SlideShare une entreprise Scribd logo
1  sur  10
Télécharger pour lire hors ligne
Computer Engineering and Intelligent Systems                                                  www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.4, 2012


 Secure Compressed Image Transmission using Self Organizing
                                           Feature Maps


                                G. Mohiuddin Bhat (Corresponding Author)

           University Science Instrumentation Centre, University of Kashmir, Hazratbal, Srinagar;

                                          gmbhat_ku@yahoo.co.in



                                                 Asifa Baba

  School of Technology, Islamic University of Science & Technology, Awantipora; asifababa@gmail.com



Abstract: Due to the widespread use of multimedia applications, the data communication channels feel

short of bandwidth with regard to channel capacity requirements. As such, the need for improved image

compression techniques, together with image security, is increasing day by day. In this paper, the concept of

compressed image security has been explored. The input image data is applied to the image partitioning and

vectorization block where the whole image is divided into 4x4 non-overlapping blocks. Each block serves

as a vector of 16 elements for the Self Organizing Feature Map (SOFM) network by which the indexes of

the codewords are determined. These indexes are coded in a binary stream of 0’s and 1’s using a variable

length Entropy Coding Scheme. These long strings of 0’s and 1’s are scrambled by a typical scrambler in

order to secure the image data from the unauthorized receiver. The simulation results demonstrate the

improved coding efficiency of the proposed method, when compared with JPEG, in addition to providing

the message security. The proposed scheme achieves a compression ratio upto 38:1.



Keywords: SOFM, Entropy Coding, Codewords, Image Security, Scrambler, encryption, JPEG, Arithmetic

Coding..




                                                     80
Computer Engineering and Intelligent Systems                                                 www.iiste.org
 ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
 Vol 3, No.4, 2012

1.    Introduction: Message security is the science and study of methods for protecting message signals

 from unauthorized disclosure and modification. The message signals include digital data from computers

 and other communication systems, digital image data, analog messages including audio signals like speech

 signals, video signals and other instrumentation signals. Secure image transmission is of paramount

 importance in defense, surveillance and other strategic applications. The compressed image data can be

 encrypted before transmission over an insecure channel. The image information can thus be denied to an

 unauthorized receiver thereby safeguarding eavesdropping. However, an intended receiver equipped with

 proper ‘Key’ and the decryption technique should be able to recover the original image from the received

 encrypted data.



 Cryptography is the science of deliberately disguising the signals using typical ciphers so that they assume

 the form of noise signal for an unauthorized receiver. The noise-like (encrypted) signals can be decrypted

 or deciphered back to recover the original message signals [1]. Scramblers are a class of substitution

 ciphers and have been found to be suitable for various security requirements such as those used by cable

 and satellite TV operators and mobile phone service providers [2,3].

 In this paper secure compressed image compression scheme is presented where the input image data is first

 compressed using Self Organizing Feature Maps (SOFM) based technique. The compressed image data is

 then scrambled using a typical scrambler so that it appears noise like for an unauthorized receiver [4]. The

 Simulation results for the compressed image transmission and reception using the proposed techniques

 have been presented in the paper for standard grayscale images.



 2 Proposed technique of secure image transmission using SOFM based Image Compression:

 Block Diagram of the proposed compressed Image Encryption technique is shown in Fig. 1. The input

 image data is applied to the image partitioning and vectorization block where the whole image is divided

 into 4x4 non-overlapping blocks. Each block serves as a vector of 16 elements for the Self Organizing

 Feature Map (SOFM) network by which the indexes of the codewords are determined. These indexes are

 coded in a binary stream of 0’s and 1’s using a variable length Entropy Coding Scheme. These long strings

                                                     81
Computer Engineering and Intelligent Systems                                                   www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.4, 2012

of 0’s and 1’s are scrambled by a typical scrambler shown in Fig. 2 in order to secure the image data from

the unauthorized receivers.

