Open Access   Article Go Back

Enhanced Compression and Cryptographic Techniques for Securing Images- A Survey

G.Elavarasi 1 , M. Vanitha2

Section:Survey Paper, Product Type: Journal Paper
Volume-7 , Issue-4 , Page no. 344-348, Apr-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i4.344348

Online published on Apr 30, 2019

Copyright © G.Elavarasi, M. Vanitha . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: G.Elavarasi, M. Vanitha , “Enhanced Compression and Cryptographic Techniques for Securing Images- A Survey,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.344-348, 2019.

MLA Style Citation: G.Elavarasi, M. Vanitha "Enhanced Compression and Cryptographic Techniques for Securing Images- A Survey." International Journal of Computer Sciences and Engineering 7.4 (2019): 344-348.

APA Style Citation: G.Elavarasi, M. Vanitha , (2019). Enhanced Compression and Cryptographic Techniques for Securing Images- A Survey. International Journal of Computer Sciences and Engineering, 7(4), 344-348.

BibTex Style Citation:
@article{Vanitha_2019,
author = {G.Elavarasi, M. Vanitha },
title = {Enhanced Compression and Cryptographic Techniques for Securing Images- A Survey},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2019},
volume = {7},
Issue = {4},
month = {4},
year = {2019},
issn = {2347-2693},
pages = {344-348},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4040},
doi = {https://doi.org/10.26438/ijcse/v7i4.344348}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i4.344348}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4040
TI - Enhanced Compression and Cryptographic Techniques for Securing Images- A Survey
T2 - International Journal of Computer Sciences and Engineering
AU - G.Elavarasi, M. Vanitha
PY - 2019
DA - 2019/04/30
PB - IJCSE, Indore, INDIA
SP - 344-348
IS - 4
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
335 239 downloads 202 downloads
  
  
           

Abstract

A huge amount of data has been exchanged over various types of networks due to the rapid growth of computer networks and information technology. In major part of these exchanged data, they need security mechanisms to offer various degree of protection. The common solution to protect digital data from eavesdropping and intercepting is to encrypt the message which needs some knowledge of cryptography. Cryptography is a technique used today hiding any confidential information from the attack of an intruder and used to create authentication, integrity, availability and confidentiality. Nowadays, Digital data communication requires data security, so that data should reach to the intended user in safe manner. The protection of confidential data from unauthorized access can be done with many encryption techniques. Encryption is used to protect data from being accessed by unauthorized users. It is very important to communicate images over networks. The important image transfer will takes place over the unsecured internet network. Continuing development of the various electronic image processing technologies has produced faster means of transmission. Compression is often used to save disk space and reduce the time needed to transfer images over the networks. Compressing data can save storage capacity, speed up file transfer and reduce cost for hardware storage and network bandwidth.

Key-Words / Index Term

Data Compression, Data Encryption, Cryptography, Image Processing and Security Mechanism

