Downloads: 108 | Views: 122
Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015
A Survey Work on ETC System for an Efficient Image Encryption and Compression
Gauri Chavan [3] | Prashant Kumbharkar [2]
Abstract: After different practical approaches performed, encryption of images being sent is a necessity to ensure the security before the compression of image. But how to design an image encryption and after that image compression algorithms so that the compression image does not become a hectic issue. This work surveys the various encryption-then-compression (ETC) system of image, which considers both the lossless and the lossy compression mechanisms. In the proposed system, the image encryption scheme will be operated by using AES algorithm which provides ample of security to the images or other data files as well. And with the AES, arithmetic approach is more efficient for better compression of encrypted images. In terms of compression efficiency, it is somewhat inconvenient as Huffman algorithm based approach is not so suitable, as it provides very less compression ratio, than the advanced lossless/lossy coders of image as inputs, which take intrinsic or unencrypted images.
Keywords: component, formatting, style, styling, insert
Edition: Volume 4 Issue 11, November 2015,
Pages: 2033 - 2036
Similar Articles with Keyword 'component'
Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2246 - 2249Packet Analysis with Network Intrusion Detection System
Rashmi Hebbar | Mohan K [15]
Downloads: 2
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar | Purnima Selokar [2]