Designing an Efficient Image Encryption-Then- Compression System with Haar and Daubechies Wavelet

نویسندگان

  • Harmanpreet Kaur Aujla
  • Rajesh Sharma
چکیده

Nowadays there is development in the multimedia and network technologies. That’s why the privacy and security becomes the major issues since the multimedia is transmitted openly over the network .so that Along with privacy and security, the space of s storage is also an important point that can’t be missed. So that, provide the privacy and security to the multimedia, encryption work as the similarly of root to reduce the storage space compression can be used. Reduction size also reducing the time taken for transmission. In many practical experiments, image encryption to be conducted prior to image compression. This has to be the problem, how to design a pair of image encryption and compression algorithms such that compressing the encrypted images can still be efficiently performed. In this research work, we design the algorithm and implement an efficient image encryption compression system. The proposed image encryption method is operated with random permutation method which is shown to be providing reasonably high level of security. We also have implement the new kind of image compression algorithm using Haar and Daubechies Wavelet Transform can be used to efficiently compress the encrypted image. Moreover, the compression approach applied to encrypted image is proved more efficient in terms of Compression Ratio (CR), Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR). For the implementation of this proposed work we use the Image Processing Toolbox under MATLAB software. Keywords—ETC, Haar Wavelet and Daubechies Wavelet. I.INTRODUCTION The development of multimedia and network technologies, the security of multimedia application becomes more and more important, when the multimedia data are transmitted over open networks more and more frequently. Moreover, reliable security is necessary to content protection of digital images and videos. Encryption Techniques for multimedia data needs has to be specifically designed to protect multimedia content and fulfill the security requirements for a particular multimedia application. For example, the realtime encryption of an entire video stream using classical ciphers requires heavy computation due to the large amounts of data involved, but many multimedia applications require security on a much lower level, that can achieved using selective encryption that leaves some perceptual information after encryption. Government private business, and military, a mass great deal of confidential images about their patient (in Hospitals), geographical areas (in research), enemy positions (in defense), financial-status. Most of these information are now collected and stored on electronic computers and transmitted across network to other computer, if this confidential images about enemy positions ,patient ,and geographical areas fall into the wrong hands, After than such a breach of security could lead to lots of war , wrong treatment etc. Protecting confidential images is an ethical and legal requirement. We store information in computer system in the form of files. Files are considered or defined as a basic entity for keeping the information. Then the problem of securing image data or information on computer system can be defined as the problem of securing file data. It is worldwide accepted fact that securing file data is very important, in today’s computing environment. Good encryption makes a source look completely random, previous or traditional algorithms are unable to compress encrypted data. For this reason, traditional systems make sure to compress before they encrypt. We are using the concept of public key encryption, for the encryption and decryption of image. In this public key’s of sender and receiver is known to both but private key’s are kept secret. Neither the security nor the compression efficiency will be sacrificed by performing compression in the encrypted domain. Consider an application scenario in which a content owner Alice wants to securely and efficiently transmit an image I to a recipient Bob, via an un-trusted channel provider Charlie. Conventionally, this could be done as follows. Alice first compresses I into B, and then encrypts B into Ie using an encryption function EK (・), where K denotes the secret key. The encrypted data Ie is then passed to Charlie, who simply forwards it to Bob. Upon receiving Ie, Bob sequentially performs decryption and decompression to get a reconstructed image I. Even though the above Compression-then-Encryption (CTE) paradigm meets the requirements in many secure transmission scenarios, order to applying the compression and encryption needs to be reversed in some other situations. As the content owner, always Alice is interested in protecting the privacy of the image data through encryption. Nevertheless, Alice has to be no incentive to compress data, and will not use her limited computational resources to run a compression algorithm before encrypting the data, especially true when Alice uses a resourcedeprived mobile device. In the contrast, channel provider Charlie has an overriding interest in compressing all the network traffic so as to maximize the network utilization. Therefore much desired if the compression task can be Harmanpreet Kaur Aujla et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (6) , 2014, 7784-7788

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Performance Comparison of Daubechies, Biorthogonal and Haar Transform for Grayscale Image Compression

Image compression is process to remove the redundant information from the image so that only essential information are stored the storage size, transmission bandwidth and transmission time. In this paper comparative analysis of gray scale image compression is done by three different methods that are Daubechies Transform, Haar Transform and Biorthogonal Transform. Experimental results demonstrat...

متن کامل

Implementation of Image Compression using fast Wavelet Transform using HAAR and Daubechies Wavelets

Image compression is the application of Data compression on digital images. The objective of image compression is to reduce redundancy of the image data in order to be able to store or transmit data in an efficient form. Fast Wavelet Transform (FWT) highlights the benefit of a faster compression and faster processing as compared to DWT with higher compression ratios at the same time and reasona...

متن کامل

Encryption-then-Compression System using Haar and Symlet Wavelet Transform

Image compression is the important task for the medical images. Economic and effective image compression techniques are hardly required to minimize the storage volume of medical database in hospitals as well as maintaining the image quality. But the transmission and storage of such a large data could be a tedious job. There are various methods to encrypt the images while transmission. In this r...

متن کامل

Comparative analysis of DCT, Haar and Daubechies Wavelet for Image Compression

Image compression is a method through which we can reduce the storage space of images, videos which will helpful to increase storage and transmission process’s performance. In image compression, we do not only concentrate on reducing size but also concentrate on doing it without losing quality and information of image. In this paper, we present the comparison of the performance of Discrete cosi...

متن کامل

A Comparative Study of the Performance of Wavelet Decomposition of Images using Kekre's Transform vis-a-vis Haar and Daubechies

In recent years Image and Signal compression have been receiving a lot of attention by scientists and researchers in order to improve storage and transmission capabilities. In this study we have compared the performance of Kekre’s wavelet with other wavelets viz. Haar and Daubechies 2 with respect to energy in the Low-Low (LL ), Low-High (LH) ,High-Low (HL) and High-High (HH) bands. The energy ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014