International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 111

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 6, June 2016


DCT Image Compression and Secure Deduplication with Efficient Convergent Key Management

Soofiya MS | Sreetha V Kumar


Abstract: As our use and reliance of computer grows day by day we need an efficient way to manage our large amount of data. Sometimes a person has to use large amount of images like webpages or catalogs need to use some techniques for image compression. This is because the amount of space required to hold large amount of image can be prohibitively large in terms of cost. Fortunately we have several method of image compression available today. Discrete Cosine Transform separates images into parts of different frequencies. In a step called quantization in DCT the less important frequencies are discarded. Then for decompression process only most important frequencies are considered to recover the image. Management of large amount of data has become one of the greatest problem in todays cloud storage services. For data management a technique called Deduplication is introduced. Deduplication avoids duplicate copies being stored in the cloud. Convergent encryption is an efficient way to enforce deduplication. But the problem in making convergent encryption possible is the management of large number of keys. To this end for the management of keys we propose a new technique called Dekey. We implement Dekey using visual cryptography. This paper proposes Dekey for convergent key management, DCT image compression for minimizing storage space and for improving security and deduplication for avoiding redundant copies.


Keywords: DCT image compression, Deduplication, Dekey, convergent encryption, visual cryptography


Edition: Volume 5 Issue 6, June 2016,


Pages: 1491 - 1494


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Soofiya MS, Sreetha V Kumar, "DCT Image Compression and Secure Deduplication with Efficient Convergent Key Management", International Journal of Science and Research (IJSR), Volume 5 Issue 6, June 2016, pp. 1491-1494, https://www.ijsr.net/get_abstract.php?paper_id=NOV164473

Similar Articles with Keyword 'Deduplication'

Downloads: 101

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1812 - 1814

A Survey on Deduplication Scheme in Cloud Storage

Deepa.D | Revathi.M [3]

Share this Article

Downloads: 101

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1685 - 1688

An Advanced Data De-duplication Using Novel Variable Size Hashing Technique for Text Files Using Hybrid Cloud Architecture

Haritha Nair | Varsha Botre | Hina Khan | Pritee Nalage | Hiranwale S.B.

Share this Article
Top