Sie sind auf Seite 1von 22

Introduction Existing compression and encryption Sequence The Proposed system Experimental Results Conclusion

Lossy Compression and Iterative Reconstruction for Encrypted Image


Dhanya.K.Sudhish 125/11

June 18, 2012

Dhanya.K.Sudhish 125/11

Lossy Compression and Iterative Reconstruction for Encrypted I

Introduction Existing compression and encryption Sequence The Proposed system Experimental Results Conclusion

IEEE paper

Lossy Compression and Iterative Reconstruction for Encrypted Image by Xinpeng Zhang ,VOL. 6, NO. 1, MARCH 2011

Dhanya.K.Sudhish 125/11

Lossy Compression and Iterative Reconstruction for Encrypted I

Introduction Existing compression and encryption Sequence The Proposed system Experimental Results Conclusion

CONTENTS
1 2 3

Introduction Existing compression and encryption Sequence The Proposed system Image Encryption Compression of Encrypted Image Image Reconstruction Experimental Results Conclusion

4 5

Dhanya.K.Sudhish 125/11

Lossy Compression and Iterative Reconstruction for Encrypted I

Introduction Existing compression and encryption Sequence The Proposed system Experimental Results Conclusion

Introduction

For transmitting data securely and eciently.


1 2

Compress the data Encrypted the compressed data Encrypt the data Compress the encrypted data for transmission

New sequence.
1 2

Dhanya.K.Sudhish 125/11

Lossy Compression and Iterative Reconstruction for Encrypted I

Introduction Existing compression and encryption Sequence The Proposed system Experimental Results Conclusion

Existing compression and encryption Sequence

In transmitter side
1 2

First compress the data to reduce reduntancy. Next encrypt the data to mask its meaning. orderly perform decompression and decryption.

At recever side
1

Dhanya.K.Sudhish 125/11

Lossy Compression and Iterative Reconstruction for Encrypted I

Introduction Existing compression and encryption Sequence The Proposed system Experimental Results Conclusion

Image Encryption Compression of Encrypted Image Image Reconstruction

The Proposed system

Image Encryption
1

psuedo-random permutation. discarding the excessively rough and ne information of coecients in the transform domain. reconstruct the priciple content of the original image by iteratively updating the values of the coecients, with the help of spatial correlation in natural image.

Compression of Encrypted Image


1

Image Reconstruction
1

Dhanya.K.Sudhish 125/11

Lossy Compression and Iterative Reconstruction for Encrypted I

Introduction Existing compression and encryption Sequence The Proposed system Experimental Results Conclusion

Image Encryption Compression of Encrypted Image Image Reconstruction

Image Encryption

a pseudorandom permutation is used to encrypt an original image. Number of pixels N=N1 xN2 each pixel with a gray value falling into [0, 255]. represented by 8 bits. Encrwhere H is a public orthogonal matrix size of ypted data = permuted pixel-sequence. the number of possible permutation ways N!. the permutation way is determined by a secret key.

Dhanya.K.Sudhish 125/11

Lossy Compression and Iterative Reconstruction for Encrypted I

Introduction Existing compression and encryption Sequence The Proposed system Experimental Results Conclusion

Image Encryption Compression of Encrypted Image Image Reconstruction

Compression of Encrypted Image

A majority of pixels are converted to a series of coecients using an orthogonal transform. Decompose the pixels into rigid and elastic pixels. .N rigid pixels and (1).N elastic pixels. Rigid pixels p1 ,p2 ,.....,p.N. Elastic pixels q1 ,q2 ,.....,q(1-).N.

Dhanya.K.Sudhish 125/11

Lossy Compression and Iterative Reconstruction for Encrypted I

Introduction Existing compression and encryption Sequence The Proposed system Experimental Results Conclusion

Image Encryption Compression of Encrypted Image Image Reconstruction

Compression of Encrypted Image

Perform orthogonal transform to elastic pixels.

where H is a public orthogonal matrix size of (1).N x (1).N. Discard the rough information rk and ne information tk .

Dhanya.K.Sudhish 125/11

Lossy Compression and Iterative Reconstruction for Encrypted I

Introduction Existing compression and encryption Sequence The Proposed system Experimental Results Conclusion

Image Encryption Compression of Encrypted Image Image Reconstruction

Compression of Encrypted Image


Calculate the middle level information sk

where and M are system parameters. The rough information will be retrieved by an iterative image reconstruction procedure. The loss of the ne information cannot seriously aect the quality of the reconstructed image. sk are within [0,M-1].

Dhanya.K.Sudhish 125/11

Lossy Compression and Iterative Reconstruction for Encrypted I

Introduction Existing compression and encryption Sequence The Proposed system Experimental Results Conclusion

Image Encryption Compression of Encrypted Image Image Reconstruction

Compression of Encrypted Image


Divide the set of sk into many pieces with L1 digits and convert each decimal value into L2 bits in a binary notationalsystem.

