SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1334
IMAGE COMPRESSION TECHNIQUE FOR QUANTIZED ENCRYPTED
IMAGES USING SVD
CHALAPAKA VEERENDRA BHARGHAV KUMAR1, K DURGA GANGA RAO2
1Student, Dept. of ECE, UCEK, JNTUK, AP, India
2Assistant Professor, Dept. of ECE, UCEK, JNTUK, AP, India.
-----------------------------------------------------------------------***--------------------------------------------------------------------
Abstract -A lossy compression technique for encrypted images using Discrete Wavelet Transform (DWT), Singular Value
Decomposition (SVD) and Huffman coding is analyzed in this paper. At the sender side first the image is encrypted by using
quantized wavelet coefficients and secret key. In the image selection of significant and less significant coefficients are performed
by using the wavelet domain. Encrypted LL sub-band data is quantized and compressedbyHuffmancodingwhile;othersub-bands
encrypted data is efficiently compressed by discarding irrelevant information using SVD and compressed by Huffman coding
techniques. At receiver side, a reliable decompression and decryption technique is used to reconstruct the original image content
with the help of compressed bit streams and inversequantization&secretkey. Theproposedmethodisevaluated using parameters
such as Compression Ratio (CR) and Peak-Signal-to-Noise Ratio (PSNR). This scheme has an advantage of using SVD duetowhich
we have obtained good compression performance while retaining the desirable features of the reconstructed image.
Key Words: Compression ratio, Quantized image coefficients (QIC), Quantized wavelet coefficients (QWC), discrete
wavelet transform, Huffman coding, Singular value decomposition, Image compression, Peak signal to noise ratio.
1. INTROUCTION
Image compression is an application of data compression that encodes the original image with few bits.Theobjective
of image compression is to reduce the redundancy of the image and to store or transmitdata inanefficientform. Themaingoal
of such system is to reduce the storage quantity as much as possible, and the decoded image displayed in the monitor can be
similar to the original image as much as can be. The rapid increase in of transmitting images in social networking sites has
raised two problems like secure transmission and large size of image. To rectifythisproblem we need quantized&encryptthe
image and then compression the image.
Lossy compression for Gaussian source can be achieved through Wyner–Ziv theorem [1]. Recently,a prediction error
based ETC technique is proposed by Vaish et al. [2]in which prediction errors are calculated by using a sub-imageandefficient
compression is achieved by using quantization and Huffman coding. More recently, an efficient compression of encrypted
image using wavelet difference coding is given by Kumar and Vaish[3].Inthispaper,a lossyETCtechniqueisproposedthrough
which good compression performance can be achieved while ensuring the security of images.
2. RELATED WORK
2.1 Singular value decomposition
SVD does is split a matrix into three important sub matrices to representthedata.GiventhematrixA,wherethesizeof
a is 𝑚 × 𝑛 where 𝑚 represents the number of rows in the matrix, and 𝑛 represents the number of columns, A can be broken
down into three sub matrices 𝐴 = 𝑈S𝑉 𝑇 where 𝑈 is of size 𝑚 × 𝑚, S is of size 𝑚 × 𝑛 and is diagonal, and 𝑉T is of size 𝑛 × 𝑛.
Um×n=Um×n× Sm×n×(Vn×n)T (1)
S m × n =[S’ c × d ...0; 0 ...0], c ≤ m, d ≤ n (2)
As S’ has less number of rows and columns with respect to S, therefore,tomakematrix multiplicationpossiblesomecolumnsof
U and rows of V need to be reduced as given below in eq.(3):
Um×m= U’m×c× U’m×(m-c)
and Vn×n = V’n×d ×V’n×(n-d) (3)
Hence the reconstructed matrix can be obtained as:
T’
m×n
= U’
m×c
×S’
c×d
×(V’n×n)T (4)
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1335
Since the singular matrix stores singular values (in descending order) therefore by the use of psychovisual concept,
ignoring the lower singular values will not significantly reduce the visual quality of the image [5].
