International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 108

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014


A Survey on Efficient ETC (Encryption-Then-Compression) Techniques for Image Data Security

Ganesh Lamkhade | Ajay Kumar Gupta [3]


Abstract: As of now, many image encryption and compression techniques have been emerged to provide security to the data in the images, but still image encryption is to be carried out prior to the image compression. This creates a problem of how to synchronize both these operations so that compression of the Encrypted images is done with maximum efficiency. In this paper we analyze various techniques emerged for Encryption then Compression process and ultimately design a new and efficient technique that provides maximum efficiency in terms of encryption as well as in terms of compression.


Keywords: Encryption, Compression, Error Prediction, Security, Image Processing


Edition: Volume 3 Issue 12, December 2014,


Pages: 1830 - 1833


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Ganesh Lamkhade, Ajay Kumar Gupta, "A Survey on Efficient ETC (Encryption-Then-Compression) Techniques for Image Data Security", International Journal of Science and Research (IJSR), Volume 3 Issue 12, December 2014, pp. 1830-1833, https://www.ijsr.net/get_abstract.php?paper_id=SUB14837

Similar Articles with Keyword 'Encryption'

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena [3] | A. Komathi [2]

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022

Pages: 654 - 659

Image Encryption using (k, n) Secret Sharing Scheme using Lagrange Polynomial

GVSS Jayanth Anish

Share this Article
Top