3. Self Organizing Feature Maps:

Self Organizing Feature Map (SOFM) has formed a basis for a great deal of research into applying network

models to the problem of codebook design in Vector Quantization [5]. The SOFM introduced by Kohonen

is an unsupervised learning method which has both clustering and visualization properties and creates a

correspondence between the input space of stimuli and the output space constituted of the codebook

elements (the code words or neurons) [6]. The learning algorithm ensures that the most highly activated

node as well as its neighbors move towards a sample presented to the network. The networks are self

organizing in that nodes tend to attain weight vectors that capture characteristics of the input vector space,

with the neighborhood relation translating into proximity in Euclidean space, even if the initial values of

weight vectors are arbitrary. In the SOFM algorithm, the vector X is used to update not only the winning

class but also its neighboring classes according to the following rule:

For each vector X in the training

 1. X is classified according to:

X ∈Ci if X −Wi = minX −Wj                      .......... 1)
                                                       ..(

2. The weights Wj are then updated according to:

              W j (t ) + lr (X − W j (t ))2 if C j ∈ N (Ci , t )
              
W j (t + 1) =                                                   ...(2)
              W j (t )
                                        if C j ∉ N (Ci , t )
Where W is the feature vector, lr is the learning parameter in the range of 0-1 and N (Ci, t) is the set of

classes, which are in the neighborhood of the winning class Ci at time t. The subscript ‘j’ represents the

index of all vectors in the neighborhood of the ith feature vector.



4. Binary Arithmetic Coding:

In Arithmetic coding (AC) Scheme, a one to one correspondence between source symbols and codewords

does not exist; instead, an entire sequence of source symbols (or message) is assigned a single arithmetic



                                                        82
Computer Engineering and Intelligent Systems                                                                      www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.4, 2012

codeword. As the number of symbols in the message increases, the interval used to represent it becomes

smaller and the number of information bits required to represent the interval becomes larger [7].



5. Scrambler for Data:

Fig. 2 shows the circuit diagram of the proposed scrambler. Here tap-gain values are continuously changed

with the help of a PN-sequence. Inputs QA, QB, QC and QD to the AND gates are the outputs of a 15-bit PN-

sequence generator. The value of a Qi=1 means that the corresponding shift register stage is effective in the

generation of the Key ‘K’. Similarly Qi=0 means that ai =1. For unscrambling the received message, the

receiver has to know the value of N, the PN-sequence and its starting point. Thus, the unscrambling

becomes very difficult even for smaller values of N, thus minimizing the problem of error propagation



6. Simulation Results:

The proposed Algorithm based on SOFM and Arithmetic Coding has been implemented using MATLAB-

7.02 and the proposed algorithm has been simulated on various grayscale images of size 256x256 with 8

bits per pixel over a PC with Intel Pentium IV, 2.9 GHz and 256MB RAM under Windows-XP operating

system. The ‘Lena’ and ‘Couple’ images are used for training the initial set and codebook design. The

performance of the proposed technique is tested for images ‘Einstein’ and ‘Woman’, which are outside the

training sequence. The performance is measured for various codebook sizes of 2n where n is an integer

varying from 5 to 8, and then compression efficiency is measured in terms of compression ratio (CR) which

is defined as:
                           .   	        	 	           	

                                                                      									… … … 3
              .    	   	           	   	 	        	           	
          	            	                      	           	       	


                  					… … 4
         !" #



The quality of the decoded image is measured in terms of Peak-Signal-to-Noise-Ratio (PSNR) which is

defined as:

                                                                           2551
                       %&'              10 log!- .                                           ?				… … 5 							
                                                               1 =;! ;!
                                                                ∑   ∑ 45 6, 8 9 51 6, 8 :
                                                                                         1
                                                              2' ><- <- !

                                                                          83
Computer Engineering and Intelligent Systems                                                      www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.4, 2012




Where NxM is the image size, f1 (i, j) is the random field of the original field intensities and f2 (i, j) denotes

the random field of the reconstructed image intensities. Fig. 3 outlines the simulation results of the image

transmission over the proposed secure image transmission systems. Variation of CR with PSNR and

Codebook size has been plotted. Standard grayscale image including Lena, Couple, Einstein were first

compressed using SOFM based image compression technique. The compressed image data has been

subsequently scrambled using the modified scrambler as shown in Fig. 2. The Scrambled image

corresponding to the given standard image ‘woman’ is shown in Fig. 4 along with the original and the

reconstructed images.

