ISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies

Similar documents
A Modified Image Template for FELICS Algorithm for Lossless Image Compression

A New Compression Method for Encrypted Images

PERFORMANCE EVALUATION OFADVANCED LOSSLESS IMAGE COMPRESSION TECHNIQUES

International Journal of Advance Research in Computer Science and Management Studies

ISSN: Seema G Bhateja et al, International Journal of Computer Science & Communication Networks,Vol 1(3),

Reversible Data Hiding in Encrypted color images by Reserving Room before Encryption with LSB Method

Comparative Analysis of Lossless Image Compression techniques SPHIT, JPEG-LS and Data Folding

LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE THE METHOD

Artifacts and Antiforensic Noise Removal in JPEG Compression Bismitha N 1 Anup Chandrahasan 2 Prof. Ramayan Pratap Singh 3

ISSN: [Khan* et al., 7(8): August, 2018] Impact Factor: 5.164

Reversible Data Hiding in Encrypted Images based on MSB. Prediction and Huffman Coding

Removal of High Density Salt and Pepper Noise through Modified Decision based Un Symmetric Trimmed Median Filter

Coding and Analysis of Cracked Road Image Using Radon Transform and Turbo codes

A SURVEY ON DICOM IMAGE COMPRESSION AND DECOMPRESSION TECHNIQUES

A Lossless Image Compression Based On Hierarchical Prediction and Context Adaptive Coding

Local prediction based reversible watermarking framework for digital videos

Performance Evaluation of H.264 AVC Using CABAC Entropy Coding For Image Compression

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS

The Scientist and Engineer's Guide to Digital Signal Processing By Steven W. Smith, Ph.D.

Comparative Analysis of WDR-ROI and ASWDR-ROI Image Compression Algorithm for a Grayscale Image

High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction

Segmentation Based Image Scanning

[Srivastava* et al., 5(8): August, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

Level-Successive Encoding for Digital Photography

Multimedia Communications. Lossless Image Compression

A Novel Approach of Compressing Images and Assessment on Quality with Scaling Factor

VISUAL CRYPTOGRAPHY for COLOR IMAGES USING ERROR DIFFUSION AND PIXEL SYNCHRONIZATION

COMPRESSION OF SENSOR DATA IN DIGITAL CAMERAS BY PREDICTION OF PRIMARY COLORS

An Implementation of LSB Steganography Using DWT Technique

REVIEW OF IMAGE COMPRESSION TECHNIQUES FOR MULTIMEDIA IMAGES

Meta-data based secret image sharing application for different sized biomedical

Reversible Watermarking on Histogram Pixel Based Image Features

Keywords Fuzzy Logic, ANN, Histogram Equalization, Spatial Averaging, High Boost filtering, MSE, RMSE, SNR, PSNR.

Lossless Image Compression Techniques Comparative Study

FPGA implementation of DWT for Audio Watermarking Application

MOST modern digital cameras allow the acquisition

Lossy and Lossless Compression using Various Algorithms

Robust Invisible QR Code Image Watermarking Algorithm in SWT Domain

REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING

Images with (a) coding redundancy; (b) spatial redundancy; (c) irrelevant information

An Enhanced Least Significant Bit Steganography Technique

Compression and Image Formats

2.1. General Purpose Run Length Encoding Relative Encoding Tokanization or Pattern Substitution

Audio Signal Compression using DCT and LPC Techniques

Image Compression Based on Multilevel Adaptive Thresholding using Meta-Data Heuristics

Lossy Image Compression Using Hybrid SVD-WDR

REVERSIBLE data hiding, or lossless data hiding, hides

A Rumination of Error Diffusions in Color Extended Visual Cryptography P.Pardhasaradhi #1, P.Seetharamaiah *2

Performance Evaluation of Floyd Steinberg Halftoning and Jarvis Haltonong Algorithms in Visual Cryptography

Unit 1.1: Information representation

Tri-mode dual level 3-D image compression over medical MRI images

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies

Commutative reversible data hiding and encryption

A Steganography Algorithm for Hiding Secret Message inside Image using Random Key

Speeding up Lossless Image Compression: Experimental Results on a Parallel Machine

Teaching Scheme. Credits Assigned (hrs/week) Theory Practical Tutorial Theory Oral & Tutorial Total

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

SYLLABUS CHAPTER - 2 : INTENSITY TRANSFORMATIONS. Some Basic Intensity Transformation Functions, Histogram Processing.

ISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-11,

Image Compression Using Huffman Coding Based On Histogram Information And Image Segmentation

Keywords Medical scans, PSNR, MSE, wavelet, image compression.

Comparison of Various Error Diffusion Algorithms Used in Visual Cryptography with Raster Scan and Serpentine Scan

A new quad-tree segmented image compression scheme using histogram analysis and pattern matching

Literature Survey on Image Manipulation Detection

Enhanced Efficient Halftoning Technique used in Embedded Extended Visual Cryptography Strategy for Effective Processing

Pooja Rani(M.tech) *, Sonal ** * M.Tech Student, ** Assistant Professor

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning

MEDICAL X-RAY 2D AND 3D IMAGE VIEWER:ROLE FOR THE MEDICAL IMAGE IN DICOM STANDARD

CHAPTER 6: REGION OF INTEREST (ROI) BASED IMAGE COMPRESSION FOR RADIOGRAPHIC WELD IMAGES. Every image has a background and foreground detail.

Retrieval of Large Scale Images and Camera Identification via Random Projections

Hybrid Coding (JPEG) Image Color Transform Preparation

Analysis of Secure Text Embedding using Steganography

Comparison of Visual Cryptographic Algorithms for Quality Images Using XOR

Performance Improving LSB Audio Steganography Technique

SPIHT Algorithm with Huffman Encoding for Image Compression and Quality Improvement over MIMO OFDM Channel

Efficient Image Compression Technique using JPEG2000 with Adaptive Threshold

International Conference on Advances in Engineering & Technology 2014 (ICAET-2014) 48 Page

Video, Image and Data Compression by using Discrete Anamorphic Stretch Transform

Improvement of Classical Wavelet Network over ANN in Image Compression

IJSRD - International Journal for Scientific Research & Development Vol. 4, Issue 01, 2016 ISSN (online):

Secret Sharing Image Between End Users by using Cryptography Technique

HYBRID MEDICAL IMAGE COMPRESSION USING SPIHT AND DB WAVELET

Reversible Data Hiding in JPEG Images Based on Adjustable Padding

Evaluation of Visual Cryptography Halftoning Algorithms

INSTITUTE OF AERONAUTICAL ENGINEERING Dundigal, Hyderabad

2. REVIEW OF LITERATURE

A New Secure Image Steganography Using Lsb And Spiht Based Compression Method M.J.Thenmozhi 1, Dr.T.Menakadevi 2

Image Compression Supported By Encryption Using Unitary Transform

Improvement in DCT and DWT Image Compression Techniques Using Filters

Module 6 STILL IMAGE COMPRESSION STANDARDS

Image Compression Technique Using Different Wavelet Function

The Strengths and Weaknesses of Different Image Compression Methods. Samuel Teare and Brady Jacobson

Image Rendering for Digital Fax

New Lossless Image Compression Technique using Adaptive Block Size

Ch. 3: Image Compression Multimedia Systems

Enhanced DCT Interpolation for better 2D Image Up-sampling

A Hybrid Technique for Image Compression

A Modified Image Coder using HVS Characteristics

Objective Evaluation of Edge Blur and Ringing Artefacts: Application to JPEG and JPEG 2000 Image Codecs

Prediction based Lossless compression scheme for Bayer color filter array image

Transcription:

