SlideShare a Scribd company logo
A Scheme for Encrypted Image Data
Compression
Guide
Dr. D. G. Harkut
Department of Computer Science and Engineering
Prof Ram Meghe College of Engineering and Management
Badnera-Amravati, India.
2022-2023
By:
A. B. Xyssss (19)
S. F. Bdfjjjjj (23)
A. B. Xyssss (07)
S. F. Bdfjjjjj (67)
Content
 Introduction
 Literature Analysis
 Problem Definition
 Proposed Approach / Basic Idea / Algorithm
 Technology Used
 Advantages / Disadvantages of this approach and Conclusion
 References
Project Seminar-I
Introduction
Image Compression:
•The objective of Image Compression is to reduce
irrelevance and redundancy of the image data in order to be
able to store or transmit data in an efficient form.
• Types of image Compression are:
•Lossless Image Compression:
•Lossy Image Compression
Image Encryption:
• Image encryption techniques try to convert original image
to another image that is hard to understand; to keep the
image confidential between users, in other word, it is
essential that nobody should get to know the content without
a key for decryption.
Project Seminar-I
Introduction
Image Compression Standards:
•Different compression standard exists
• Image Compression Standrds are:
•JPEG:
Encryption Standards:
• Symmetric Encryption
• Asymmetric Encryption
Project Seminar-I
Literature Analysis
Reference Basic concept Database Performance
Evaluation parameters
Claim by Authors Our Findings
[1] Xinpeng Zhang,
Yanli Ren,Liquan
Shen, Zhenxing
Qian, Guorui Feng-
Aug. 2014
Image Compressing
with Encryption
Gray-scale Image Compression ratio A scheme with
improved
compression
performance and
reduced
computational
complexity.
Compression
approach is not
compatible with other
encryption methods
like standard stream
cipher or AES/DES.
[2] M. Johnson, P.
Ishwar, V. M.
Prabhakaran, D.
Schonberg, and K.
Ramchandran, Oct.
2004
Transmitting data
over an insecure and
bandwidth-
constrained channel
by applying
Compression prior
to Encryption.
Redundant Data. Channel Bandwidth,
Frequency,
Compression
efficiency,
encryption
efficiency,
encryption and
compression rate.
The encrypted
data can be
compressed to the
same rate as the
original,
unencrypted
data could have
been compressed.
The approach can be
extend in future for
multimedia data like
images and videos.
[3] Z. Erkin, A. Piva, S.
Katzenbeisser, R. L.
Lagendijk, J.
Shokrollahi, G. Neven,
and M. Barni, 2007
Protecting and
Retrieving of Encrypted
Multimedia Content
JPEG2000 bit streams Channel Bandwidth,
Frequency, encryption
efficiency, encryption
and compression rate.
The study focuses on
cryptography used in
existing solutions
to processing of
encrypted signals.
The study focuses on
analysis and retrieval
Of multimedia content, as
well as multimedia
content protection
domains of secure signal
processing.
Project Seminar-I
Reference Basic concept Database Performance
Evaluation
parameters
Claim by Authors Our Findings
[4] G. Jakimoski and K.
P. Subbalakshmi, 2007
Security constrains in
Compressing Encrypted
Data
Redundant Data Time , compression
ratio.
The
compression does not
compromise the security
of the system.
The approach can be
extend in future for
multimedia data like
images and videos.
[5] R. Lazzeretti and M.
Barni, Aug 2008.
Lossless compression of
encrypted grey-level and
color images
Grey-level and color
images
Bit rates, compression
ratio.
Spatial de-correlation,
working on the
prediction error gives
much better results
The results obtained are