The waveforms of the Key bits, Arithmetic Coded bits and the scrambled image data has been presented in

Fig. 5. Further, the histogram of the original and encrypted image is shown in Fig. 6, and the Correlation

analysis of the plain image and encrypted image has been presented in Fig. 7.



7. Comparison with JPEG:

The performance of the proposed technique for image compression has been compared for the standard

image ‘Woman’ with the performance obtained by using JPEG standard using 8x8 default quantization for

compression. The results of the comparison have been presented in Fig. 8. It can be observed from the

figure that the proposed method outperforms the DCT based JPEG by up to 1 dB.



8. Conclusion:

The paper presents an interesting technique for fast mage data transmission with data security against eaves

dropping. An SOFM technique has been used for data compression while as a typical scrambler has been

used for data encryption for message security. The proposed technique is shown to be very efficient for

secure image data compression with reduced bit error propagation. The transmission and reception of

encrypted image using the proposed technique has been tested experimentally on standard grayscale images.

The proposed technique provides a compression ratio of about 38:1 which outperforms the conventional

JPEG standard for image compression. The simulation of the proposed system            has been carried out using

                                                       84
Computer Engineering and Intelligent Systems                                                www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.4, 2012

MATLAB 7.02 and the       performance results have been presented in the paper. The performance of the

proposed secure image transmission system has been found to be satisfactory.



References:


1. Shaaban, E., “Data Compression Basics,”, 2002, Retrieved from-
   http://meseec.ce.rit.edu/eecc694-spring2000/694-5-9-2000.pdf

2. M. Buer and J. Wallace, “Integrated Security for digital video broadcast”, IEEE Trans. Cons. Elect.,
   Aug. 1996, vol. 42, No. 3, pp. 500-503.

3. Dorothy Elizabeth and Robling Denning, “Cryptography and Data Security”, Addison Wesley, 1982.
4. H. Feistel, “Cryptography and Computer Privacy”, Scientific America, May 1973, vol. 228, pp. 15-23,
5. Wu, Chung-Ping & Kuo, C.-C.J., “Design of integrated multimedia compression and encryption
   systems,” IEEE Transactions on Multimedia, 2005, Vol. 7, No. 5, pp 828 – 839.

6. P. Wayner, “A redundancy reducing Cipher”, Cryptologia, April 1988, vol. XII, pp. 107.
7. J. B. Kam & G. I. Davida, “Structured design of substitutional permutation encryption networks”,
    IEEE Trans. Computers, Oct. 1979, vol. C-28, pp. 747-753.




           Input                             SOFM       based           Arithmetic
                     Image
           Image                             Vector                     coding
                     partition and                                                              Scrambler   Coded
                                             quantization
                                                                                                            Bit stream

                                             Code book




                   Fig. 1 Proposed Image Encryption using SOFM based Image Compression




                                                   85
Computer Engineering and Intelligent Systems                                          www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.4, 2012




                 QA                                             QA

                 QB                                            QB
                         SHIFT




                                                       SHIFT
                 QC                                             QC


                 QD                                            QD




 Compressed image data               Cryptogram                      Decrypted    Compressed
                                                                     Image data


                                 Fig. 2 Proposed Image Data Scrambler




Fig. 3 (a) Variation of Compression ratio with PSNR (b) Variation of Compression ratio with

Codebook Size




                                                  86
Computer Engineering and Intelligent Systems                                        www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.4, 2012




                  (a)                     (b)                              (c)



         Fig. 4     SOFM based Secure Image transmission using standard Image Woman

                         (a) Original Image (b) Scrambled Image (c) Reconstructed Image




                                                                                          (a)




                                                                                          (b)




                                                                                          (c)



  Fig. 5 Various Waveforms generated: (a) Key bits (b) Arithmetic Code (c) Scrambled Image data




                                                87
Computer Engineering and Intelligent Systems                                       www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.4, 2012




                       Fig. 6 Histograms of Original and Encrypted Image ‘Woman’