2.2 Discrete Wavelet Transform
At first, the input image will be filtered into lowpass and highpass components through analysis filters.Afterfiltering,
the data amount of the lowpass and highpass components will become twice that of the original signal; therefore, the lowpass
and highpass components must be downsampled to reduce the data quantity. At the receiver, the received data must be
upsampled to approximate the original signal. Finally, the upsampled signal passes the synthesis filters and is added to form
the reconstructed approximation signal.
Figure (1) One level wavelet decomposition
3. PROPOSED METHOD
Block diagram of proposed ETC technique is demonstrated in Fig.2, and the complete process is summarized in the
following subsections.
Figure (2) Proposed quantized & encryption then compression scheme
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1336
Step1: Initially we will find QI Coefficients for the input image.
Step2: Then encryption will be carried out by using pseudo random coefficient permutation method.
Step3: apply DWT for encrypted image, then will get LL, LH, HL and HH sub-bands.
Step4: For LL sub-band section we will apply QWC and quantization.
Step5: Then Huffman coding decoding and Dequantization & inverse QWC are applied.
Step6: For LH, HL, HH sub-bands we will find QW coefficients.
Step7: Then SVD and Huffman coding decoding and inverse QWC will be carried out.
Step8: LL sub-band section and LH, HL, HH sub-band section will be merged by inverse DWT.
Step9: We apply inverse QI coefficients and inverse pseudo random coefficients permutation.
Step10: Finally reconstructed image is obtained.
Required equations list: [8]
QIC (i, j) = ((I (i, j)-IC min).R)/(IC max- IC min)(5)
E( i , j) = mod[QWC( i , j)-S( i , j) , 512] (6)
QWC( i, j )=|((WC(I ,j)-WCmin).R)/(WCmax- WCmin )|,
1 ≤ i ≤ P/2,1 ≤ j ≤ Q/2 (7)
Q( i, j ) =|E(i ,j)/ƞ|, 1 ≤ i ≤ P/2,1 ≤ j ≤ Q/2 (8) B=B1+B2+B3+B4 (9) CR=B/(P×Q)
(10)
Q’’ (i, j) as: Q’’ (i, j) = Q’(i, j)×ƞ.
A( i,j)=(Q’(i, j)/R).(WCmax – WCmin)+WCmin (11)
E’( i , j) = mod[A( i , j)-S( i , j) , 512] (12)
I’( i , j ) =(E’(i ,j)/R).( IC max – IC min)+IC min) (13)
4. EXPERIMENTAL RESULTS
The proposed ETC technique is implemented using Matlab 9.4.0. To demonstrate various 8-bit gray scale images like Lena,
Peppers each of size 512 ×512,are used which are shown in Figure(3)and Reconstructed images are shown in Figure(4).
4.1.1 Security analysis
The values of input image are encrypted using the pseudo random permutation is used to scramble the position of
each of the detail wavelet coefficients independently. Hence, it would be difficult to any attacker to practically implement a
successful brute force search on encrypted detail wavelet subbands. Therefore, the proposed scheme has attained a desired
level of security
4.1.2 Compression performance evalution
The compression performance of proposed work for various images, CR and PSNR values are calculated with η=1and on
different SVs. The proposed work is evaluated on different wavelets such as Biorthogonal, Haar. The results obtainedonthese
wavelets with the variation of SVs are demonstrated in Tables I–II, it can be analyzed from average values shown in various
tables that the proposed work gives better compression performance with improved image quality on Biorthogonal wavelet.
For an instance, when Lena image is compressed using Biorthogonal wavelet on 256 SVs and η=1it gives 3.7144 CR with
44.7610dB PSNR while the CR values for other waveletssuchasSymlets,Daubechies, Coiflets,HaarandDiscreteMeyerwavelet
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1337
are3.7174,3.714,3.7108,3.7124 and 3.7185 respectively while the corresponding PSNR values are 45.4934dB, 45.4366dB,
45.5626dB, 45.5292dB and 45.5087dB.
Figure(3) Original images
TABLE I
PSNR (DB) AND CR VARIOUS TEST IMAGES WITH VARYING SINGULAR VALUES ON BIORTHOGONAL (BIOR3.1) WAVELET.
TABLE II
PSNR (DB) AND CR VARIOUS TEST IMAGES WITH VARYING SINGULAR VALUES ON HAAR (HAAR) WAVELET.
