Compressing Encrypted Images with Auxiliary Information
Rs3,500.00
10000 in stock
SupportDescription
The development of multimedia and network technologies, the security of multimedia application becomes more and more important, when the multimedia data are transmitted over open networks more and more frequently. Moreover, reliable security is necessary to content protection of digital images and videos. Encryption Techniques for multimedia data needs has to be specifically designed to protect multimedia content and fulfill the security requirements for a particular multimedia application. The process of encryption and compression of the images helps in providing security for images. The compression process also helps in the reduction of the bandwidth consumption in image transmission process. The input image is encrypted and the encrypted images were compressed. The input image is encrypted and secret information is obtained from the user is embedded in the image based on LSB embedding process. The encrypted image with secret information is compressed. The same process is reversed inorder to obtain the original image. The process of encryption is employed with the help of one by one additional modulo 256 and blow fish algorithm. The secret information hided in the image obtained from the sender side is retrieved by reversing the same process applied for embedding process. The remaining image is decompressed by reversing the same process applied for the compression process. The decompressed image is then decrypted by reversing the blow fish algorithm process. The key for the blow fish algorithm is generated in the receiver side and based on the generated key the decryption is done. The compression process is employed based on DCT. The transformation process compress the encrypted image by dividing the images into small patches. The performance of the process is measured based on the performance metrics like PSNR and MSE. The performance of the process measured indicates that the proposed approach is more efficient compared to the existing approaches. The process is completely reversible and is lossless.
Only logged in customers who have purchased this product may leave a review.
Reviews
There are no reviews yet.