SlideShare a Scribd company logo
GLOBALSOFT TECHNOLOGIES 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmai l.com 
Designing an Efficient Image Encryption-Then Compression 
System via Prediction Error Clustering and Random 
Permutation 
ABSTRACT: 
In many practical scenarios, image encryption has to be conducted prior to image 
compression. This has led to the problem of how to design a pair of image 
encryption and compression algorithms such that compressing the encrypted 
images can still be efficiently performed. In this paper, we design a highly efficient 
image encryption-then-compression (ETC) system, where both lossless and lossy 
compressions are considered. The proposed image encryption scheme operated in 
the prediction error domain is shown to be able to provide a reasonably high level 
of security. We also demonstrate that an arithmetic coding-based approach can be 
exploited to efficiently compress the encrypted images. More notably, the 
proposed compression approach applied to encrypted images is only slightly 
worse, in terms of compression efficiency, than the state-of-the-art lossless/lossy
image coders, which take original, unencrypted images as inputs. In contrast, most 
of the existing ETC solutions induce significant penalty on the compress ion 
efficiency. 
EXISTING SYSTEM: 
 Existing ETC solutions induce significant penalty on the compression 
efficiency. 
DISADVANTAGES OF EXISTING SYSTEM: 
 More Prediction error. 
 Lossy Image Compression. 
PROPOSED SYSTEM: 
 In this paper, we design a highly efficient image encryption-then-compression 
(ETC) system, where both lossless and lossy compression are 
considered. 
 The proposed image encryption scheme operated in the predic tion error 
domain is shown to be able to provide a reasonably high level of security. 
 We also demonstrate that an arithmetic coding-based approach can be 
exploited to efficiently compress the encrypted images. 
ADVANTAGES OF PROPOSED SYSTEM:
 The ability of controlling the lowest achievable rate by the content owner 
may be treated as an advantageous feature of the proposed ETC scheme, 
since the quality of the decoded image at receiver side is guaranteed, though 
the manipulation of the encrypted data is completely handled by an untrusted 
party. 
 Attack model applicable to our proposed encryption scheme is the 
ciphertext-only attack in which the attacker can only access the ciphertext 
and attempts to recover the original image. 
 Our proposed compression method on encrypted images is very close to that 
of the state- of-the-art lossless/lossy image codecs, which receive original, 
unencrypted images as inputs 
SYSTEM ARCHITECTURE:
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb. 
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7. 
 Coding Language : ASP.net, C#.net 
 Tool : Visual Studio 2010 
 Database : SQL SERVER 2008 
REFERENCE: 
Jiantao Zhou,Xianming Liu, Oscar C. Au, and Yuan Yan Tang, “Designing an 
Efficient Image Encryption-Then-Compression System via Prediction Error 
Clustering and Random Permutation”, VOL. 9, NO. 1, JANUARY 2014.

More Related Content

DOCX
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Designing an-efficient-image encrypt...
PDF
Image Cryptography using Nearest Prime Pixels
PDF
Image steganography using substitution and aes
PDF
Steganography
PDF
5. article azojete vol 11 50 61 mala
DOCX
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Designing an efficient image encr...
PPTX
Image Encryption in java ppt.
PPTX
Image encryption and decryption
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Designing an-efficient-image encrypt...
Image Cryptography using Nearest Prime Pixels
Image steganography using substitution and aes
Steganography
5. article azojete vol 11 50 61 mala
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Designing an efficient image encr...
Image Encryption in java ppt.
Image encryption and decryption

Similar to IEEE 2014 DOTNET IMAGE PROCESSING PROJECTS Designing an-efficient-image encryption-then compression system via prediction error clustering and random permutation (20)