SINGULARVALUES
256 128 64 32 16
PSNR CR PSNR CR PSNR CR PSNR CR PSNR CR
Lena 44.671 3.7144 31.1763 3.7131 27.2194 3.6697 26.5266 3.6074 26.3631 3.5458
Peppers 42.8998 3.7707 25.7576 3.7684 22.3036 3.7372 21.7012 3.6924 22.03 3.6495
Girl 44.6989 3.7285 36.3321 3.7346 32.5316 3.7047 31.9208 3.6607 32.2602 3.6089
Couple 43.0768 3.7211 29.9602 3.7178 25.8559 3.686 24.3602 3.638 23.8525 3.5921
Barbara 42.8276 3.6877 26.2814 3.6874 19.4147 3.6593 18.3028 3.6019 19.0613 3.5343
Boat 43.2044 3.7251 25.5841 3.705 21.9666 3.6764 21.204 3.6058 22.1529 3.5291
Baboon 40.5183 3.6501 28.2007 3.6436 24.6837 3.595 23.2061 3.525 22.4326 3.4464
Man 42.6831 3.7523 14.2492 3.7512 11.891 3.7198 11.9537 3.6747 12.4548 3.6326
Average 43.0724 3.7187 27.1927 3.7151 23.2333 3.681 22.3969 3.6257 22.5759 3.5673
SINGULARVALUES
256 128 64 32 16
PSNR CR PSNR CR PSNR CR PSNR CR PSNR CR
Lena 45.5292 3.7124 29.4322 3.7132 26.0479 3.6839 25.7669 3.635 26.7415 3.5872
Peppers 43.8741 3.7248 26.5318 3.7252 22.5342 3.7024 22.0475 3.6713 22.1539 3.6403
Girl 45.1921 3.7456 33.6053 3.746 30.0673 3.719 29.952 3.6747 30.3594 3.6287
Couple 44.217 3.6992 29.3154 3.6991 25.1571 3.6798 24.3589 3.6451 24.3256 3.6035
Barbara 41.2473 3.7018 25.8074 3.7007 20.0456 3.6705 19.0364 3.6138 19.7209 3.5418
Boat 44.4749 3.6615 25.8741 3.6598 22.3101 3.6325 21.0437 3.5867 21.2202 3.5364
Baboon 44.4175 3.7195 27.7242 3.7144 25.1509 3.6719 24.0118 3.6047 23.4898 3.5335
Man 40.8832 3.7473 14.0692 3.7479 11.7873 3.7245 11.6496 3.688 12.1284 3.6523
Average 44.1360 3.7092 28.3272 3.7083 24.4733 3.68 23.7453 3.633 24.0016 3.5816
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1338
Figure (4) Reconstructed images
5. CONCLUSIONS
This paper proposed a simplest effective Encryption-then-Compression technique using SVD and Huffmancoding. At
the sender end, content owner decomposed the original image into a waveletdecompositionusingDWT.Atthesendersidethe
input image is quantized and encrypted using pseudo random permutation, which makes the proposedschemesecureagainst
any brute force search. The encrypted LL sub-band is compressed by quantization and Huffman coding, the encrypted LH,HL,
HH sub-bands are compressed using SVD and Huffman coding technique. The receiver can perform the decompression,
decryption and inverse of DWT and inverse quantization to get the reconstructed image.
Figure (5) Graph between CR&PSNR for different compression schemes with comparison table.
The performance analysis of proposed work is evaluated by comparing the unencryptedimages.Itisevidentfromthe
quantitative and visual results that the proposed scheme over JPEG&JPEG2000 on compression ofencryptedimage.Proposed
scheme has an advantage of using SVD due to which we have obtained good compression performance while retaining the
desirable features of the reconstructed.
6. REFERENCES
[1] A. Wyner, J. Ziv, The rate-distortion function for source coding with side infor-mation at the decoder, IEEE Trans. Inf.
Theory IT-22 (1976) 1–10.J.
[2] A. Vaish, M. Kumar, Prediction error based compression of encrypted images, in: ICCCT-2015, ACM Digital Library, 2015,
pp.228–232.
