A Survey Work on ETC System for an Efficient Image Encryption and Compression
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 106 | Weekly Hits: ⮙3 | Monthly Hits: ⮙8

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015

A Survey Work on ETC System for an Efficient Image Encryption and Compression

Gauri Chavan, Prashant Kumbharkar

After different practical approaches performed, encryption of images being sent is a necessity to ensure the security before the compression of image. But how to design an image encryption and after that image compression algorithms so that the compression image does not become a hectic issue. This work surveys the various encryption-then-compression (ETC) system of image, which considers both the lossless and the lossy compression mechanisms. In the proposed system, the image encryption scheme will be operated by using AES algorithm which provides ample of security to the images or other data files as well. And with the AES, arithmetic approach is more efficient for better compression of encrypted images. In terms of compression efficiency, it is somewhat inconvenient as Huffman algorithm based approach is not so suitable, as it provides very less compression ratio, than the advanced lossless/lossy coders of image as inputs, which take intrinsic or unencrypted images.

Keywords: component, formatting, style, styling, insert

Edition: Volume 4 Issue 11, November 2015

Pages: 2033 - 2036

Share this Article

How to Cite this Article?

Gauri Chavan, Prashant Kumbharkar, "A Survey Work on ETC System for an Efficient Image Encryption and Compression", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV151600, Volume 4 Issue 11, November 2015, 2033 - 2036

Enter Your Registered Email Address





Similar Articles with Keyword 'component'

Downloads: 40 | Weekly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Downloads: 40

Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020

Pages: 1544 - 1554

Recent Developments on Probabilistic Graphical Model Applied in Data Analysis

Kan'Sam Nadjak, Guisheng Yin

Share this Article

Downloads: 100 | Monthly Hits: ⮙8

Research Paper, Computer Science & Engineering, Ghana, Volume 4 Issue 2, February 2015

Pages: 2448 - 2452

Reliable and Rapid Routing Configurations for Network Recovery

William Asiedu K. O. Boateng

Share this Article

Downloads: 100 | Weekly Hits: ⮙1 | Monthly Hits: ⮙8

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016

Pages: 1965 - 1968

Understanding Dependencies and Analyze Dependencies with DDR Algorithm

Vimal Don Bosco S, Dr. Latha R

Share this Article

Downloads: 101 | Weekly Hits: ⮙4 | Monthly Hits: ⮙7

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2019 - 2024

Example Based Color Transfer with Corruptive Artifacts Suppression

Nasreen Pottammel

Share this Article

Similar Articles with Keyword 'formatting'

Downloads: 106 | Weekly Hits: ⮙3 | Monthly Hits: ⮙8

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2033 - 2036

A Survey Work on ETC System for an Efficient Image Encryption and Compression

Gauri Chavan, Prashant Kumbharkar

Share this Article

Downloads: 111 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1720 - 1723

Text Steganography using Helping Verbs

Rahul Sanwal, Rishabh Jain

Share this Article

Downloads: 116 | Weekly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1747 - 1752

Mining Service Using Ontology Learning

R. Santhosh Gowtham, S. J. Vivekanandan

Share this Article

Similar Articles with Keyword 'style'

Downloads: 36 | Weekly Hits: ⮙3

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1789 - 1791

The Survey Paper on Importance of Integration of Knowledge Management and Business Intelligence

Vina Lomte, Saloni Shah

Share this Article

Downloads: 100 | Weekly Hits: ⮙3 | Monthly Hits: ⮙12

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 747 - 749

A Survey of Friendbook Recommendation Services

Pankaj L. Pingate, S. M. Rokade

Share this Article

Downloads: 105 | Weekly Hits: ⮙2 | Monthly Hits: ⮙12

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1952 - 1955

Ultra Wideband on High Speed Wireless Personal Area Networks

A. S. Syed Navaz, G. M. Kadhar Nawaz

Share this Article

Downloads: 105 | Weekly Hits: ⮙3

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1111 - 1114

Survey on EMI: Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage

Shilpa Singh, Padmavathi B.

Share this Article

Downloads: 105 | Weekly Hits: ⮙1 | Monthly Hits: ⮙6

Comparative Studies, Computer Science & Engineering, India, Volume 7 Issue 9, September 2018

Pages: 1312 - 1314

A Comparison of Streaming Sensory Data Transfer Methods in Remote Processing Environment

Arush Nagpal, Prashant Singh Rana

Share this Article

Similar Articles with Keyword 'insert'

Downloads: 99 | Weekly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 988 - 991

Filtering Unwanted Post from Online Social Networking (OSN) Sites

Sachin P. Vidhate, Syed Akhter

Share this Article

Downloads: 102 | Weekly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2269 - 2272

Detecting Malicious Nodes for Secure Route Discovery in MANETs

Zalte S. S., Dr. Ghorpade V. R.

Share this Article

Downloads: 105 | Weekly Hits: ⮙1 | Monthly Hits: ⮙9

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2526 - 2529

A Survey on Problems Faced in Identification of Malicious Data Insertion in Wireless Sensor Networks and Rectification of It

Rohini Divase, S. N. Kini

Share this Article

Downloads: 106 | Monthly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 242 - 245

An Approach to Detect and Prevent SQL Injection Attacks using Web Service

Shabnam R. Makanadar, Vaibhav V. Solankurkar

Share this Article

Downloads: 106 | Weekly Hits: ⮙3 | Monthly Hits: ⮙8

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2033 - 2036

A Survey Work on ETC System for an Efficient Image Encryption and Compression

Gauri Chavan, Prashant Kumbharkar

Share this Article



Top