Dhanya.K.Sudhish 125/11

Lossy Compression and Iterative Reconstruction for Encrypted I

Introduction Existing compression and encryption Sequence The Proposed system Experimental Results Conclusion

Image Encryption Compression of Encrypted Image Image Reconstruction

Compression of Encrypted Image

With a large L1 ,

The compression ratio R achieved here is

Dhanya.K.Sudhish 125/11

Lossy Compression and Iterative Reconstruction for Encrypted I

Introduction Existing compression and encryption Sequence The Proposed system Experimental Results Conclusion

Image Encryption Compression of Encrypted Image Image Reconstruction

Image Reconstruction

Decompose the compressed data


1 2 3

obtain gray values of rigid pixels. All values of sk . Values of L1 and M

Values of L2 is calcutated. Using secret key the positions of rigid pixels are calculated.

Dhanya.K.Sudhish 125/11

Lossy Compression and Iterative Reconstruction for Encrypted I

Introduction Existing compression and encryption Sequence The Proposed system Experimental Results Conclusion

Image Encryption Compression of Encrypted Image Image Reconstruction

Image Reconstruction

The elastic pixels are initialized with their nearest rigid pixel values. Because of spatial correlation the estimated values are similar to the corresponding original values. Rearrange the estimated values of elastic pixels using the same permutation way.

Dhanya.K.Sudhish 125/11

Lossy Compression and Iterative Reconstruction for Encrypted I

Introduction Existing compression and encryption Sequence The Proposed system Experimental Results Conclusion

Image Encryption Compression of Encrypted Image Image Reconstruction

Calculate the co ecients

Dhanya.K.Sudhish 125/11

Lossy Compression and Iterative Reconstruction for Encrypted I

Introduction Existing compression and encryption Sequence The Proposed system Experimental Results Conclusion

Image Encryption Compression of Encrypted Image Image Reconstruction

Image Reconstruction
Modify the coecients to the closest values consistent with the corresponding sk

Dhanya.K.Sudhish 125/11

Lossy Compression and Iterative Reconstruction for Encrypted I

Introduction Existing compression and encryption Sequence The Proposed system Experimental Results Conclusion

Image Encryption Compression of Encrypted Image Image Reconstruction

Image Reconstruction

Calculate the average energy of dierence between the two versions of elastic pixels.

Iterative update at each coecient, the reconstructed elastic pixels approach their original values progressively.

Dhanya.K.Sudhish 125/11

Lossy Compression and Iterative Reconstruction for Encrypted I

Introduction Existing compression and encryption Sequence The Proposed system Experimental Results Conclusion

Image Encryption Compression of Encrypted Image Image Reconstruction

Image Reconstruction

of Image Reconstruction.
Dhanya.K.Sudhish 125/11

Lossy Compression and Iterative Reconstruction for Encrypted I

Introduction Existing compression and encryption Sequence The Proposed system Experimental Results Conclusion

Experimental Results

the proposed scheme can signicantly improve the compression eciency


The compression ratio and the quality of the reconstructed image are dependent on the values of compression parameters.

The convergence is also dependent on the accuracy of estimating elastic pixels from their neighbors.
The smoother the original image, the better is the quality of reconstructed image.

Dhanya.K.Sudhish 125/11

Lossy Compression and Iterative Reconstruction for Encrypted I

Introduction Existing compression and encryption Sequence The Proposed system Experimental Results Conclusion

Conclusion

The original image is encrypted by pseudorandom permutation. Then compressed by discarding the excessively rough and ne information of coecients Having the compressed data and the permutation way, an iterative updating procedure is used to restore the image. Obtain very good compression ratio

Dhanya.K.Sudhish 125/11

Lossy Compression and Iterative Reconstruction for Encrypted I

Introduction Existing compression and encryption Sequence The Proposed system Experimental Results Conclusion

Future Scope

The histogram of original image can be obtained without knowing secret key. An improved secure methods for encryption of image can be introduced in future to overcome this.

Dhanya.K.Sudhish 125/11

Lossy Compression and Iterative Reconstruction for Encrypted I

Introduction Existing compression and encryption Sequence The Proposed system Experimental Results Conclusion

References
Xinpeng Zhang Lossy Compression and Iterative Reconstruction for Encrypted Image IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 6, NO. 1, MARCH 2011 M. Johnson, P. Ishwar, V. M. Prabhakaran, D. Schonberg, and K. Ramchandran, On compressing encrypted data, IEEE Trans. Signal Process., vol. 52, no. 10, pt. 2, pp. 29923006, Oct. 2004. A. Mitra, Y. V. Subba Rao and S. R. M. Prasanna A New Image Encryption Approach using Combinational Permutation Techniques , in International Journal of Electrical and Computer Engineering 1:2 2006
Dhanya.K.Sudhish 125/11

Lossy Compression and Iterative Reconstruction for Encrypted I

Das könnte Ihnen auch gefallen