSTEM ARCHITECTURE: 
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS:
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb. 
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7. 
 Coding Language : ASP.net, C#.net 
 Tool : Visual Studio 2010 
 Database : SQL SERVER 2008 
REFERENCE: 
Jiantao Zhou,Xianming Liu, Oscar C. Au, and Yuan Yan Tang, “Designing an 
Efficient Image Encryption-Then-Compression System via Prediction Error 
Clustering and Random Permutation”, VOL. 9, NO. 1, JANUARY 2014.

More Related Content

Similar to IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Designing an-efficient-image encryption then compression system via prediction error clustering and random permutation (20)

DOCX
JPM1404 Designing an Efficient Image Encryption-Then-Compression System via...
chennaijp
 
PDF
Image Encryption-Then-Compression System via Prediction Error Clustering and ...
AM Publications,India
 
PPT
Presentation_Format (1).ppt
PavanNagre6
 
PDF
Color image encryption based on chaotic shit keying with lossless compression
IJECEIAES
 
DOCX
JPM1406 Dual-Geometric Neighbor Embedding for Image Super Resolution With Sp...
chennaijp
 
DOCX
Image encryption using aes key expansion
Sreeda Perikamana
 
PDF
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
ijcisjournal
 
PDF
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
ijcisjournal
 
PDF
An efficient and highly secure technique to encrypt
ZiadAlqady
 
PDF
An efficient and highly secure technique to encrypt
ZiadAlqady
 
PDF
An efficient and highly secure technique to encrypt
ZiadAlqady
 
PDF
An efficient and highly secure technique to encrypt
ZiadAlqady
 
PDF
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
sipij
 
PPTX
research review committe review paper for discussion
deanacademics47
 
PPTX
research review committee review status new
deanacademics47
 
PDF
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET Journal
 
PDF
Highly secure scalable compression of encrypted images
eSAT Journals
 
PPTX
Biometric Hashing technique for Authentication
AnIsh Kumar
 
PDF
Secure Grayscale Image Encryption Using Symmetric Block Cipher with Enhanced ...
IRJET Journal
 
DOCX
Improvement of image transmission using chaotic system and elliptic curve cry...
alljobsssinfotech
 
JPM1404 Designing an Efficient Image Encryption-Then-Compression System via...
chennaijp
 
Image Encryption-Then-Compression System via Prediction Error Clustering and ...
AM Publications,India
 
Presentation_Format (1).ppt
PavanNagre6
 
Color image encryption based on chaotic shit keying with lossless compression
IJECEIAES
 
JPM1406 Dual-Geometric Neighbor Embedding for Image Super Resolution With Sp...
chennaijp
 
Image encryption using aes key expansion
Sreeda Perikamana
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
ijcisjournal
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
ijcisjournal
 
An efficient and highly secure technique to encrypt
ZiadAlqady
 
An efficient and highly secure technique to encrypt
ZiadAlqady
 
An efficient and highly secure technique to encrypt
ZiadAlqady
 
An efficient and highly secure technique to encrypt
ZiadAlqady
 
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
sipij
 
research review committe review paper for discussion
deanacademics47
 
research review committee review status new
deanacademics47
 
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET Journal
 
Highly secure scalable compression of encrypted images
eSAT Journals
 
Biometric Hashing technique for Authentication
AnIsh Kumar
 
Secure Grayscale Image Encryption Using Symmetric Block Cipher with Enhanced ...
IRJET Journal
 
Improvement of image transmission using chaotic system and elliptic curve cry...
alljobsssinfotech
 

More from IEEEFINALYEARSTUDENTPROJECTS (20)

DOCX
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
IEEEFINALYEARSTUDENTPROJECTS
 
DOCX
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Building a scalable system for steal...
IEEEFINALYEARSTUDENTPROJECTS
 
DOCX
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Token mac a fair mac protocol for pa...
IEEEFINALYEARSTUDENTPROJECTS
 
DOCX
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Tag sense leveraging smartphones for...
IEEEFINALYEARSTUDENTPROJECTS
 
DOC
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Privacy preserving optimal meeting l...
IEEEFINALYEARSTUDENTPROJECTS
 
DOCX
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Preserving location privacy in geo s...
IEEEFINALYEARSTUDENTPROJECTS
 
DOCX
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Friendbook a semantic based friend r...
IEEEFINALYEARSTUDENTPROJECTS
 
DOCX
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Efficient and privacy aware data agg...
IEEEFINALYEARSTUDENTPROJECTS
 