[3] M. Kumar, A. Vaish, An efficient compression of encrypted images using WDR coding, in: SocPros-2015,in:SpringerSeries
Advances in Intelligent Systems and Computing, vol.436, 2016, pp.729–741..
[4] http://www.math.utah.edu/~goller/F15_M2270/BradyMathews_SVDImage.pdf.
[5] A.M. Rufai, G. Anbarjafari, H. Demirel, Lossy imagecompressionusingsingularvaluedecompositionandwaveletdifference
reduction, Digit. Signal Process. 24 (2014) 117–123.
[6] N. Bourbarkis, C. Alexopoulos, Picture data encryption using scan patterns, Pattern Recognit. 25(6) (1992) 567–581.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1339
[7] J.C. Yen, J.I. Guo, Efficient hierarchical chaotic image encryption algorithm and its VLSI realization, IEE Proc., Vis. Image
Signal Process. 147(2) (2000) 167–175.
[8] https://www.sciencedirect.com/science/article/pii/S1051200416301348?via%3Dihub

More Related Content

PDF
IRJET- Handwritten Decimal Image Compression using Deep Stacked Autoencoder
PDF
50120140506015
PDF
Performance analysis of transformation and bogdonov chaotic substitution base...
PDF
NEW IMPROVED 2D SVD BASED ALGORITHM FOR VIDEO CODING
PDF
An approach to hide data in video using steganography
PDF
Lossless Encryption using BITPLANE and EDGEMAP Crypt Algorithms
PDF
K42016368
IRJET- Handwritten Decimal Image Compression using Deep Stacked Autoencoder
50120140506015
Performance analysis of transformation and bogdonov chaotic substitution base...
NEW IMPROVED 2D SVD BASED ALGORITHM FOR VIDEO CODING
An approach to hide data in video using steganography
Lossless Encryption using BITPLANE and EDGEMAP Crypt Algorithms
K42016368

What's hot (19)

PDF
Artificial Neural Network Based Graphical User Interface for Estimation of Fa...
PDF
A proposed assessment metrics for image steganography
PDF
Project 2: Baseband Data Communication
PDF
REVIEW ON SECRET IMAGE SHARING USING QR CODE GENERATION TECHNIC
PDF
PDF
Comparison of ezw and h.264 2
PDF
Effective Compression of Digital Video
PDF
Gpu based-image-quality-assessment-using-structural-similarity-(ssim)-index
PDF
Low-Cost Approximate and Adaptive Techniques for the Internet of Things
PDF
A Novel Approaches For Chromatic Squander Less Visceral Coding Techniques Usi...
PDF
Reversible encrypted data concealment in images by reserving room approach
PDF
Enhanced Human Computer Interaction using hand gesture analysis on GPU
PDF
A0540106
PDF
International journal of signal and image processing issues vol 2015 - no 1...
PDF
Image Steganography Based On Non Linear Chaotic Algorithm
PDF
IRJET- Image Classification – Cat and Dog Images
PDF
A comparatively study on visual cryptography
PDF
IRJET- Generating 3D Models Using 3D Generative Adversarial Network
PDF
An Uncompressed Image Encryption Algorithm Based on DNA Sequences
Artificial Neural Network Based Graphical User Interface for Estimation of Fa...
A proposed assessment metrics for image steganography
Project 2: Baseband Data Communication
REVIEW ON SECRET IMAGE SHARING USING QR CODE GENERATION TECHNIC
Comparison of ezw and h.264 2
Effective Compression of Digital Video
Gpu based-image-quality-assessment-using-structural-similarity-(ssim)-index
Low-Cost Approximate and Adaptive Techniques for the Internet of Things
A Novel Approaches For Chromatic Squander Less Visceral Coding Techniques Usi...
Reversible encrypted data concealment in images by reserving room approach
Enhanced Human Computer Interaction using hand gesture analysis on GPU
A0540106
International journal of signal and image processing issues vol 2015 - no 1...
Image Steganography Based On Non Linear Chaotic Algorithm
IRJET- Image Classification – Cat and Dog Images
A comparatively study on visual cryptography
IRJET- Generating 3D Models Using 3D Generative Adversarial Network
An Uncompressed Image Encryption Algorithm Based on DNA Sequences
Ad

Similar to IRJET- Image Compression Technique for Quantized Encrypted Images using SVD (20)

PDF
Comparison of different Fingerprint Compression Techniques
PDF
Analysis of Image Compression Using Wavelet
PDF
Analysis of Image Compression Using Wavelet
PDF
An efficient image compression algorithm using dct biorthogonal wavelet trans...
