scispace - formally typeset
Search or ask a question
Author

P. G. Student

Bio: P. G. Student is an academic researcher. The author has contributed to research in topics: Image compression & Color image. The author has an hindex of 1, co-authored 1 publications receiving 1 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: This paper focuses on new concept that first encrypt the given original color image then compress the encrypted image using lossy compression technique without any error and without degrading the quality of natural image.
Abstract: 2 Abstract: For secure communication, original data may convert into unintelligent format. Encryption technique is used for converting plain data into scrambled message. Since, as a channel provider, for secure communication, may tend to compress the encrypted data due to limited channel resource. As a traditional data processing for privacy usually takes place before encryption or after decryption. This paper focuses on new concept that first encrypt the given original color image then compress the encrypted image using lossy compression technique without any error and without degrading the quality of natural image. The original color image can be encrypted using standard image encryption technique and then perform lossy compression operation on encrypted image. At receiver end user can recover the original content without any error by performing decryption operation to recover original image.

1 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: In this article, a combination of compression and cryptographic technologies in a single process either partially or in the form of compressive sensing(CS) provides a good data safety assurance with such a low computational complexity that it is eligible for enhancing the efficiency and security of data/information transmission.
Abstract: In line with a growing need for data and information transmission in a safe and quick manner, researches on image protection and security through a combination of cryptographic and compression techniques begin to take form. The combination of these two methods may include into three categories based on their process sequences. The first category, i.e. cryptographic technique followed by compression method, focuses more on image security than the reduction of a size of data. The second combination, compression technique followed by the cryptographic method, has an advantage where the compression technique can be lossy, lossless, or combination of both. The third category, i.e. compression and cryptographic technologies in a single process either partially or in the form of compressive sensing(CS) provides a good data safety assurance with such a low computational complexity that it is eligible for enhancing the efficiency and security of data/information transmission.

32 citations