               Fig. 7 Correlation analysis of original image and encrypted image




       Fig. 8 Performance comparison of the proposed method with JPEG for image woman




                                               88
International Journals Call for Paper
The IISTE, a U.S. publisher, is currently hosting the academic journals listed below. The peer review process of the following journals
usually takes LESS THAN 14 business days and IISTE usually publishes a qualified article within 30 days. Authors should
send their full paper to the following email address. More information can be found in the IISTE website : www.iiste.org

Business, Economics, Finance and Management               PAPER SUBMISSION EMAIL
European Journal of Business and Management               EJBM@iiste.org
Research Journal of Finance and Accounting                RJFA@iiste.org
Journal of Economics and Sustainable Development          JESD@iiste.org
Information and Knowledge Management                      IKM@iiste.org
Developing Country Studies                                DCS@iiste.org
Industrial Engineering Letters                            IEL@iiste.org


Physical Sciences, Mathematics and Chemistry              PAPER SUBMISSION EMAIL
Journal of Natural Sciences Research                      JNSR@iiste.org
Chemistry and Materials Research                          CMR@iiste.org
Mathematical Theory and Modeling                          MTM@iiste.org
Advances in Physics Theories and Applications             APTA@iiste.org
Chemical and Process Engineering Research                 CPER@iiste.org


Engineering, Technology and Systems                       PAPER SUBMISSION EMAIL
Computer Engineering and Intelligent Systems              CEIS@iiste.org
Innovative Systems Design and Engineering                 ISDE@iiste.org
Journal of Energy Technologies and Policy                 JETP@iiste.org
Information and Knowledge Management                      IKM@iiste.org
Control Theory and Informatics                            CTI@iiste.org
Journal of Information Engineering and Applications       JIEA@iiste.org
Industrial Engineering Letters                            IEL@iiste.org
Network and Complex Systems                               NCS@iiste.org


Environment, Civil, Materials Sciences                    PAPER SUBMISSION EMAIL
Journal of Environment and Earth Science                  JEES@iiste.org
Civil and Environmental Research                          CER@iiste.org
Journal of Natural Sciences Research                      JNSR@iiste.org
Civil and Environmental Research                          CER@iiste.org


Life Science, Food and Medical Sciences                   PAPER SUBMISSION EMAIL
Journal of Natural Sciences Research                      JNSR@iiste.org
Journal of Biology, Agriculture and Healthcare            JBAH@iiste.org
Food Science and Quality Management                       FSQM@iiste.org
Chemistry and Materials Research                          CMR@iiste.org


Education, and other Social Sciences                      PAPER SUBMISSION EMAIL
Journal of Education and Practice                         JEP@iiste.org
Journal of Law, Policy and Globalization                  JLPG@iiste.org                       Global knowledge sharing:
New Media and Mass Communication                          NMMC@iiste.org                       EBSCO, Index Copernicus, Ulrich's
Journal of Energy Technologies and Policy                 JETP@iiste.org                       Periodicals Directory, JournalTOCS, PKP
Historical Research Letter                                HRL@iiste.org                        Open Archives Harvester, Bielefeld
                                                                                               Academic Search Engine, Elektronische
Public Policy and Administration Research                 PPAR@iiste.org                       Zeitschriftenbibliothek EZB, Open J-Gate,
International Affairs and Global Strategy                 IAGS@iiste.org                       OCLC WorldCat, Universe Digtial Library ,
Research on Humanities and Social Sciences                RHSS@iiste.org                       NewJour, Google Scholar.

Developing Country Studies                                DCS@iiste.org                        IISTE is member of CrossRef. All journals
Arts and Design Studies                                   ADS@iiste.org                        have high IC Impact Factor Values (ICV).