PDF
Survey paper on image compression techniques
PDF
E017263040
PDF
Image Compression using a Raspberry Pi
PDF
Analysis of image compression algorithms using wavelet transform with gui in ...
PDF
Analysis of image compression algorithms using wavelet transform with gui in ...
PDF
An approach for color image compression of bmp and tiff images using dct and dwt
PDF
40120140505005
PDF
40120140505005
PDF
40120140505005 2
PDF
Improved anti-noise attack ability of image encryption algorithm using de-noi...
PDF
Medical image analysis and processing using a dual transform
PDF
Medical image analysis and processing using a dual transform
PDF
MULTI WAVELET BASED IMAGE COMPRESSION FOR TELE MEDICAL APPLICATION
PDF
Enhancing Image Quality in Compression and Fading Channels A Wavelet Based Ap...
PDF
0 nidhi sethi_finalpaper--1-5
PPTX
Wavelet, Wavelet Image Compression, STW, SPIHT, MATLAB
Comparison of different Fingerprint Compression Techniques
Analysis of Image Compression Using Wavelet
Analysis of Image Compression Using Wavelet
An efficient image compression algorithm using dct biorthogonal wavelet trans...
Survey paper on image compression techniques
E017263040
Image Compression using a Raspberry Pi
Analysis of image compression algorithms using wavelet transform with gui in ...
Analysis of image compression algorithms using wavelet transform with gui in ...
An approach for color image compression of bmp and tiff images using dct and dwt
40120140505005
40120140505005
40120140505005 2
Improved anti-noise attack ability of image encryption algorithm using de-noi...
Medical image analysis and processing using a dual transform
Medical image analysis and processing using a dual transform
MULTI WAVELET BASED IMAGE COMPRESSION FOR TELE MEDICAL APPLICATION
Enhancing Image Quality in Compression and Fading Channels A Wavelet Based Ap...
0 nidhi sethi_finalpaper--1-5
Wavelet, Wavelet Image Compression, STW, SPIHT, MATLAB
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PPT
Project quality management in manufacturing
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
Geodesy 1.pptx...............................................
PPT
introduction to datamining and warehousing
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
web development for engineering and engineering
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
UNIT 4 Total Quality Management .pptx
PDF
Digital Logic Computer Design lecture notes
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
Well-logging-methods_new................
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
additive manufacturing of ss316l using mig welding
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
PPT on Performance Review to get promotions
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
Safety Seminar civil to be ensured for safe working.
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
Project quality management in manufacturing
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
bas. eng. economics group 4 presentation 1.pptx
Geodesy 1.pptx...............................................
introduction to datamining and warehousing
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
web development for engineering and engineering
R24 SURVEYING LAB MANUAL for civil enggi
UNIT 4 Total Quality Management .pptx
Digital Logic Computer Design lecture notes
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Well-logging-methods_new................
CYBER-CRIMES AND SECURITY A guide to understanding
additive manufacturing of ss316l using mig welding
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPT on Performance Review to get promotions
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Safety Seminar civil to be ensured for safe working.