DOCX
designing an efficient image encryption-then-compression system via predictio...
DOCX
JPM1404 Designing an Efficient Image Encryption-Then-Compression System via...
DOCX
Designing an efficient image encryption then-compression system via predictio...
PDF
Secure OMP Based Pattern Recognition that Supports Image Compression
PDF
A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...
PDF
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
PDF
Unified Approach With Neural Network for Authentication, Security and Compres...
DOCX
Image encryption using aes key expansion
PDF
Security using image processing
PDF
Security using image processing
PDF
IRJET- Mosaic Image Creation in Video for Secure Transmission
PDF
Survey on Different Image Encryption Techniques with Tabular Form
PDF
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
PDF
S4501105108
PDF
Secure Image Hiding Algorithm using Cryptography and Steganography
PDF
International Journal of Engineering Research and Development (IJERD)
PDF
Fibonacci Video Encryption
PDF
Image Encryption Using Differential Evolution Approach in Frequency Domain
PDF
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
PDF
Iaetsd implementation of chaotic algorithm for secure image
designing an efficient image encryption-then-compression system via predictio...
JPM1404 Designing an Efficient Image Encryption-Then-Compression System via...
Designing an efficient image encryption then-compression system via predictio...
Secure OMP Based Pattern Recognition that Supports Image Compression
A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
Unified Approach With Neural Network for Authentication, Security and Compres...
Image encryption using aes key expansion
Security using image processing
Security using image processing
IRJET- Mosaic Image Creation in Video for Secure Transmission
Survey on Different Image Encryption Techniques with Tabular Form
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
S4501105108
Secure Image Hiding Algorithm using Cryptography and Steganography
International Journal of Engineering Research and Development (IJERD)
Fibonacci Video Encryption
Image Encryption Using Differential Evolution Approach in Frequency Domain
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Iaetsd implementation of chaotic algorithm for secure image
Ad

More from IEEEBEBTECHSTUDENTPROJECTS (20)

DOCX
IEEE 2014 NS2 NETWORKING PROJECTS Temporal traffic dynamics improve the conn...
DOCX
IEEE 2014 NS2 NETWORKING PROJECTS Proportional fair coding for wireless mesh...
DOCX
IEEE 2014 NS2 NETWORKING PROJECTS Optical networking with variable code-rate...
DOCX
IEEE 2014 NS2 NETWORKING PROJECTS Improving spectrum efficiency via in netwo...
DOCX
IEEE 2014 NS2 NETWORKING PROJECTS Fast regular expression matching using sma...
DOCX
IEEE 2014 NS2 NETWORKING PROJECTS Distributed detection in mobile access wir...
DOCX
IEEE 2014 NS2 NETWORKING PROJECTS Discount counting for fast flow statistics...
DOCX
IEEE 2014 NS2 NETWORKING PROJECTS Cloudy computing leveraging weather foreca...
DOCX
IEEE 2014 NS2 NETWORKING PROJECTS Certificateless remote anonymous authentic...
DOCX
IEEE 2014 NS2 NETWORKING PROJECTS Asymptotic analysis on secrecy capacity in...
DOCX
IEEE 2014 NS2 NETWORKING PROJECTS Algorithms for enhanced inter cell interfe...
DOCX
IEEE 2014 NS2 NETWORKING PROJECTS A hybrid hardware architecture for high sp...
DOCX
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Phase based-binarization-of-ancie...
DOCX
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Fingerprint compression-based-on-...
DOCX
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Digital image-sharing-by-diverse-...
DOCX
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS An efficient-parallel-approach-fo...
DOCX
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Tension in active shapes
DOCX
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Seamless view synthesis through te...
DOCX
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Scale adaptive dictionary learning
DOCX
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Saliency aware video compression
IEEE 2014 NS2 NETWORKING PROJECTS Temporal traffic dynamics improve the conn...
IEEE 2014 NS2 NETWORKING PROJECTS Proportional fair coding for wireless mesh...
IEEE 2014 NS2 NETWORKING PROJECTS Optical networking with variable code-rate...
IEEE 2014 NS2 NETWORKING PROJECTS Improving spectrum efficiency via in netwo...
IEEE 2014 NS2 NETWORKING PROJECTS Fast regular expression matching using sma...
IEEE 2014 NS2 NETWORKING PROJECTS Distributed detection in mobile access wir...
IEEE 2014 NS2 NETWORKING PROJECTS Discount counting for fast flow statistics...
IEEE 2014 NS2 NETWORKING PROJECTS Cloudy computing leveraging weather foreca...
IEEE 2014 NS2 NETWORKING PROJECTS Certificateless remote anonymous authentic...
IEEE 2014 NS2 NETWORKING PROJECTS Asymptotic analysis on secrecy capacity in...
IEEE 2014 NS2 NETWORKING PROJECTS Algorithms for enhanced inter cell interfe...
IEEE 2014 NS2 NETWORKING PROJECTS A hybrid hardware architecture for high sp...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Phase based-binarization-of-ancie...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Fingerprint compression-based-on-...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Digital image-sharing-by-diverse-...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS An efficient-parallel-approach-fo...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Tension in active shapes
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Seamless view synthesis through te...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Scale adaptive dictionary learning
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Saliency aware video compression
Ad