ISSN: 2321-7782 (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com Image Encryption And Compression Using Prediction Error K- Mean Clustering And Cyclic Permutation Praveen Kumar 1 Assistant Professor CSE Dept CERT Meerut, India Maitreyee Dutta 2 Ph.D Professor & Head, CSE Dept. NITTTR, Chandigarh. India Abstract: In most of applications, encryption of an image is done prior image compression. This create problem of how to design a pair of image encryption and compression algorithms such that compressing the encrypted images can still be effectively performed. In this paper the Author will design a good image encryption-and-compression technique, where lossless and lossy compression is taken into consideration. The suggested image encryption technique is operated in prediction error domain and k-mean clustering with cyclic permutation, this technique is able to provide a reasonably more security. We show that an arithmetic coding-based method can be implemented to efficiently compress the encrypted images. More clearly, the proposed compression method which is applied to encrypted images will be effective in the form of compression efficiency, than the lossless and lossy image encoders, which take actual images as inputs. Keywords- K-Mean Clustering, Cyclic Permutation,, Prediction Error, GAP, PSNR,BPP (Bit Per Pixel). I. INTRODUCTION The major challenge in Encryption-and-Compression system is that compression has to be conducted in the encrypted domain, In the following figure A wants to securily and effectively transmit an image I to a receipient C through a unsecure chhanel provider B.The system of Encryption and Compression system is illustrated in Figure. 1 The processing of encrypted images directly in the encrypted domain has been become more popular[1]-[5] now days First of all it become not feasible for B to compress the encrypted data, since no image structure can be create to enable a conventional compressor. However the stream cipher encrypted data is compressible with the use of coding with external information principles, without compromising either the compression efficiency or security. In addition to the theoretical findings also proposed practical algorithms to losslessly compress the encrypted binary images. II. PREDICTIOIN ERROR Prediction error (PE) measures how well the model is able predict the outcome for new observations not used in developing the prediction model. 2015, IJARCSMS All Rights Reserved 180 P a g e

a) Measures of Prediction Error For each pixel I p,q of the image I to be encrypted, a prediction I p,q is first made by using an image predictor, e.g. GAP [6], according to its causal surroundings. In our work, the GAP is used because its de-correlation capability is excellent. Each prediction error I p,q.is reshape in I p,q by using a feedback process. Then we calculate the prediction error associated with I p,q as follows.. E p,q =I p,q -I p,q...(1) The prediction error E p,q may be any value from [-255,255],that will mapped in a range [0,255] In our proposed method encryption is done in the domain of mapped prediction error E p,q Although for 8-bit images, the prediction error E p,q can potentially take any values in the range [ 255, 255], it can be mapped into the range [0, 255], by considering the fact that the predicted value I p,q is available at the decoder side.our proposed image encryption algorithm is performed over the domain of the mapped prediction error E p,q Instead of treating all the prediction errors as a whole, we divide the prediction errors into L clusters based on a context-adaptive approach. The subsequent randomization and compression will be shown to be benefited from this clustering operation. To this end, an error energy estimator originally proposed in [7] is used as an indicator of the image local activities. More specifically, for each pixel location (p,q ), the error energy estimator is defined by Diff(p,q) = d 1 + d 2 + 2(abs(E p-1, q )) (2) where d 1 =abs(i p-1, q I p-2,q ) +abs(i,p, q-1 I p, q 1 ) +abs(i p, q 1 I p+1,q 1 ) d 2 = abs(i p 1, q I p 1, q 1 ) + abs(i p, q 1 I p, q 2 ) +abs(i p+1, q 1 I p+1, q 2 ) (3) and E p 1, q is the prediction error at location (p 1, q ). III. IMAGE ENCRYPTION USING PREDICTION ERROR K-MEAN CLUSTERING AN CYCLIC PERMUTATION The complete process of encryption of an image is shown in the following figure 2 2015, IJARCSMS All Rights Reserved ISSN: 2321-7782 (Online) 181 P a g e