DOCX
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
IEEEFINALYEARSTUDENTPROJECTS
 
DOCX
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS A low complexity algorithm for neigh...
IEEEFINALYEARSTUDENTPROJECTS
 
DOCX
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Hierarchical prediction and context ...
IEEEFINALYEARSTUDENTPROJECTS
 
DOCX
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Click prediction-for-web-image-reran...
IEEEFINALYEARSTUDENTPROJECTS
 
DOCX
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Web service recommendation via expl...
IEEEFINALYEARSTUDENTPROJECTS
 
DOCX
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Scalable and accurate prediction of...
IEEEFINALYEARSTUDENTPROJECTS
 
DOCX
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Privacy enhanced web service compos...
IEEEFINALYEARSTUDENTPROJECTS
 
DOCX
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Decentralized enactment of bpel pro...
IEEEFINALYEARSTUDENTPROJECTS
 
DOCX
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS A novel time obfuscated algorithm ...
IEEEFINALYEARSTUDENTPROJECTS
 
DOCX
IEEE 2014 JAVA SOFTWARE ENGINEER PROJECTS Conservation of information softwar...
IEEEFINALYEARSTUDENTPROJECTS
 
DOC
IEEE 2014 JAVA DATA MINING PROJECTS Xs path navigation on xml schemas made easy
IEEEFINALYEARSTUDENTPROJECTS
 
DOCX
IEEE 2014 JAVA DATA MINING PROJECTS Web image re ranking using query-specific...
IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Building a scalable system for steal...
IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Token mac a fair mac protocol for pa...
IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Tag sense leveraging smartphones for...
IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Privacy preserving optimal meeting l...
IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Preserving location privacy in geo s...
IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Friendbook a semantic based friend r...
IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Efficient and privacy aware data agg...
IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS A low complexity algorithm for neigh...
IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Hierarchical prediction and context ...
IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Click prediction-for-web-image-reran...
IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Web service recommendation via expl...
IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Scalable and accurate prediction of...
IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Privacy enhanced web service compos...
IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Decentralized enactment of bpel pro...
IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS A novel time obfuscated algorithm ...
IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA SOFTWARE ENGINEER PROJECTS Conservation of information softwar...
IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA DATA MINING PROJECTS Xs path navigation on xml schemas made easy
IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA DATA MINING PROJECTS Web image re ranking using query-specific...
IEEEFINALYEARSTUDENTPROJECTS
 
Ad

Recently uploaded (20)

PDF
Rapid Prototyping for XR: Lecture 1 Introduction to Prototyping
Mark Billinghurst
 
PPTX
Precooling and Refrigerated storage.pptx
ThongamSunita
 
PDF
Rapid Prototyping for XR: Lecture 6 - AI for Prototyping and Research Directi...
Mark Billinghurst
 
PPSX
OOPS Concepts in Python and Exception Handling
Dr. A. B. Shinde
 
PDF
01-introduction to the ProcessDesign.pdf
StiveBrack
 
PPTX
Mobile database systems 20254545645.pptx
herosh1968
 
PDF
Plant Control_EST_85520-01_en_AllChanges_20220127.pdf
DarshanaChathuranga4
 
PPTX
CST413 KTU S7 CSE Machine Learning Clustering K Means Hierarchical Agglomerat...
resming1
 
PPTX
Bitumen Emulsion by Dr Sangita Ex CRRI Delhi
grilcodes
 
PDF
Rapid Prototyping for XR: Lecture 5 - Cross Platform Development
Mark Billinghurst
 
PPTX
Computer network Computer network Computer network Computer network
Shrikant317689
 
PDF
13th International Conference of Security, Privacy and Trust Management (SPTM...
ijcisjournal
 
PDF
How to Buy Verified CashApp Accounts IN 2025
Buy Verified CashApp Accounts
 
PDF
Python Mini Project: Command-Line Quiz Game for School/College Students
MPREETHI7
 
PPTX
Bharatiya Antariksh Hackathon 2025 Idea Submission PPT.pptx
AsadShad4
 
PPTX
Functions in Python Programming Language
BeulahS2
 
PPTX
FSE_LLM4SE1_A Tool for In-depth Analysis of Code Execution Reasoning of Large...
cl144
 
PPTX
Tesla-Stock-Analysis-and-Forecast.pptx (1).pptx
moonsony54
 
PDF
Rapid Prototyping for XR: Lecture 4 - High Level Prototyping.
Mark Billinghurst
 
