etc

19
Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation Under the guide Miss.Selvalakshmi Msc.,M.Phil., Submitted By P.Iswarya Lakshmi Regno:1163665

Upload: venkatsrmv

Post on 11-Jan-2016

213 views

Category:

Documents


1 download

DESCRIPTION

Encrypt

TRANSCRIPT

Page 1: Etc

Designing an Efficient Image Encryption-Then-Compression System

via Prediction Error Clustering and Random Permutation

Under the guideMiss.Selvalakshmi Msc.,M.Phil.,

Submitted ByP.Iswarya Lakshmi

Regno:1163665

Page 2: Etc

Abstract In many practical scenarios, image encryption has to be conducted prior to image compression. This has led to the problem

of how to design a pair of image encryption and compression algorithms such that compressing the encrypted images can

still be efficiently performed. In this process a highly efficient image encryption-then-compression (ETC) system.

The proposed image encryption scheme operated in the prediction error domain is shown to be able to provide a reasonably

high level of security and also demonstrate that an arithmetic coding-based approach can be exploited to efficiently

compress the encrypted images.

In this present the details of the three key components in our proposed ETC system, namely, image encryption conducted

by Alice, image compression conducted by Charlie, and the sequential decryption and decompression conducted by Bob.

From the perspective of the whole ETC system, the design of the encryption algorithm should simultaneously consider the

security and the ease of compressing the encrypted data.

Page 3: Etc

Existing System Compression-then-Encryption (CTE) paradigm meets the requirements in many secure

transmission scenarios, the order of applying the compression and encryption needs to be

reversed in some other situations.

As the content owner, Sender is always interested in protecting the privacy of the image data

through encryption.

Sender has no incentive to compress her data, and hence, will not use her limited

computational resources to run a compression algorithm before encrypting the data.

This is especially true when Sender uses a resource-deprived mobile device. In contrast, the

channel provider Intermediate has an overriding interest in compressing all the network traffic

so as to maximize the network utilization.

Page 4: Etc

Proposed System In this proposed system process with encryption then compression to share data.

In this proposed system to encrypted military information after images compress the

result.

A modified basis pursuit algorithm can then be applied to estimate the original

image from the compressed and encrypted data.

Encrypted file can be efficiently compressed by discarding the excessively rough

and fine information of coefficients in the transform domain.

Page 5: Etc

EZW Algorithm The embedded zero tree wavelet algorithm (EZW) is a simple, yet remarkable effective,

image compression algorithm.

The bits in the bit stream are generated in order of importance, yielding a fully

embedded code.

The same image that would have been encoded at the bit rate corresponding to the

truncated stream.

The block information for every block to be encoded in EZW algorithm.

Page 6: Etc

Architecture Diagram

Page 7: Etc

Data Flow Diagram

ETC Context level Diagram

Page 8: Etc

DFD level 0

Data Flow Diagram

Page 9: Etc

DFD level 1

DFD level 2

Data Flow Diagram

Page 10: Etc

DFD level 3

DFD level 4

Data Flow Diagram

Page 11: Etc

DFD level 5

DFD level 6

Data Flow Diagram

Page 12: Etc

Modules Preprocessing

Cluster division

Prediction Error and randomization

Image Encryption

Image encryption with Data

Image Compression

Result

Decompression

Decrypt Data

Page 13: Etc

Cluster division

The pre processing image to be cluster into more than a few parts.  

It basically creates a matrix of images and draws on

each Bitmap adequate part of the large image.

The same concept could use for the picture boxes and put them in

the matrix. The picture box image split and places it.

Page 14: Etc

Prediction Error and randomizationImage before encryption the prediction error will be test on the pretest

image to be able to provide a reasonably high level of security.

Split the image into rows then put those into a queue on the picture

boxes. Work on each row with individual picture boxes.

Add each image to a collection and persist the collection when all the

items are completed in the queue then randomization.

Page 15: Etc

Image encryption with Data In the present data hiding at the sender side. These parts are constructed and implemented to satisfy

the algorithm must reduce the chances of statistical detection. 

The algorithm must provide robustness against a variety of image manipulation attacks. The stego-

image must not have any distortion artifacts. The algorithm must embedding capacity in order to

achieve the above requirements.

The images will be encrypt with data using the practice of hiding private or sensitive information

within something that appears to be nothing out to the usual way that are used to protect important

information.

Human senses are not trained to look for files that have information inside of them but visible only

image.

Page 16: Etc

Image Compression Wavelet based on compression provides a very effective technique for military images. Military

image requires storage of large quantity of secret data. Due to the high bandwidth and capacity of

storage, military image must be compressed before transmission.

There are two categories for compression Lossy and Lossless method. Lossless compression

ensures complete data after reconstruction. In application of Lossy technique information is loss to

some degree. A popular method of image compression, namely, the embedded zero tree wavelet

(EZW).

The proposed image compression algorithm outperforms the EZW(embedded zero tree

wavelet) .The compression of an encrypted image with flexible compression ratio.

Page 17: Etc

Result The receivers receive the encrypted image and the using decompresses the image after

to decrypt to get the original data.

Page 18: Etc

Hardware Requirements

System : Dual core.

Hard Disk : 160 GB.

Monitor : 15 VGA Colour.

Mouse : Logitech.

Ram : 1 GB.

Software Requirements

Operating system : Windows XP/7.

Coding Language : C#.net

Tool : Visual Studio 2005

Database : SQL SERVER 2005

System Requirements

Page 19: Etc