IV. K-MEAN CLUSTERING K-mean clustering alogorithm contains the following steps: 1. First choose randomly k centroids from the set of data for desired number of clusters 2. Assigning every data object to the cluster with the nearest centroid 3. Update the centroids by computing the mean values of objects in the clusters 4. Repeat step 1,2 and 3 untill termination criteria not found V. ENCRYPTION ALGORITHM The algorithmic procedure of performing the image encryption is then given as follows: Step 1: Calculate all the prediction errors E p,q of the image I. Step 2: Splitting all the prediction errors into L no of clusters i.e. C k for 0 k L 1, where each C k is build by concatenating the mapped prediction errors in the raster-scan manner. Step 3: Resizing the prediction errors in every C k into a two dimensional block which have four columns and abs(c k )/4 rows. Step 4: Applying cyclic shift operations to each output of prediction error block, and read the data in raster-scan manner to obtain the permuted cluster C k. Step 5: The assembler concatenates all the permuted clusters C k for 0 k L 1, and generates the final output encrypted image I e = C 0 C 1 C L 1 (4) where size of each prediction error is 8 bits. Step 6: Provide I e to B, along with the length of each cluster abs(c k) for 0 k L 2.Where B divide Ie into L No of clusters correctly. VI. LOSSLESS COMPRESSION OF ENCRYPTED IMAGE BY ADAPTIVE ARITHMETIC CODING Following figure shows the compression of encrypted image Ie with side information abs(c k) for 0<=k<=L-2, A deassembler can be used to divide Ie in L segments C 0 C 1... C L 1.An adaptive arithmetic coding is applied to lossless coding each prediction error sequence C k into a bit stream S k in parallel manner to increase the throughput S=S o S 1 S 2.. S L-1 Fig.3 Lossless Compression by Arithmetic Coding 2015, IJARCSMS All Rights Reserved ISSN: 2321-7782 (Online) 182 P a g e

VII. SECURITY AND PERFORMANCE ANALYSIS If the attacker implement any attacking scheme of directly decoding the encrypted image. of figure 4 which are ten images of size 512 5125, the PSNR results are shown in figure 5 of the reconstructed images, where x-axis shows the image number and y axis shows PSNR.We can see that all the PSNR values are near about 9.5 db, which is very low to convey any useful meaning full information.therefore this system is more secure than other systems Image 1 Image 2 Image 3 Image 4 Image 5 Image 6 Image 7 Image 8 Image 9 Image 10 Fig.4 Test set images Fig.5 Results of direct decoding compressed and encrypted image 2015, IJARCSMS All Rights Reserved ISSN: 2321-7782 (Online) 183 P a g e

TABLE I Comparison of Lossless Compression Performance Image Proposed Method CALIC Method [10] Method Saving bits over CALIC(Sc) Image1 134200 B (4.095bpp) 134232 B (4.096 bpp) 4.918 bpp 0.24% 16.73% Image2 133858 B(4.085 bpp) 143974 B(4.394 bpp) 5.271 bpp 7.03% 22.50% Image3 120580 B(3.679 bpp) 150850 B(4.604 bpp) 5.453 bpp 20.09% 32.53% Image4 134165 B(4.094 bpp) 134651 B(4.109 bpp) 5.374 bpp 0.36% 23.81% Image5 152136 B(4.642bpp) 142361 B(4.345bpp) 5.424 bpp -6.42% 14.41% Image6 140584 B(4.290 bpp) 160487 B(4.898 bpp) 6.206 bpp 12.41% 30.87% Image7 111256 B(3.395 bpp) 121172 B(3.698 bpp) 5.045bpp 8.19% 32.70% Image8 142987 B(4.363 bpp) 150223 B(4.584 bpp) 6.124 bpp 4.82% 28.75% Image9 157503 B(4.806 bpp) 177252 B(5.409 bpp) 6.303 bpp 11.14% 23.75% Image10 134623 B(4.108 bpp) 154264 B(4.708 bpp) 5.370 bpp 12.74% 23.50% Averaged 4.15bpp 4.449bpp 5.575bpp 7.05% 24.95% Saving bits over 10(S [10 ) VIII. RESULT ANALYSIS Table I, shows that compression efficiency of our proposed method which is applied to the encrypted images is compared with the lossless technique given by the recent version of CALIC[11], which is a good lossless image codecs, and the method in [10], an application lossless compression approach on encrypted images. in Fig. 4 We have taken 10 image samples out of 100 images population which composed various attributes,. Here B stand for bytes and bpp stand for bit per pixel,. In this table the last two columns which are Sc and S [10] stand for the bit rate saving of our proposed method over the CALIC and the method in [10], respectively. The results of this method are obtained by taking the average of 10 random trials.in table I last row gives the averaged results over the 100 images in the test set. It is found that the coding penalty occurred by our method is lower than 0.09% when comparing with the results of the CALIC., the bit rate saving over the method in [10] can be up to 32.70%, which is achieved by the image 7. In Fig. 6 (a to j),the comparison is done in terms of rate-psnr performance of our proposed method with JPEG 2000 and the method in paper [10]. When the bit rates is more than 2 bpp, then our method achieves large PSNR values than JPEG 2000. The gain in PSNR over JPEG 2000 can be significant for high bit rates. For instance, for image 1, the gain is more than 1.9 db. As bit rate decrease, the PSNR gain over JPEG 2000 reduces. 2015, IJARCSMS All Rights Reserved ISSN: 2321-7782 (Online) 184 P a g e

