International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Research Paper | Electronics & Communication Engineering | India | Volume 2 Issue 12, December 2013

Image Encryption and Iterative Reconstruction of an Encrypted Image

N. Nagaraja Kumar, M. Sucharitha

Encryption is one of the ways to ensure high security for real time applications. In advanced Encryption and data-hiding, Encryption is done only on primary part of image and remaining part is sent as a plain image for secure data communication.A channel provider without the knowledge of a cryptographic key and original content may tend to reduce the data amount due to the limited channel resource. After encoding and on compression of encrypted data into a down sampled sub image and several data sets with a multiple-resolution construction, an encoder quantizes the sub image and the Hadamard-coefficients of each data set are obtained which tend to reduce the data amount. Obtained set of bit streams can be used to reconstruct the detailed content with an iteratively updating procedure and then decryption of data is performed. Because of this iteratively updating coding procedure, the principal original content with higher resolution can be reconstructed when more bit streams are received.

Keywords: Encryption, Cryptographic key, Bit-streams, Hadamard transform

Edition: Volume 2 Issue 12, December 2013

Pages: 250 - 255


How to Cite this Article?

N. Nagaraja Kumar, M. Sucharitha, "Image Encryption and Iterative Reconstruction of an Encrypted Image", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=02013627, Volume 2 Issue 12, December 2013, 250 - 255

25 PDF Views | 24 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Encryption'

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 3, March 2014

Pages: 642 - 645

Low Power and Area Optimized VHDL Implementation of AES

Suja Chackochan, K. Mathan

Share this article

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1062 - 1066

Detect and Correct Single Event Upset of the AES Algorithm in On Board Satellite

Md. Riyaj, Vipin Gupta

Share this article

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1350 - 1355

Implementation, Simulation and Synthesis of RSA Cryptosystem

Rafeek Alas, Dr. Kiran Bailey

Share this article

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2484 - 2492

Implementation of AES Algorithm Using FPGA & Its Performance Analysis

Sonali A. Varhade, N. N. Kasat

Share this article

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 5, May 2015

Pages: 3221 - 3230

Implementation of RSA Cryptosystem Using Ancient Indian Vedic Mathematics

Shahina M. Salim, Sonal A. Lakhotiya

Share this article

Similar Articles with Keyword 'Cryptographic key'

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 3 Issue 3, March 2014

Pages: 382 - 388

Advanced Security Control for Auto Theft Prevention System

Sucitha.S, Punithavathy Mohan, Vallikannu.A.L

Share this article

Research Paper, Electronics & Communication Engineering, India, Volume 2 Issue 8, August 2013

Pages: 377 - 381

Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA

Chityala Prathyusha, P. Sharmila Rani

Share this article

Research Paper, Electronics & Communication Engineering, India, Volume 2 Issue 12, December 2013

Pages: 250 - 255

Image Encryption and Iterative Reconstruction of an Encrypted Image

N. Nagaraja Kumar, M. Sucharitha

Share this article

Top