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Embodied AI: Ushering in the Next Era of Intelligent Systems

IRJET- Image Compression Technique for Quantized Encrypted Images using SVD

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1334 IMAGE COMPRESSION TECHNIQUE FOR QUANTIZED ENCRYPTED IMAGES USING SVD CHALAPAKA VEERENDRA BHARGHAV KUMAR1, K DURGA GANGA RAO2 1Student, Dept. of ECE, UCEK, JNTUK, AP, India 2Assistant Professor, Dept. of ECE, UCEK, JNTUK, AP, India. -----------------------------------------------------------------------***-------------------------------------------------------------------- Abstract -A lossy compression technique for encrypted images using Discrete Wavelet Transform (DWT), Singular Value Decomposition (SVD) and Huffman coding is analyzed in this paper. At the sender side first the image is encrypted by using quantized wavelet coefficients and secret key. In the image selection of significant and less significant coefficients are performed by using the wavelet domain. Encrypted LL sub-band data is quantized and compressedbyHuffmancodingwhile;othersub-bands encrypted data is efficiently compressed by discarding irrelevant information using SVD and compressed by Huffman coding techniques. At receiver side, a reliable decompression and decryption technique is used to reconstruct the original image content with the help of compressed bit streams and inversequantization&secretkey. Theproposedmethodisevaluated using parameters such as Compression Ratio (CR) and Peak-Signal-to-Noise Ratio (PSNR). This scheme has an advantage of using SVD duetowhich we have obtained good compression performance while retaining the desirable features of the reconstructed image. Key Words: Compression ratio, Quantized image coefficients (QIC), Quantized wavelet coefficients (QWC), discrete wavelet transform, Huffman coding, Singular value decomposition, Image compression, Peak signal to noise ratio. 1. INTROUCTION Image compression is an application of data compression that encodes the original image with few bits.Theobjective of image compression is to reduce the redundancy of the image and to store or transmitdata inanefficientform. Themaingoal of such system is to reduce the storage quantity as much as possible, and the decoded image displayed in the monitor can be similar to the original image as much as can be. The rapid increase in of transmitting images in social networking sites has raised two problems like secure transmission and large size of image. To rectifythisproblem we need quantized&encryptthe image and then compression the image. Lossy compression for Gaussian source can be achieved through Wyner–Ziv theorem [1]. Recently,a prediction error based ETC technique is proposed by Vaish et al. [2]in which prediction errors are calculated by using a sub-imageandefficient compression is achieved by using quantization and Huffman coding. More recently, an efficient compression of encrypted image using wavelet difference coding is given by Kumar and Vaish[3].Inthispaper,a lossyETCtechniqueisproposedthrough which good compression performance can be achieved while ensuring the security of images. 2. RELATED WORK 2.1 Singular value decomposition SVD does is split a matrix into three important sub matrices to representthedata.GiventhematrixA,wherethesizeof a is 𝑚 × 𝑛 where 𝑚 represents the number of rows in the matrix, and 𝑛 represents the number of columns, A can be broken down into three sub matrices 𝐴 = 𝑈S𝑉 𝑇 where 𝑈 is of size 𝑚 × 𝑚, S is of size 𝑚 × 𝑛 and is diagonal, and 𝑉T is of size 𝑛 × 𝑛. Um×n=Um×n× Sm×n×(Vn×n)T (1) S m × n =[S’ c × d ...0; 0 ...0], c ≤ m, d ≤ n (2) As S’ has less number of rows and columns with respect to S, therefore,tomakematrix multiplicationpossiblesomecolumnsof U and rows of V need to be reduced as given below in eq.(3): Um×m= U’m×c× U’m×(m-c) and Vn×n = V’n×d ×V’n×(n-d) (3) Hence the reconstructed matrix can be obtained as: T’ m×n = U’ m×c ×S’ c×d ×(V’n×n)T (4)
