Professional Documents
Culture Documents
Abstract
In many practical scenarios, image encryption has to be conducted prior to image compression. This has led to the problem
of how to design a pair of image encryption and compression algorithms such that compressing the encrypted images can
still be efficiently performed. In this process a highly efficient image encryption-then-compression (ETC) system.
The proposed image encryption scheme operated in the prediction error domain is shown to be able to provide a
reasonably high level of security and also demonstrate that an arithmetic coding-based approach can be exploited to
efficiently compress the encrypted images.
In this present the details of the three key components in our proposed ETC system, namely, image encryption conducted
by Alice, image compression conducted by Charlie, and the sequential decryption and decompression conducted by Bob.
From the perspective of the whole ETC system, the design of the encryption algorithm should simultaneously consider the
security and the ease of compressing the encrypted data.
Existing System
transmission scenarios, the order of applying the compression and encryption needs to be
reversed in some other situations.
As the content owner, Sender is always interested in protecting the privacy of the image data
through encryption.
Sender has no incentive to compress her data, and hence, will not use her limited
This is especially true when Sender uses a resource-deprived mobile device. In contrast, the
channel provider Intermediate has an overriding interest in compressing all the network traffic
so as to maximize the network utilization.
Proposed System
In this proposed system process with encryption then compression to share data.
the result.
A modified basis pursuit algorithm can then be applied to estimate the original
EZW Algorithm
The embedded zero tree wavelet algorithm (EZW) is a simple, yet remarkable effective,
embedded code.
The same image that would have been encoded at the bit rate corresponding to the
truncated stream.
The block information for every block to be encoded in EZW algorithm.
Architecture Diagram
DFD level 0
DFD level 1
DFD level 2
DFD level 3
DFD level 4
DFD level 5
DFD level 6
Modules
Preprocessing
Cluster division
Image Encryption
Image encryption with Data
Image Compression
Result
Decompression
Decrypt Data
Cluster division
The pre processing image to be cluster into more than a few parts.
It basically creates a matrix of images and draws on
In the present data hiding at the sender side. These parts are constructed and implemented to satisfy
image must not have any distortion artifacts. The algorithm must embedding capacity in order to
achieve the above requirements.
The images will be encrypt with data using the practice of hiding private or sensitive information
within something that appears to be nothing out to the usual way that are used to protect important
information.
Human senses are not trained to look for files that have information inside of them but visible only
image.
Image Compression
Wavelet based on compression provides a very effective technique for military images. Military
image requires storage of large quantity of secret data. Due to the high bandwidth and capacity of
storage, military image must be compressed before transmission.
There are two categories for compression Lossy and Lossless method. Lossless compression
ensures complete data after reconstruction. In application of Lossy technique information is loss to
some degree. A popular method of image compression, namely, the embedded zero tree wavelet
(EZW).
The proposed image compression algorithm outperforms the EZW(embedded zero tree wavelet)
Result
The receivers receive the encrypted image and the using decompresses the image after to
System Requirements
Hardware Requirements
System : Dual core.
Hard Disk
: 160 GB.
Monitor : 15 VGA Colour.
Mouse : Logitech.
Ram : 1 GB.
Software Requirements
Operating system : Windows XP/7.
Coding Language : C#.net
Tool : Visual Studio 2005
Database : SQL SERVER 2005