Downloads: 111 | Views: 228
Research Paper | Computer Science & Engineering | India | Volume 5 Issue 6, June 2016 | Popularity: 6.7 / 10
DCT Image Compression and Secure Deduplication with Efficient Convergent Key Management
Soofiya MS, Sreetha V Kumar
Abstract: As our use and reliance of computer grows day by day we need an efficient way to manage our large amount of data. Sometimes a person has to use large amount of images like webpages or catalogs need to use some techniques for image compression. This is because the amount of space required to hold large amount of image can be prohibitively large in terms of cost. Fortunately we have several method of image compression available today. Discrete Cosine Transform separates images into parts of different frequencies. In a step called quantization in DCT the less important frequencies are discarded. Then for decompression process only most important frequencies are considered to recover the image. Management of large amount of data has become one of the greatest problem in todays cloud storage services. For data management a technique called Deduplication is introduced. Deduplication avoids duplicate copies being stored in the cloud. Convergent encryption is an efficient way to enforce deduplication. But the problem in making convergent encryption possible is the management of large number of keys. To this end for the management of keys we propose a new technique called Dekey. We implement Dekey using visual cryptography. This paper proposes Dekey for convergent key management, DCT image compression for minimizing storage space and for improving security and deduplication for avoiding redundant copies.
Keywords: DCT image compression, Deduplication, Dekey, convergent encryption, visual cryptography
Edition: Volume 5 Issue 6, June 2016
Pages: 1491 - 1494
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 101
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 1054 - 1058Colour Extended Visual Cryptography based on MKGED
T. Anuradha, Dr. K. Usha Rani
Downloads: 101
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1812 - 1814A Survey on Deduplication Scheme in Cloud Storage
Deepa.D, Revathi.M
Downloads: 101
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1526 - 1530A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention
Anju Mohan
Downloads: 101
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016
Pages: 1685 - 1688An Advanced Data De-duplication Using Novel Variable Size Hashing Technique for Text Files Using Hybrid Cloud Architecture
Haritha Nair, Varsha Botre, Hina Khan, Pritee Nalage, Hiranwale S.B.
Downloads: 105
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1696 - 1700Data Security Policies in Cloud: A Survey
Kasundra Punitkumar R., Shikha J. Pachouly