promising, even if the
gap to state-of-the-art
compression in the plain
domain is still large.
[6] A. Kumar and A.
Makur, 2008.
Distributed source
coding based
encryption and
lossless compression
of gray scale and
color images
gray scale and color
images
Prediction error, bit
rate, compression
ratio.
An improvement on
the compression
gains of RGB color
images was obtained
by exploiting the
correlation
among the planes.
Both in terms
of computational
cost and lossless
compression it is
always advantageous
to apply encryption
on the prediction
errors
instead of applying
encryption directly
on the image.
Literature Analysis
Project Seminar-I
Problem Definition
After analyzing the literature, following problem definition is
formulated:
Data compression plays a very important role in the information
transmission domain. In transmission of information, security is the key
issue. To address the issue of security and optimal use of bandwidth,
there is a need of some mechanism which can perform both these tasks.
Here, the objective is to develop a scheme to perform compression of
encrypted image data. Firstly, the encryption mechanism will be
developed and later the compression mechanism.
Project Seminar-I
Proposed Approach / Basic Idea / Algorithm
Technology Used
 Advantages / Disadvantages of this approach and Conclusion
 References
Project Seminar-I
Technology Used
Advantages / Disadvantages of this approach and Conclusion
 References
Project Seminar-I
Conclusion
Advantages
Disadvantages
Conclusion
Project Seminar-I
References
[1] Xinpeng Zhang; Yanli Ren; Liquan Shen; Zhenxing Qian; Guorui Feng, "Compressing Encrypted Images With Auxiliary
Information," Multimedia, IEEE Transactions on , vol.16, no.5, pp.1327,1336, Aug. 2014
[2] M. Johnson, P. Ishwar, V. M. Prabhakaran, D. Schonberg, and K. Ramchandran, “On compressing encrypted data,”
IEEE Trans. Signal Process., vol. 52, no. 10, pp. 2992–3006, Oct. 2004.
[3] Z. Erkin, A. Piva, S. Katzenbeisser, R. L. Lagendijk, J. Shokrollahi, G. Neven, and M. Barni, “Protection and retrieval of
encrypted multimedia content: When cryptography meets signal processing,” EURASIP J. Inf. Security, pp. 1–20, 2007.
[4] G. Jakimoski and K. P. Subbalakshmi, “Security of compressing encrypted sources,” in Proc. 41st Asilomar Conf.
Signals, Systems and Computers (ACSSC 2007), 2007, pp. 901–903.
[5] R. Lazzeretti and M. Barni, “Lossless compression of encrypted greylevel and color images,” in Proc. 16th Eur. Signal
Processing Conf. (EUSIPCO 2008), Lausanne, Switzerland, Aug. 2008.
[6] A. Kumar and A. Makur, “Distributed source coding based encryption and lossless compression of gray scale and color
images,” in Proc. IEEE 10th Workshop Multimedia Signal Processing, 2008, pp. 760–764.
[7] W. Liu, W. Zeng, L. Dong, and Q. Yao, “Efficient compression of encrypted grayscale images,” IEEE Trans. Signal
Process, vol. 19, no. 4, pp. 1097–1102, Apr. 2010.
[8] D. Schonberg, S. C. Draper, C. Yeo, and K. Ramchandran, “Toward compression of encrypted images and video
sequences,” IEEE Trans. Inf. Forensics Security, vol. 3, no. 4, pp. 749–762, 2008.
[9] D. Klinc, C. Hazayy, A. Jagmohan, H. Krawczyk, and T. Rabinz, “On compression of data encrypted with block ciphers,”
in Proc. IEEE Data Compression Conf. (DCC ’09), 2009, pp. 213–222.
[10] E. J. Candes and M. B. Wakin, “An introduction to compressive sampling,” IEEE Signal Process. Mag., vol. 25, no. 2,
pp. 21–30, Mar-2008.
Project Seminar-I
Thank You………