Recently uploaded (20)

PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
DOCX
573137875-Attendance-Management-System-original
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPT
Mechanical Engineering MATERIALS Selection
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
MET 305 MODULE 1 KTU 2019 SCHEME 25.pptx
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
web development for engineering and engineering
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
Digital Logic Computer Design lecture notes
PPTX
Welding lecture in detail for understanding
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
additive manufacturing of ss316l using mig welding
PDF
ETO & MEO Certificate of Competency Questions and Answers
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPTX
Internet of Things (IOT) - A guide to understanding
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Lecture Notes Electrical Wiring System Components
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
573137875-Attendance-Management-System-original
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Embodied AI: Ushering in the Next Era of Intelligent Systems
Mechanical Engineering MATERIALS Selection
bas. eng. economics group 4 presentation 1.pptx
MET 305 MODULE 1 KTU 2019 SCHEME 25.pptx
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
web development for engineering and engineering
CYBER-CRIMES AND SECURITY A guide to understanding
Digital Logic Computer Design lecture notes
Welding lecture in detail for understanding
Model Code of Practice - Construction Work - 21102022 .pdf
additive manufacturing of ss316l using mig welding
ETO & MEO Certificate of Competency Questions and Answers
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Internet of Things (IOT) - A guide to understanding

IEEE 2014 DOTNET IMAGE PROCESSING PROJECTS Designing an-efficient-image encryption-then compression system via prediction error clustering and random permutation

  • 1. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmai l.com Designing an Efficient Image Encryption-Then Compression System via Prediction Error Clustering and Random Permutation ABSTRACT: In many practical scenarios, image encryption has to be conducted prior to image compression. This has led to the problem of how to design a pair of image encryption and compression algorithms such that compressing the encrypted images can still be efficiently performed. In this paper, we design a highly efficient image encryption-then-compression (ETC) system, where both lossless and lossy compressions are considered. The proposed image encryption scheme operated in the prediction error domain is shown to be able to provide a reasonably high level of security. We also demonstrate that an arithmetic coding-based approach can be exploited to efficiently compress the encrypted images. More notably, the proposed compression approach applied to encrypted images is only slightly worse, in terms of compression efficiency, than the state-of-the-art lossless/lossy
  • 2. image coders, which take original, unencrypted images as inputs. In contrast, most of the existing ETC solutions induce significant penalty on the compress ion efficiency. EXISTING SYSTEM:  Existing ETC solutions induce significant penalty on the compression efficiency. DISADVANTAGES OF EXISTING SYSTEM:  More Prediction error.  Lossy Image Compression. PROPOSED SYSTEM:  In this paper, we design a highly efficient image encryption-then-compression (ETC) system, where both lossless and lossy compression are considered.  The proposed image encryption scheme operated in the predic tion error domain is shown to be able to provide a reasonably high level of security.  We also demonstrate that an arithmetic coding-based approach can be exploited to efficiently compress the encrypted images. ADVANTAGES OF PROPOSED SYSTEM:
  • 3.  The ability of controlling the lowest achievable rate by the content owner may be treated as an advantageous feature of the proposed ETC scheme, since the quality of the decoded image at receiver side is guaranteed, though the manipulation of the encrypted data is completely handled by an untrusted party.  Attack model applicable to our proposed encryption scheme is the ciphertext-only attack in which the attacker can only access the ciphertext and attempts to recover the original image.  Our proposed compression method on encrypted images is very close to that of the state- of-the-art lossless/lossy image codecs, which receive original, unencrypted images as inputs SYSTEM ARCHITECTURE:
  • 4. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : ASP.net, C#.net  Tool : Visual Studio 2010  Database : SQL SERVER 2008 REFERENCE: Jiantao Zhou,Xianming Liu, Oscar C. Au, and Yuan Yan Tang, “Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation”, VOL. 9, NO. 1, JANUARY 2014.