Contenu connexe

Tendances

Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmIAEME Publication
 
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsColor Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsIJTET Journal
 
Secured Data Transmission Using Video Steganographic Scheme
Secured Data Transmission Using Video Steganographic SchemeSecured Data Transmission Using Video Steganographic Scheme
Secured Data Transmission Using Video Steganographic SchemeIJERA Editor
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueEditor IJCATR
 
Encryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix MultiplicationEncryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix Multiplicationijcsit
 
A novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptographyA novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptographyZac Darcy
 
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEDESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEIJNSA Journal
 
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...CSCJournals
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...IRJET Journal
 
Hiding text in speech signal using K-means, LSB techniques and chaotic maps
Hiding text in speech signal using K-means, LSB techniques and chaotic maps Hiding text in speech signal using K-means, LSB techniques and chaotic maps
Hiding text in speech signal using K-means, LSB techniques and chaotic maps IJECEIAES
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganographysipij
 
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTIONAN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTIONijcseit
 
A new partial image encryption method for document images using variance base...
A new partial image encryption method for document images using variance base...A new partial image encryption method for document images using variance base...
A new partial image encryption method for document images using variance base...IJECEIAES
 
Encryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on MatlabEncryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on MatlabMuhammad Saif Ul Islam
 
An Image Encryption using Chaotic Based Cryptosystem
An Image Encryption using Chaotic Based CryptosystemAn Image Encryption using Chaotic Based Cryptosystem
An Image Encryption using Chaotic Based Cryptosystemxlyle
 

Tendances (20)

Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithm
 
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsColor Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic Maps
 
Secured Data Transmission Using Video Steganographic Scheme
Secured Data Transmission Using Video Steganographic SchemeSecured Data Transmission Using Video Steganographic Scheme
Secured Data Transmission Using Video Steganographic Scheme
 
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH Technique
 
Encryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix MultiplicationEncryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix Multiplication
 
A novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptographyA novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptography
 
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEDESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
 
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
Image Security
Image SecurityImage Security
Image Security
 
Hiding text in speech signal using K-means, LSB techniques and chaotic maps
Hiding text in speech signal using K-means, LSB techniques and chaotic maps Hiding text in speech signal using K-means, LSB techniques and chaotic maps
Hiding text in speech signal using K-means, LSB techniques and chaotic maps
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
 
Thesis Background
Thesis BackgroundThesis Background
Thesis Background
 
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTIONAN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
 
Ja2415771582
Ja2415771582Ja2415771582
Ja2415771582
 
A new partial image encryption method for document images using variance base...
A new partial image encryption method for document images using variance base...A new partial image encryption method for document images using variance base...
A new partial image encryption method for document images using variance base...
 
Encryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on MatlabEncryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on Matlab
 
An Image Encryption using Chaotic Based Cryptosystem
An Image Encryption using Chaotic Based CryptosystemAn Image Encryption using Chaotic Based Cryptosystem
An Image Encryption using Chaotic Based Cryptosystem
 

En vedette

Continuous Delivery and Feature Flagging
Continuous Delivery and Feature FlaggingContinuous Delivery and Feature Flagging
Continuous Delivery and Feature FlaggingLaunchDarkly
 
Mutlimedia authoring tools
Mutlimedia authoring toolsMutlimedia authoring tools
Mutlimedia authoring toolsJay Patel
 
Multimedia authoring tools
Multimedia authoring toolsMultimedia authoring tools
Multimedia authoring toolsOnline
 
Unit1 principle of programming language
Unit1 principle of programming languageUnit1 principle of programming language
Unit1 principle of programming languageVasavi College of Engg
 

En vedette (6)

Unit 5 task 2
Unit 5 task 2Unit 5 task 2
Unit 5 task 2
 
Continuous Delivery and Feature Flagging
Continuous Delivery and Feature FlaggingContinuous Delivery and Feature Flagging
Continuous Delivery and Feature Flagging
 
Mutlimedia authoring tools
Mutlimedia authoring toolsMutlimedia authoring tools
Mutlimedia authoring tools
 
Multimedia
MultimediaMultimedia
Multimedia
 
Multimedia authoring tools
Multimedia authoring toolsMultimedia authoring tools
Multimedia authoring tools
 
Unit1 principle of programming language
Unit1 principle of programming languageUnit1 principle of programming language
Unit1 principle of programming language
 

Similaire à 11.secure compressed image transmission using self organizing feature maps

Devanagari Digit and Character Recognition Using Convolutional Neural Network
Devanagari Digit and Character Recognition Using Convolutional Neural NetworkDevanagari Digit and Character Recognition Using Convolutional Neural Network
Devanagari Digit and Character Recognition Using Convolutional Neural NetworkIRJET Journal
 
