Secured Lossy Color Image Compression Using Permutation and Predictions

Full Text (PDF, 1415KB), PP.29-36

Views: 0 Downloads: 0

Author(s)

S.Shunmugan 1,* Arockia Jansi Rani .P 1

1. Dept. of Computer Science and Engineering, Manonmaniam Sundaranar University, Tirunelveli

* Corresponding author.

DOI: https://doi.org/10.5815/ijigsp.2017.06.04

Received: 2 Mar. 2017 / Revised: 6 Apr. 2017 / Accepted: 11 May 2017 / Published: 8 Jun. 2017

Index Terms

HOP, Huffman Compression, Encryption, Permutation, Rigid data, Elastic data

Abstract

Due to rapid growth in image sizes, an alternate of numerically lossless coding named visually lossless coding is considered to reduce storage size and lower data transmission. In this paper, a lossy compression method on encrypted color image is introduced with undetectable quality loss and high compression ratio. The proposed method includes the Xinpeng Zhang lossy compression [1], Hierarchical Oriented Prediction (HOP)[2], Uniform Quantization, Negative Sign Removal, Concatenation of 7-bit data and Huffman Compression. The encrypted image is divided into rigid and elastic parts. The Xinpeng Zhang elastic compression is applied on elastic part and HOP is applied on rigid part. This method is applied on different test cases and the results were evaluated. The experimental evidences suggest that, the proposed method has better coding performance than the existing encrypted image compressions, with 9.645 % reductions in bit rate and the eye perception is visually lossless.

Cite This Paper

S.Shunmugan, P.Arockia Jansi Rani,"Secured Lossy Color Image Compression Using Permutation and Predictions", International Journal of Image, Graphics and Signal Processing(IJIGSP), Vol.9, No.6, pp.29-36, 2017. DOI: 10.5815/ijigsp.2017.06.04

Reference

[1]Lossy Compression and Iterative Reconstruction for encrypted images, Xinpeng Zhang, IEEE transactions on Information forensics and security, vol. 6, no. 1, March 2011. 

[2]Hierarchical Oriented Predictions for Resolution Scalable Lossless and Near-Lossless Compression of CT and MRI Biomedical Images, Jonathan Taquet and Claude Labit, IEEE transactions on Image processing, vol. 21, no. 5, May 2012.

[3]Image Compression and Encryption: An Overview, Abdul Razzaque, PG Scholar and Dr. Nileshsingh V. Thakur, Associate Professor, Department of Computer Science and Engg, RCOEM, Nagpur, India, International Journal of Engineering Research & Technology (IJERT) Vol. 1 Issue 5, July - 2012 ISSN: 2278-0181.

[4]An in intelligent text data encryption and compression for high speed and secure data transmission over internet, Dr. V.K. Govindan, B.S. Shajee mohan, Prof. & Head CSED, NIT Calicut, Kerala ,Assistant Prof.,CSED, L.B.S.C.E., Kasaragod, Kerala.

[5]Maninder Kaur, “A review paper on a secure image encryption-then compression system using wavelet via prediction error clustering and random permutation”, International journal of engineering sciences & research technology, vol. 4, pp. 570-574, Apr 2015.

[6]Shuqun Zhang and Mohammed A. Karim, “Color image encryption using double random phase encoding ”Microwave and optical technology letters” Vol. 21, No. 5, June 5 1999, 318-322.

[7]Theory & Practice James Kelley and Roberto Tamassia Dept. of Computer Science, Brown University March 12, 2014

[8]S. S. Maniccam, and N. G. Bourbakis ―SCAN Based Lossless Image Compression and Encryption‖ IEEE 0-7695-0446-9/99, pp. 490-499, 1999 

[9]Masanori Ito, Noboru Ohnishi, Ayman Alfalou and Ali Mansour, ―New Image Encryption And Compression Method Based On Independent Component Analysis‖, IEEE, 2007 

[10]V.Radha, D.Maheswari, ―Secured Compound Image Compression Using Encryption Techniques‖, 978-1-4244-5967-4/ IEEE 2010 

[11]Wei Liu, Wenjun Zeng, Lina Dong and Qiuming Yao, ―Resolution-progressive Compression of Encrypted Grayscale Images‖, University of Missouri, Columbia MO 65211, USA, 2007.

[12]Shreedhar BM, Vishal IL, Hemavathi N “Image Encryption-Then-Compression System via Prediction Error Clustering and lossless encoding” International Journal of Innovative Research in Information Security (IJIRIS), vol 4, pp. 33-39, Apr 2015.

[13]D.Ranjani and G.Selvavinayagem “Improving Efficiency in Image Encryption Then Compression System”, International Journal for Research in Applied Science & Engineering Technology (IJRASET), vol 3, pp. 359-363, Mar 2015.

[14]Shih-Ching Ou · Hung-Yuan Chung · Wen-Tsai Sung “Improving the compression and encryption of images using FPGA-based cryptosystems”, Springer, Multimed Tools, vol 5, pp 22-27, Apr 2006.

[15]B.C.Prudhvi Teja, M.Venkatesh Naik, “ A New Approach Of Image Compression - Encryption System Based On Optimal Value Transfer”, International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE), vol, 16, pp. 43-45, July 2015.

[16]Diego Santa cruz, and TouradjEbrahimi “An Analytical study of JPEG 2000 Functionalities” IEEE transactions on Image processing, vol.2, pp.49-52,Sep 2000.

[17]On compressing encrypted Data, Mark Johnson and Daniel Schonberg, IEEE transactions on signal processing, vol. 52, No.10, October 2004.