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1335 Since the singular matrix stores singular values (in descending order) therefore by the use of psychovisual concept, ignoring the lower singular values will not significantly reduce the visual quality of the image [5]. 2.2 Discrete Wavelet Transform At first, the input image will be filtered into lowpass and highpass components through analysis filters.Afterfiltering, the data amount of the lowpass and highpass components will become twice that of the original signal; therefore, the lowpass and highpass components must be downsampled to reduce the data quantity. At the receiver, the received data must be upsampled to approximate the original signal. Finally, the upsampled signal passes the synthesis filters and is added to form the reconstructed approximation signal. Figure (1) One level wavelet decomposition 3. PROPOSED METHOD Block diagram of proposed ETC technique is demonstrated in Fig.2, and the complete process is summarized in the following subsections. Figure (2) Proposed quantized & encryption then compression scheme
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1336 Step1: Initially we will find QI Coefficients for the input image. Step2: Then encryption will be carried out by using pseudo random coefficient permutation method. Step3: apply DWT for encrypted image, then will get LL, LH, HL and HH sub-bands. Step4: For LL sub-band section we will apply QWC and quantization. Step5: Then Huffman coding decoding and Dequantization & inverse QWC are applied. Step6: For LH, HL, HH sub-bands we will find QW coefficients. Step7: Then SVD and Huffman coding decoding and inverse QWC will be carried out. Step8: LL sub-band section and LH, HL, HH sub-band section will be merged by inverse DWT. Step9: We apply inverse QI coefficients and inverse pseudo random coefficients permutation. Step10: Finally reconstructed image is obtained. Required equations list: [8] QIC (i, j) = ((I (i, j)-IC min).R)/(IC max- IC min)(5) E( i , j) = mod[QWC( i , j)-S( i , j) , 512] (6) QWC( i, j )=|((WC(I ,j)-WCmin).R)/(WCmax- WCmin )|, 1 ≤ i ≤ P/2,1 ≤ j ≤ Q/2 (7) Q( i, j ) =|E(i ,j)/ƞ|, 1 ≤ i ≤ P/2,1 ≤ j ≤ Q/2 (8) B=B1+B2+B3+B4 (9) CR=B/(P×Q) (10) Q’’ (i, j) as: Q’’ (i, j) = Q’(i, j)×ƞ. A( i,j)=(Q’(i, j)/R).(WCmax – WCmin)+WCmin (11) E’( i , j) = mod[A( i , j)-S( i , j) , 512] (12) I’( i , j ) =(E’(i ,j)/R).( IC max – IC min)+IC min) (13) 4. EXPERIMENTAL RESULTS The proposed ETC technique is implemented using Matlab 9.4.0. To demonstrate various 8-bit gray scale images like Lena, Peppers each of size 512 ×512,are used which are shown in Figure(3)and Reconstructed images are shown in Figure(4). 4.1.1 Security analysis The values of input image are encrypted using the pseudo random permutation is used to scramble the position of each of the detail wavelet coefficients independently. Hence, it would be difficult to any attacker to practically implement a successful brute force search on encrypted detail wavelet subbands. Therefore, the proposed scheme has attained a desired level of security 4.1.2 Compression performance evalution The compression performance of proposed work for various images, CR and PSNR values are calculated with η=1and on different SVs. The proposed work is evaluated on different wavelets such as Biorthogonal, Haar. The results obtainedonthese wavelets with the variation of SVs are demonstrated in Tables I–II, it can be analyzed from average values shown in various tables that the proposed work gives better compression performance with improved image quality on Biorthogonal wavelet. For an instance, when Lena image is compressed using Biorthogonal wavelet on 256 SVs and η=1it gives 3.7144 CR with 44.7610dB PSNR while the CR values for other waveletssuchasSymlets,Daubechies, Coiflets,HaarandDiscreteMeyerwavelet