PDF
Decision support system in machine learning models for a face recognition-bas...
TELKOMNIKA JOURNAL
 
Rapid Prototyping for XR: Lecture 1 Introduction to Prototyping
Mark Billinghurst
 
Precooling and Refrigerated storage.pptx
ThongamSunita
 
Rapid Prototyping for XR: Lecture 6 - AI for Prototyping and Research Directi...
Mark Billinghurst
 
OOPS Concepts in Python and Exception Handling
Dr. A. B. Shinde
 
01-introduction to the ProcessDesign.pdf
StiveBrack
 
Mobile database systems 20254545645.pptx
herosh1968
 
Plant Control_EST_85520-01_en_AllChanges_20220127.pdf
DarshanaChathuranga4
 
CST413 KTU S7 CSE Machine Learning Clustering K Means Hierarchical Agglomerat...
resming1
 
Bitumen Emulsion by Dr Sangita Ex CRRI Delhi
grilcodes
 
Rapid Prototyping for XR: Lecture 5 - Cross Platform Development
Mark Billinghurst
 
Computer network Computer network Computer network Computer network
Shrikant317689
 
13th International Conference of Security, Privacy and Trust Management (SPTM...
ijcisjournal
 
How to Buy Verified CashApp Accounts IN 2025
Buy Verified CashApp Accounts
 
Python Mini Project: Command-Line Quiz Game for School/College Students
MPREETHI7
 
Bharatiya Antariksh Hackathon 2025 Idea Submission PPT.pptx
AsadShad4
 
Functions in Python Programming Language
BeulahS2
 
FSE_LLM4SE1_A Tool for In-depth Analysis of Code Execution Reasoning of Large...
cl144
 
Tesla-Stock-Analysis-and-Forecast.pptx (1).pptx
moonsony54
 
Rapid Prototyping for XR: Lecture 4 - High Level Prototyping.
Mark Billinghurst
 
Decision support system in machine learning models for a face recognition-bas...
TELKOMNIKA JOURNAL
 
Ad

IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Designing an-efficient-image encryption then compression system via prediction error clustering and random permutation

  • 1. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:[email protected] Designing an Efficient Image Encryption-Then Compression System via Prediction Error Clustering and Random Permutation ABSTRACT: In many practical scenarios, image encryption has to be conducted prior to image compression. This has led to the problem of how to design a pair of image encryption and compression algorithms such that compressing the encrypted images can still be efficiently performed. In this paper, we design a highly efficient image encryption-then-compression (ETC) system, where both lossless and lossy compressions are considered. The proposed image encryption scheme operated in the prediction error domain is shown to be able to provide a reasonably high level of security. We also demonstrate that an arithmetic coding-based approach can be exploited to efficiently compress the encrypted images. More notably, the proposed compression approach applied to encrypted images is only slightly worse, in terms of compression efficiency, than the state-of-the-art lossless/lossy image coders, which take original, unencrypted images as inputs. In contrast, most of the existing ETC solutions induce significant penalty on the compression efficiency.
  • 2. EXISTING SYSTEM:  Existing ETC solutions induce significant penalty on the compression efficiency. DISADVANTAGES OF EXISTING SYSTEM:  More Prediction error.  Lossy Image Compression. PROPOSED SYSTEM:  In this paper, we design a highly efficient image encryption-then-compression (ETC) system, where both lossless and lossy compression are considered.  The proposed image encryption scheme operated in the predic tion error domain is shown to be able to provide a reasonably high level of security.  We also demonstrate that an arithmetic coding-based approach can be exploited to efficiently compress the encrypted images. ADVANTAGES OF PROPOSED SYSTEM:  The ability of controlling the lowest achievable rate by the content owner may be treated as an advantageous feature of the proposed ETC scheme, since the quality of the decoded image at receiver side is guaranteed, though
  • 3. the manipulation of the encrypted data is completely handled by an untrusted party.  Attack model applicable to our proposed encryption scheme is the ciphertext-only attack in which the attacker can only access the ciphertext and attempts to recover the original image.  Our proposed compression method on encrypted images is very close to that of the state- of-the-art lossless/lossy image codecs, which receive original, unencrypted images as inputs SYSTEM ARCHITECTURE: SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:
  • 4.  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : ASP.net, C#.net  Tool : Visual Studio 2010  Database : SQL SERVER 2008 REFERENCE: Jiantao Zhou,Xianming Liu, Oscar C. Au, and Yuan Yan Tang, “Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation”, VOL. 9, NO. 1, JANUARY 2014.