HOME JOURNALS CONTACT

Journal of Artificial Intelligence

Year: 2014 | Volume: 7 | Issue: 3 | Page No.: 136-144
DOI: 10.3923/jai.2014.136.144
Why Information Security Demands Transform Domain, Compression and Encryption?
Padmapriya Praveenkumar, K. Thenmozhi, John Bosco Balaguru Rayappan and Rengarajan Amirtharajan

Abstract: With the advancement of technology and networking techniques, it is possible to transmit images at a lower bit rate and at the same time with high security. In order to fulfil the security needs of image transmission, several encryption, decryption and image encoding techniques have been put forward. The encryption discussed in this study is the PN (Pseudo Random Number) sequence based encryption using Joint Photographic Experts Group (JPEG) algorithm. In the proposed method, initially the image is portioned into blocks. Run length encoding is done for the level shifted image. Then Discrete Cosine Transform (DCT) and quantization was done and Difference of Quantized DC (DQDC) was calculated. Then the quantized blocks are shuffled based on the PN sequence and then the scrambled images are arranged in zigzag order. Then finally run length and Huffman lossless compression are done to eliminate the additional bits generated using PN codes. Metrics like correlation coefficient, Unified Average Changing Intensity (UACI), Number of Pixels Change Rate (NPCR) were computed to prove the sternness of the proposed method.

Fulltext PDF Fulltext HTML

How to cite this article
Padmapriya Praveenkumar, K. Thenmozhi, John Bosco Balaguru Rayappan and Rengarajan Amirtharajan, 2014. Why Information Security Demands Transform Domain, Compression and Encryption?. Journal of Artificial Intelligence, 7: 136-144.

Related Articles:
© Science Alert. All Rights Reserved