More Related Content

PPTX
research review committe review paper for discussion
PPTX
research review committee review status new
PDF
Review On Encrypting and Decrypting Message Via Image Slicing
PDF
Review on: Combination of Cryptography and Steganography for Secure File Tran...
DOCX
Image encryption using aes key expansion
PDF
Image Steganography V2 i11 0143
PDF
An Approach for Securing Voice Communication via Image Watermarking Technique
PDF
encryption based lsb steganography technique for digital images and text data
research review committe review paper for discussion
research review committee review status new
Review On Encrypting and Decrypting Message Via Image Slicing
Review on: Combination of Cryptography and Steganography for Secure File Tran...
Image encryption using aes key expansion
Image Steganography V2 i11 0143
An Approach for Securing Voice Communication via Image Watermarking Technique
encryption based lsb steganography technique for digital images and text data

Similar to Presentation_Format (1).ppt (20)

PDF
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
PDF
Two level data security using steganography and 2 d cellular automata
PDF
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
PDF
Survey on Different Image Encryption Techniques with Tabular Form
PDF
Elliptical curve cryptography image encryption scheme with aid of optimizatio...
PDF
Elliptical curve cryptography image encryption scheme with aid of optimizatio...
PDF
PDF
D010312230
PPTX
A secured-rgb-image-steganography-using-secret-key
PDF
A Literature Review on Image Steganography Using AES
PDF
August 2022: Top 10 Read Articles in Signal & Image Processing
PDF
September 2022: Top 10 Read Articles in Signal & Image Processing
PDF
January 2023: Top 10 Read Articles in Signal &Image Processing
PDF
Image compression and reconstruction using a new approach by artificial neura...
PDF
Image compression and reconstruction using a new approach by artificial neura...
PDF
June 2022: Top 10 Read Articles in Signal & Image Processing
PDF
October 2022: Top 10 Read Articles in Signal & Image Processing
PDF
Image Steganography Techniques: An Overview
PDF
A0540106
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
Two level data security using steganography and 2 d cellular automata
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Survey on Different Image Encryption Techniques with Tabular Form
Elliptical curve cryptography image encryption scheme with aid of optimizatio...
Elliptical curve cryptography image encryption scheme with aid of optimizatio...
D010312230
A secured-rgb-image-steganography-using-secret-key
A Literature Review on Image Steganography Using AES
August 2022: Top 10 Read Articles in Signal & Image Processing
September 2022: Top 10 Read Articles in Signal & Image Processing
January 2023: Top 10 Read Articles in Signal &Image Processing
Image compression and reconstruction using a new approach by artificial neura...
Image compression and reconstruction using a new approach by artificial neura...
June 2022: Top 10 Read Articles in Signal & Image Processing
October 2022: Top 10 Read Articles in Signal & Image Processing
Image Steganography Techniques: An Overview
A0540106

Recently uploaded (20)

PDF
PPT on Performance Review to get promotions
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PPTX
Sustainable Sites - Green Building Construction
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
Digital Logic Computer Design lecture notes
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
Safety Seminar civil to be ensured for safe working.
PPTX
OOP with Java - Java Introduction (Basics)
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPT on Performance Review to get promotions
CH1 Production IntroductoryConcepts.pptx
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
Sustainable Sites - Green Building Construction
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
UNIT 4 Total Quality Management .pptx
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Digital Logic Computer Design lecture notes
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Internet of Things (IOT) - A guide to understanding
R24 SURVEYING LAB MANUAL for civil enggi
Safety Seminar civil to be ensured for safe working.
OOP with Java - Java Introduction (Basics)
Automation-in-Manufacturing-Chapter-Introduction.pdf

