Image Encryption and Iterative Reconstruction of an Encrypted Image
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064


Amazon Sale


Research Paper | Electronics & Communication Engineering | India | Volume 2 Issue 12, December 2013

Image Encryption and Iterative Reconstruction of an Encrypted Image

N. Nagaraja Kumar, M. Sucharitha

Encryption is one of the ways to ensure high security for real time applications. In advanced Encryption and data-hiding, Encryption is done only on primary part of image and remaining part is sent as a plain image for secure data communication.A channel provider without the knowledge of a cryptographic key and original content may tend to reduce the data amount due to the limited channel resource. After encoding and on compression of encrypted data into a down sampled sub image and several data sets with a multiple-resolution construction, an encoder quantizes the sub image and the Hadamard-coefficients of each data set are obtained which tend to reduce the data amount. Obtained set of bit streams can be used to reconstruct the detailed content with an iteratively updating procedure and then decryption of data is performed. Because of this iteratively updating coding procedure, the principal original content with higher resolution can be reconstructed when more bit streams are received.

Keywords: Encryption, Cryptographic key, Bit-streams, Hadamard transform

Edition: Volume 2 Issue 12, December 2013

Pages: 250 - 255

Share this Article

How to Cite this Article?

N. Nagaraja Kumar, M. Sucharitha, "Image Encryption and Iterative Reconstruction of an Encrypted Image", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=02013627, Volume 2 Issue 12, December 2013, 250 - 255

63 PDF Views | 56 PDF Downloads

Download Article PDF


Amazon Sale


Similar Articles with Keyword 'Encryption'

Review Papers, Electronics & Communication Engineering, India, Volume 5 Issue 3, March 2016

Pages: 1551 - 1554

A Review on Implementation of Cryptographic Method for Secure Audio Data Hiding in Digital Images

Pranjali Ihare, V. T. Gaikwad

Share this Article

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 3 Issue 11, November 2014

Pages: 779 - 782

High Speed Advanced Encryption Standard Using Pipelining

Mradul Upadhyay, Utsav Malviya

Share this Article

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1791 - 1793

Image Encryption-Then-Compression System Operated in the Prediction Error Domain and Random Permutation

Sujatha D, Venkatakiran S

Share this Article

Review Papers, Electronics & Communication Engineering, India, Volume 4 Issue 10, October 2015

Pages: 2080 - 2083

Separable Reversible Data Hiding ? A Review

Suyash Sharma, Jaipal Bisht

Share this Article

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1865 - 1868

DPA Resistant AES Using a True Random Based LFSR Technique

Reenu Tomy, Vinoj P.G.

Share this Article

Similar Articles with Keyword 'Cryptographic key'

Research Paper, Electronics & Communication Engineering, India, Volume 2 Issue 12, December 2013

Pages: 250 - 255

Image Encryption and Iterative Reconstruction of an Encrypted Image

N. Nagaraja Kumar, M. Sucharitha

Share this Article

Research Paper, Electronics & Communication Engineering, India, Volume 2 Issue 8, August 2013

Pages: 377 - 381

Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA

Chityala Prathyusha, P. Sharmila Rani

Share this Article

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 3 Issue 3, March 2014

Pages: 382 - 388

Advanced Security Control for Auto Theft Prevention System

Sucitha.S, Punithavathy Mohan, Vallikannu.A.L

Share this Article
Top