References

[1] Chamman Lal Sahu , Chandra Shekhar Singh Thakur , Manoj Kumar Xalxo , Mohit Thakur , Miss RoshniRathour, “Survey on JPEG Image Compression Using DCT”, Volume 4 Issue X, October 2016, International Journal for Research in Applied Science & Engineering Technology (IJRASET).
[2] K. AyyappaSwamy , C. Somasundar Reddy, K. DurgaSreenivas , “Image Compression Using Hybrid DCT-DWT Transform”, International Journal of Advanced Research in Computer Science and Software Engineering 5(5), May- 2015.
[3] Dr.T. Karthikeyan, C. Thirumoorthi, "A Survey on Embedded Zero Tree Wavelet ", 2014 International Journal of Computer Science.
[4] Dr Mohammed Ismail.B, "Contemporary Bench Mark Techniques in Fractal image Compression-A Survey", International Journal of Engineering Technology Science and Research IJETSR, October 2017.
[5] Anita Thengade, RuchaDondal, "Genetic Algorithm – Survey Paper", International Journal of Computer Applications, April-2012.
[6] Peiya Li, Kwok-Tung Lo, “A Content-Adaptive Joint Image Compression and Encryption Scheme”, 1520-9210 (c) 2017 IEEE
[7] Mohab Mostafa L, Mohamed Waleed Fakhr, “Joint Image Compression and Encryption Based on Compressed Sensing and Entropy Coding”, 2017 IEEE 13th International Colloquium on Signal Processing & its Applications (CSPA 2017), Penang, Malaysia
[8] Subhajit Roy, Prof.(Dr.)GautamSanyal, “An Approach to Selective Encryption on Compressed Image ”, on 2016 2nd International Conference on Contemporary Computing and Informatics (ic3i)
[9] Kalyani G. Nimbokar, Milind V.Sarode, MangeshM.Ghonge, “A Survey based on Designing an Efficient Image Encryption-then-Compression System”, International Journal of Computer Applications (0975 – 8887) National Level Technical Conference “X-PLORE 14
[10] Ganesh Lamkhade, Ajay Kumar Gupta, “A Survey on Efficient ETC (EncryptionThenCompression) Techniques for Image Data Security”, International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Impact Factor (2012): 3.358
[11] Maria Joseph, Tomson Devis,”Highly Secure Scalable Compression of Encrypted Images”, IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308, Oct -2015
[12] Prasanth P. S, Anusree L, “Lossy Compression and Reconstruction for Encrypted Image”, International Journal of Computer Science and Mobile Computing, ICMIC13, December- 2013, pg. 153-157
[13] G. Elavarasi, Dr. M. Vanitha, “A Novel Method for Securing Medical Image Using Visual Secret Sharing Scheme”, International Journal of Engineering and Technology (IJET), Vol 9 No 5 Oct-Nov 2017
[14] A. Kingston, S. Colosimo, P. Campisi, F. Autrusseau,” Lossless Image Compression and Selective Encryption Using a Discrete Radon Transform”, 2007 IEEE
[15]Abraham Jun Jiang Lock, Chong HooiLoh, SitiHasanahJuhari, AzmanSamsudin, “Compression-Encryption Based on Fractal Geometric”, Second International Conference on Computer Research and Development, 2010 IEEE
[16] Xinpeng Zhang, “Lossy Compression and Iterative Reconstruction for Encrypted Image”, IEEE Transactions on Information Forensics and Security, VOL. 6, NO. 1, MARCH 2011
[17] Subhajit Roy , Prof.(Dr.)GautamSanyal, “An Approach to Selective Encryption on Compressed Image ”, 2016 2nd International Conference on Contemporary Computing and Informatics (ic3i), IEEE
[18] Daniel Schonberg, Stark Draper, Kannan Ramchandran, “On Compression Of Encrypted Images”, UC Berkeley, EECS Department, 211 Cory Hall #1772, Berkeley, CA 94720-1772 {dschonbe,sdraper,kannanr}
[19] B.Suneetha, “Designing an Efficient Image Encryption-then Compression System”, International Journal of Innovative Research in Electrical, Electronics, Instrumentation and Control Engineering Vol. 3, Issue 3, March 2015
[20] EmySetyaningsih, RetantyoWardoyo, “Review of Image Compression and Encryption Techniques”, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 8, No. 2, 2017
[21] Xinpeng Zhang, Member, IEEE, Yanli Ren, Liquan Shen, Zhenxing Qian, and GuoruiFeng, “Compressing Encrypted Images With Auxiliary Information”, IEEE Transactions On Multimedia, VOL. 16, NO. 5, AUGUST 2014
[22] S. Dubey, R. Jhaggar , R. Verma and D. Gaur, “Encryption and Decryption of Data by Genetic Algorithm”, International Journal of Scientific Research in Computer Science and Engineering Vol.5, Issue.3, pp.42-46, June (2017)
[23] V. Kapoor, “A New Cryptography Algorithm with an Integrated Scheme to Improve Data Security”, International Journal of Scientific Research in Network Security and Communication, Volume-1, Issue-2, June- 2013