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1337 are3.7174,3.714,3.7108,3.7124 and 3.7185 respectively while the corresponding PSNR values are 45.4934dB, 45.4366dB, 45.5626dB, 45.5292dB and 45.5087dB. Figure(3) Original images TABLE I PSNR (DB) AND CR VARIOUS TEST IMAGES WITH VARYING SINGULAR VALUES ON BIORTHOGONAL (BIOR3.1) WAVELET. TABLE II PSNR (DB) AND CR VARIOUS TEST IMAGES WITH VARYING SINGULAR VALUES ON HAAR (HAAR) WAVELET. SINGULARVALUES 256 128 64 32 16 PSNR CR PSNR CR PSNR CR PSNR CR PSNR CR Lena 44.671 3.7144 31.1763 3.7131 27.2194 3.6697 26.5266 3.6074 26.3631 3.5458 Peppers 42.8998 3.7707 25.7576 3.7684 22.3036 3.7372 21.7012 3.6924 22.03 3.6495 Girl 44.6989 3.7285 36.3321 3.7346 32.5316 3.7047 31.9208 3.6607 32.2602 3.6089 Couple 43.0768 3.7211 29.9602 3.7178 25.8559 3.686 24.3602 3.638 23.8525 3.5921 Barbara 42.8276 3.6877 26.2814 3.6874 19.4147 3.6593 18.3028 3.6019 19.0613 3.5343 Boat 43.2044 3.7251 25.5841 3.705 21.9666 3.6764 21.204 3.6058 22.1529 3.5291 Baboon 40.5183 3.6501 28.2007 3.6436 24.6837 3.595 23.2061 3.525 22.4326 3.4464 Man 42.6831 3.7523 14.2492 3.7512 11.891 3.7198 11.9537 3.6747 12.4548 3.6326 Average 43.0724 3.7187 27.1927 3.7151 23.2333 3.681 22.3969 3.6257 22.5759 3.5673 SINGULARVALUES 256 128 64 32 16 PSNR CR PSNR CR PSNR CR PSNR CR PSNR CR Lena 45.5292 3.7124 29.4322 3.7132 26.0479 3.6839 25.7669 3.635 26.7415 3.5872 Peppers 43.8741 3.7248 26.5318 3.7252 22.5342 3.7024 22.0475 3.6713 22.1539 3.6403 Girl 45.1921 3.7456 33.6053 3.746 30.0673 3.719 29.952 3.6747 30.3594 3.6287 Couple 44.217 3.6992 29.3154 3.6991 25.1571 3.6798 24.3589 3.6451 24.3256 3.6035 Barbara 41.2473 3.7018 25.8074 3.7007 20.0456 3.6705 19.0364 3.6138 19.7209 3.5418 Boat 44.4749 3.6615 25.8741 3.6598 22.3101 3.6325 21.0437 3.5867 21.2202 3.5364 Baboon 44.4175 3.7195 27.7242 3.7144 25.1509 3.6719 24.0118 3.6047 23.4898 3.5335 Man 40.8832 3.7473 14.0692 3.7479 11.7873 3.7245 11.6496 3.688 12.1284 3.6523 Average 44.1360 3.7092 28.3272 3.7083 24.4733 3.68 23.7453 3.633 24.0016 3.5816
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1338 Figure (4) Reconstructed images 5. CONCLUSIONS This paper proposed a simplest effective Encryption-then-Compression technique using SVD and Huffmancoding. At the sender end, content owner decomposed the original image into a waveletdecompositionusingDWT.Atthesendersidethe input image is quantized and encrypted using pseudo random permutation, which makes the proposedschemesecureagainst any brute force search. The encrypted LL sub-band is compressed by quantization and Huffman coding, the encrypted LH,HL, HH sub-bands are compressed using SVD and Huffman coding technique. The receiver can perform the decompression, decryption and inverse of DWT and inverse quantization to get the reconstructed image. Figure (5) Graph between CR&PSNR for different compression schemes with comparison table. The performance analysis of proposed work is evaluated by comparing the unencryptedimages.Itisevidentfromthe quantitative and visual results that the proposed scheme over JPEG&JPEG2000 on compression ofencryptedimage.Proposed scheme has an advantage of using SVD due to which we have obtained good compression performance while retaining the desirable features of the reconstructed. 6. REFERENCES [1] A. Wyner, J. Ziv, The rate-distortion function for source coding with side infor-mation at the decoder, IEEE Trans. Inf. Theory IT-22 (1976) 1–10.J. [2] A. Vaish, M. Kumar, Prediction error based compression of encrypted images, in: ICCCT-2015, ACM Digital Library, 2015, pp.228–232. [3] M. Kumar, A. Vaish, An efficient compression of encrypted images using WDR coding, in: SocPros-2015,in:SpringerSeries Advances in Intelligent Systems and Computing, vol.436, 2016, pp.729–741.. [4] http://www.math.utah.edu/~goller/F15_M2270/BradyMathews_SVDImage.pdf. [5] A.M. Rufai, G. Anbarjafari, H. Demirel, Lossy imagecompressionusingsingularvaluedecompositionandwaveletdifference reduction, Digit. Signal Process. 24 (2014) 117–123. [6] N. Bourbarkis, C. Alexopoulos, Picture data encryption using scan patterns, Pattern Recognit. 25(6) (1992) 567–581.
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1339 [7] J.C. Yen, J.I. Guo, Efficient hierarchical chaotic image encryption algorithm and its VLSI realization, IEE Proc., Vis. Image Signal Process. 147(2) (2000) 167–175. [8] https://www.sciencedirect.com/science/article/pii/S1051200416301348?via%3Dihub