Subscribe Now Subscribe Today
Science Alert
 
FOLLOW US:     Facebook     Twitter
Blue
   
Curve Top
Journal of Artificial Intelligence
  Year: 2014 | Volume: 7 | Issue: 3 | Page No.: 136-144
DOI: 10.3923/jai.2014.136.144
Why Information Security Demands Transform Domain, Compression and Encryption?
Padmapriya Praveenkumar, K. Thenmozhi, John Bosco Balaguru Rayappan and Rengarajan Amirtharajan

Abstract:
With the advancement of technology and networking techniques, it is possible to transmit images at a lower bit rate and at the same time with high security. In order to fulfil the security needs of image transmission, several encryption, decryption and image encoding techniques have been put forward. The encryption discussed in this study is the PN (Pseudo Random Number) sequence based encryption using Joint Photographic Experts Group (JPEG) algorithm. In the proposed method, initially the image is portioned into blocks. Run length encoding is done for the level shifted image. Then Discrete Cosine Transform (DCT) and quantization was done and Difference of Quantized DC (DQDC) was calculated. Then the quantized blocks are shuffled based on the PN sequence and then the scrambled images are arranged in zigzag order. Then finally run length and Huffman lossless compression are done to eliminate the additional bits generated using PN codes. Metrics like correlation coefficient, Unified Average Changing Intensity (UACI), Number of Pixels Change Rate (NPCR) were computed to prove the sternness of the proposed method.
PDF Fulltext XML References Citation Report Citation
 RELATED ARTICLES:
  •    Horse DNA Runs on Image: A Novel Road to Image Encryption
  •    Image Merger Encryptor: A Chaotic and Chebyshev Key Approach
  •    Chain of Shuffling and Chaos: A Tied Encryptic Approach
  •    Light Weight Steganography on RISC Platform-Implementation and Analysis
  •    Brownian Motion of Binary and Gray-Binary and Gray Bits in Image for Stego
  •    Pixel Authorized by Pixel to Trace with SFC on Image to Sabotage Data Mugger: A Comparative Study on PI Stego
  •    Steganography-Time to Time: A Review
  •    High Capacity Triple Plane Embedding: A Colour Stego
How to cite this article:

Padmapriya Praveenkumar, K. Thenmozhi, John Bosco Balaguru Rayappan and Rengarajan Amirtharajan, 2014. Why Information Security Demands Transform Domain, Compression and Encryption?. Journal of Artificial Intelligence, 7: 136-144.

DOI: 10.3923/jai.2014.136.144

URL: https://scialert.net/abstract/?doi=jai.2014.136.144

 
COMMENT ON THIS PAPER
 
 
 

 

 
 
 
 
 
 
 
 
 

 
 
 
 
 
 

       

       

Curve Bottom