Presentation_Format (1).ppt

  • 1. A Scheme for Encrypted Image Data Compression Guide Dr. D. G. Harkut Department of Computer Science and Engineering Prof Ram Meghe College of Engineering and Management Badnera-Amravati, India. 2022-2023 By: A. B. Xyssss (19) S. F. Bdfjjjjj (23) A. B. Xyssss (07) S. F. Bdfjjjjj (67)
  • 2. Content  Introduction  Literature Analysis  Problem Definition  Proposed Approach / Basic Idea / Algorithm  Technology Used  Advantages / Disadvantages of this approach and Conclusion  References Project Seminar-I
  • 3. Introduction Image Compression: •The objective of Image Compression is to reduce irrelevance and redundancy of the image data in order to be able to store or transmit data in an efficient form. • Types of image Compression are: •Lossless Image Compression: •Lossy Image Compression Image Encryption: • Image encryption techniques try to convert original image to another image that is hard to understand; to keep the image confidential between users, in other word, it is essential that nobody should get to know the content without a key for decryption. Project Seminar-I
  • 4. Introduction Image Compression Standards: •Different compression standard exists • Image Compression Standrds are: •JPEG: Encryption Standards: • Symmetric Encryption • Asymmetric Encryption Project Seminar-I
  • 5. Literature Analysis Reference Basic concept Database Performance Evaluation parameters Claim by Authors Our Findings [1] Xinpeng Zhang, Yanli Ren,Liquan Shen, Zhenxing Qian, Guorui Feng- Aug. 2014 Image Compressing with Encryption Gray-scale Image Compression ratio A scheme with improved compression performance and reduced computational complexity. Compression approach is not compatible with other encryption methods like standard stream cipher or AES/DES. [2] M. Johnson, P. Ishwar, V. M. Prabhakaran, D. Schonberg, and K. Ramchandran, Oct. 2004 Transmitting data over an insecure and bandwidth- constrained channel by applying Compression prior to Encryption. Redundant Data. Channel Bandwidth, Frequency, Compression efficiency, encryption efficiency, encryption and compression rate. The encrypted data can be compressed to the same rate as the original, unencrypted data could have been compressed. The approach can be extend in future for multimedia data like images and videos. [3] Z. Erkin, A. Piva, S. Katzenbeisser, R. L. Lagendijk, J. Shokrollahi, G. Neven, and M. Barni, 2007 Protecting and Retrieving of Encrypted Multimedia Content JPEG2000 bit streams Channel Bandwidth, Frequency, encryption efficiency, encryption and compression rate. The study focuses on cryptography used in existing solutions to processing of encrypted signals. The study focuses on analysis and retrieval Of multimedia content, as well as multimedia content protection domains of secure signal processing. Project Seminar-I
  • 6. Reference Basic concept Database Performance Evaluation parameters Claim by Authors Our Findings [4] G. Jakimoski and K. P. Subbalakshmi, 2007 Security constrains in Compressing Encrypted Data Redundant Data Time , compression ratio. The compression does not compromise the security of the system. The approach can be extend in future for multimedia data like images and videos. [5] R. Lazzeretti and M. Barni, Aug 2008. Lossless compression of encrypted grey-level and color images Grey-level and color images Bit rates, compression ratio. Spatial de-correlation, working on the prediction error gives much better results The results obtained are promising, even if the gap to state-of-the-art compression in the plain domain is still large. [6] A. Kumar and A. Makur, 2008. Distributed source coding based encryption and lossless compression of gray scale and color images gray scale and color images Prediction error, bit rate, compression ratio. An improvement on the compression gains of RGB color images was obtained by exploiting the correlation among the planes. Both in terms of computational cost and lossless compression it is always advantageous to apply encryption on the prediction errors instead of applying encryption directly on the image. Literature Analysis Project Seminar-I
  • 7. Problem Definition After analyzing the literature, following problem definition is formulated: Data compression plays a very important role in the information transmission domain. In transmission of information, security is the key issue. To address the issue of security and optimal use of bandwidth, there is a need of some mechanism which can perform both these tasks. Here, the objective is to develop a scheme to perform compression of encrypted image data. Firstly, the encryption mechanism will be developed and later the compression mechanism. Project Seminar-I
  • 8. Proposed Approach / Basic Idea / Algorithm Technology Used  Advantages / Disadvantages of this approach and Conclusion  References Project Seminar-I
  • 9. Technology Used Advantages / Disadvantages of this approach and Conclusion  References Project Seminar-I
  • 11. References [1] Xinpeng Zhang; Yanli Ren; Liquan Shen; Zhenxing Qian; Guorui Feng, "Compressing Encrypted Images With Auxiliary Information," Multimedia, IEEE Transactions on , vol.16, no.5, pp.1327,1336, Aug. 2014 [2] M. Johnson, P. Ishwar, V. M. Prabhakaran, D. Schonberg, and K. Ramchandran, “On compressing encrypted data,” IEEE Trans. Signal Process., vol. 52, no. 10, pp. 2992–3006, Oct. 2004. [3] Z. Erkin, A. Piva, S. Katzenbeisser, R. L. Lagendijk, J. Shokrollahi, G. Neven, and M. Barni, “Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing,” EURASIP J. Inf. Security, pp. 1–20, 2007. [4] G. Jakimoski and K. P. Subbalakshmi, “Security of compressing encrypted sources,” in Proc. 41st Asilomar Conf. Signals, Systems and Computers (ACSSC 2007), 2007, pp. 901–903. [5] R. Lazzeretti and M. Barni, “Lossless compression of encrypted greylevel and color images,” in Proc. 16th Eur. Signal Processing Conf. (EUSIPCO 2008), Lausanne, Switzerland, Aug. 2008. [6] A. Kumar and A. Makur, “Distributed source coding based encryption and lossless compression of gray scale and color images,” in Proc. IEEE 10th Workshop Multimedia Signal Processing, 2008, pp. 760–764. [7] W. Liu, W. Zeng, L. Dong, and Q. Yao, “Efficient compression of encrypted grayscale images,” IEEE Trans. Signal Process, vol. 19, no. 4, pp. 1097–1102, Apr. 2010. [8] D. Schonberg, S. C. Draper, C. Yeo, and K. Ramchandran, “Toward compression of encrypted images and video sequences,” IEEE Trans. Inf. Forensics Security, vol. 3, no. 4, pp. 749–762, 2008. [9] D. Klinc, C. Hazayy, A. Jagmohan, H. Krawczyk, and T. Rabinz, “On compression of data encrypted with block ciphers,” in Proc. IEEE Data Compression Conf. (DCC ’09), 2009, pp. 213–222. [10] E. J. Candes and M. B. Wakin, “An introduction to compressive sampling,” IEEE Signal Process. Mag., vol. 25, no. 2, pp. 21–30, Mar-2008. Project Seminar-I