Beruflich Dokumente
Kultur Dokumente
Dhanya.K.Sudhish 125/11
Introduction Existing compression and encryption Sequence The Proposed system Experimental Results Conclusion
IEEE paper
Lossy Compression and Iterative Reconstruction for Encrypted Image by Xinpeng Zhang ,VOL. 6, NO. 1, MARCH 2011
Dhanya.K.Sudhish 125/11
Introduction Existing compression and encryption Sequence The Proposed system Experimental Results Conclusion
CONTENTS
1 2 3
Introduction Existing compression and encryption Sequence The Proposed system Image Encryption Compression of Encrypted Image Image Reconstruction Experimental Results Conclusion
4 5
Dhanya.K.Sudhish 125/11
Introduction Existing compression and encryption Sequence The Proposed system Experimental Results Conclusion
Introduction
Compress the data Encrypted the compressed data Encrypt the data Compress the encrypted data for transmission
New sequence.
1 2
Dhanya.K.Sudhish 125/11
Introduction Existing compression and encryption Sequence The Proposed system Experimental Results Conclusion
In transmitter side
1 2
First compress the data to reduce reduntancy. Next encrypt the data to mask its meaning. orderly perform decompression and decryption.
At recever side
1
Dhanya.K.Sudhish 125/11
Introduction Existing compression and encryption Sequence The Proposed system Experimental Results Conclusion
Image Encryption
1
psuedo-random permutation. discarding the excessively rough and ne information of coecients in the transform domain. reconstruct the priciple content of the original image by iteratively updating the values of the coecients, with the help of spatial correlation in natural image.
Image Reconstruction
1
Dhanya.K.Sudhish 125/11
Introduction Existing compression and encryption Sequence The Proposed system Experimental Results Conclusion
Image Encryption
a pseudorandom permutation is used to encrypt an original image. Number of pixels N=N1 xN2 each pixel with a gray value falling into [0, 255]. represented by 8 bits. Encrwhere H is a public orthogonal matrix size of ypted data = permuted pixel-sequence. the number of possible permutation ways N!. the permutation way is determined by a secret key.
Dhanya.K.Sudhish 125/11
Introduction Existing compression and encryption Sequence The Proposed system Experimental Results Conclusion
A majority of pixels are converted to a series of coecients using an orthogonal transform. Decompose the pixels into rigid and elastic pixels. .N rigid pixels and (1).N elastic pixels. Rigid pixels p1 ,p2 ,.....,p.N. Elastic pixels q1 ,q2 ,.....,q(1-).N.
Dhanya.K.Sudhish 125/11
Introduction Existing compression and encryption Sequence The Proposed system Experimental Results Conclusion
where H is a public orthogonal matrix size of (1).N x (1).N. Discard the rough information rk and ne information tk .
Dhanya.K.Sudhish 125/11
Introduction Existing compression and encryption Sequence The Proposed system Experimental Results Conclusion
where and M are system parameters. The rough information will be retrieved by an iterative image reconstruction procedure. The loss of the ne information cannot seriously aect the quality of the reconstructed image. sk are within [0,M-1].
Dhanya.K.Sudhish 125/11
Introduction Existing compression and encryption Sequence The Proposed system Experimental Results Conclusion
Dhanya.K.Sudhish 125/11
Introduction Existing compression and encryption Sequence The Proposed system Experimental Results Conclusion
With a large L1 ,
Dhanya.K.Sudhish 125/11
Introduction Existing compression and encryption Sequence The Proposed system Experimental Results Conclusion
Image Reconstruction
Values of L2 is calcutated. Using secret key the positions of rigid pixels are calculated.
Dhanya.K.Sudhish 125/11
Introduction Existing compression and encryption Sequence The Proposed system Experimental Results Conclusion
Image Reconstruction
The elastic pixels are initialized with their nearest rigid pixel values. Because of spatial correlation the estimated values are similar to the corresponding original values. Rearrange the estimated values of elastic pixels using the same permutation way.
Dhanya.K.Sudhish 125/11
Introduction Existing compression and encryption Sequence The Proposed system Experimental Results Conclusion
Dhanya.K.Sudhish 125/11
Introduction Existing compression and encryption Sequence The Proposed system Experimental Results Conclusion
Image Reconstruction
Modify the coecients to the closest values consistent with the corresponding sk
Dhanya.K.Sudhish 125/11
Introduction Existing compression and encryption Sequence The Proposed system Experimental Results Conclusion
Image Reconstruction
Calculate the average energy of dierence between the two versions of elastic pixels.
Iterative update at each coecient, the reconstructed elastic pixels approach their original values progressively.
Dhanya.K.Sudhish 125/11
Introduction Existing compression and encryption Sequence The Proposed system Experimental Results Conclusion
Image Reconstruction
of Image Reconstruction.
Dhanya.K.Sudhish 125/11
Introduction Existing compression and encryption Sequence The Proposed system Experimental Results Conclusion
Experimental Results
The convergence is also dependent on the accuracy of estimating elastic pixels from their neighbors.
The smoother the original image, the better is the quality of reconstructed image.
Dhanya.K.Sudhish 125/11
Introduction Existing compression and encryption Sequence The Proposed system Experimental Results Conclusion
Conclusion
The original image is encrypted by pseudorandom permutation. Then compressed by discarding the excessively rough and ne information of coecients Having the compressed data and the permutation way, an iterative updating procedure is used to restore the image. Obtain very good compression ratio
Dhanya.K.Sudhish 125/11
Introduction Existing compression and encryption Sequence The Proposed system Experimental Results Conclusion
Future Scope
The histogram of original image can be obtained without knowing secret key. An improved secure methods for encryption of image can be introduced in future to overcome this.
Dhanya.K.Sudhish 125/11
Introduction Existing compression and encryption Sequence The Proposed system Experimental Results Conclusion
References
Xinpeng Zhang Lossy Compression and Iterative Reconstruction for Encrypted Image IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 6, NO. 1, MARCH 2011 M. Johnson, P. Ishwar, V. M. Prabhakaran, D. Schonberg, and K. Ramchandran, On compressing encrypted data, IEEE Trans. Signal Process., vol. 52, no. 10, pt. 2, pp. 29923006, Oct. 2004. A. Mitra, Y. V. Subba Rao and S. R. M. Prasanna A New Image Encryption Approach using Combinational Permutation Techniques , in International Journal of Electrical and Computer Engineering 1:2 2006
Dhanya.K.Sudhish 125/11