(a) (b) (C) (D) (E) (F) 2015, IJARCSMS All Rights Reserved ISSN: 2321-7782 (Online) 185 P a g e

(G) (H) (I) (J) Fig.6 Comparison of PSNR and bpp of each image IX. CONCLUSION In our proposed method we have designed an efficient image Encryption-and-Compression system. Within the proposed method, the image encryption is done through prediction error k-mean clustering and cyclic permutation. In this method k-mean clustering is used because it is fast and easier to understand and it also gives best result when data set are distinct or well separated from each other. Good compression of the encrypted image has then been implemented by a context-adaptive arithmetic coding technique The experimental results shows that high level of security has been obtained The coding efficiency of our proposed compression method on encrypted images is very close to lossless and lossy image codecs, which take original, images as inputs. References 1. T. Bianchi, A. Piva, and M. Barni, On the implementation of the discrete Fourier transform in the encrypted domain, IEEE Trans. Inf. Forensics Security, vol. 4, no. 1, pp. 86 97, Mar. 2009. 2. T. Bianchi, A. Piva, and M. Barni, Encrypted domain DCT based on homomorphic cryptosystems, EURASIP J. Inf. Security, 2009, Article ID 716357. 2015, IJARCSMS All Rights Reserved ISSN: 2321-7782 (Online) 186 P a g e

3. T. Bianchi, A. Piva, and M. Barni, Composite signal representation for fast and storage-efficient processing of encrypted signals, IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 180 187, Mar. 2010. 4. M. Barni, P. Failla, R. Lazzeretti, A.-R. Sadeghi, and T. Schneider, Privacy-preserving ECG classification with branching programs and neural networks, IEEE Trans. Inf. Forensics Security, vol. 6, no. 2, pp. 452 468, Jun. 2011. 5. Z. Erkin, T. Veugen, T. Toft, and R. L. Lagendijk, Generating private recommendations efficiently using homomorphic encryption and data packing, IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 1053 1066, Jun. 2012 6. X. Wu and N. Memon, Context-based, adaptive, lossless image codec, IEEE Trans. Commun., vol. 45, no. 4, pp. 437 444, Apr. 1997. 7. A. Kumar and A. Makur, Distributed source coding based encryption and lossless compression of gray scale and color images, in Proc. MMSP, 2008, pp. 760 764. 8. J. Zhou, X. Liu, and O. C. Au, On the design of an efficient encryption then compression System, in Proc. ICASSP, pp. 2872 2876, 2013. 9. R. Lazzeretti and M. Barni, Lossless compression of encrypted grey level and color images, in Proc. 16th Eur. Signal Process. Conf., August 2008, 10. W. Liu, W. J. Zeng, L. Dong, and Q. M. Yao, Efficient compression of encrypted grayscale images, IEEE Trans. Imag. Process., vol. 19, no. 4, pp. 1097 1102, Apr. 2010. 11. X. Wu and N. Memon, Context-based, adaptive, lossless image codec, IEEE Trans. Commun., vol. 45, no. 4, pp. 437 444, Apr. 1997. 12. A. Kumar and A. Makur, Distributed source coding based encryptionand lossless compression of gray scale and color images, in Proc.MMSP, 2008, pp. 760 764. AUTHOR(S) PROFILE Praveen Kumar, received the B.Tech. Degree in Information Technology from Bundelkhand Institute of Engineering & Technology, Jhansi, Uttar Pradesh in 2007. Currently pursuing Master s Degree in Computer Science and Engineering from NITTTR Chandigarh (punjab). 2015, IJARCSMS All Rights Reserved ISSN: 2321-7782 (Online) 187 P a g e