Paper id 252014130
Paper id 252014130Paper id 252014130
Paper id 252014130IJRAT
 
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET Journal
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...idescitation
 
Survey paper on image compression techniques
Survey paper on image compression techniquesSurvey paper on image compression techniques
Survey paper on image compression techniquesIRJET Journal
 
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...IRJET Journal
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUEijcisjournal
 
Biomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithmBiomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithmijcsit
 
Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)Mumbai Academisc
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”IOSR Journals
 
Improving AI surveillance using Edge Computing
Improving AI surveillance using Edge ComputingImproving AI surveillance using Edge Computing
Improving AI surveillance using Edge ComputingIRJET Journal
 
11.data security using cryptosteganography in web application
11.data security using cryptosteganography in web application11.data security using cryptosteganography in web application
11.data security using cryptosteganography in web applicationAlexander Decker
 
Belief Propagation Decoder for LDPC Codes Based on VLSI Implementation
Belief Propagation Decoder for LDPC Codes Based on VLSI ImplementationBelief Propagation Decoder for LDPC Codes Based on VLSI Implementation
Belief Propagation Decoder for LDPC Codes Based on VLSI Implementationinventionjournals
 
Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)Mumbai Academisc
 
An efficient reconfigurable code rate cooperative low-density parity check co...
An efficient reconfigurable code rate cooperative low-density parity check co...An efficient reconfigurable code rate cooperative low-density parity check co...
An efficient reconfigurable code rate cooperative low-density parity check co...IJECEIAES
 

Similaire à 11.secure compressed image transmission using self organizing feature maps (20)

Devanagari Digit and Character Recognition Using Convolutional Neural Network
Devanagari Digit and Character Recognition Using Convolutional Neural NetworkDevanagari Digit and Character Recognition Using Convolutional Neural Network
Devanagari Digit and Character Recognition Using Convolutional Neural Network
 
Paper id 252014130
Paper id 252014130Paper id 252014130
Paper id 252014130
 
14 vikram kumar_150-159
14 vikram kumar_150-15914 vikram kumar_150-159
14 vikram kumar_150-159
 
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
 
Survey paper on image compression techniques
Survey paper on image compression techniquesSurvey paper on image compression techniques
Survey paper on image compression techniques
 
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
 
Biomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithmBiomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithm
 
Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
 
Improving AI surveillance using Edge Computing
Improving AI surveillance using Edge ComputingImproving AI surveillance using Edge Computing
Improving AI surveillance using Edge Computing
 
Paper_KST
Paper_KSTPaper_KST
Paper_KST
 
11.data security using cryptosteganography in web application
11.data security using cryptosteganography in web application11.data security using cryptosteganography in web application
11.data security using cryptosteganography in web application
 
Belief Propagation Decoder for LDPC Codes Based on VLSI Implementation
Belief Propagation Decoder for LDPC Codes Based on VLSI ImplementationBelief Propagation Decoder for LDPC Codes Based on VLSI Implementation
Belief Propagation Decoder for LDPC Codes Based on VLSI Implementation
 
Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)
 
An efficient reconfigurable code rate cooperative low-density parity check co...
An efficient reconfigurable code rate cooperative low-density parity check co...An efficient reconfigurable code rate cooperative low-density parity check co...
An efficient reconfigurable code rate cooperative low-density parity check co...
 
Jz3118501853
Jz3118501853Jz3118501853
Jz3118501853
 
Bt32444450
Bt32444450Bt32444450
Bt32444450
 
Journal_ICACT
Journal_ICACTJournal_ICACT
Journal_ICACT
 

Plus de Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

Plus de Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Dernier

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Dernier (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

11.secure compressed image transmission using self organizing feature maps

  • 1. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.4, 2012 Secure Compressed Image Transmission using Self Organizing Feature Maps G. Mohiuddin Bhat (Corresponding Author) University Science Instrumentation Centre, University of Kashmir, Hazratbal, Srinagar; gmbhat_ku@yahoo.co.in Asifa Baba School of Technology, Islamic University of Science & Technology, Awantipora; asifababa@gmail.com Abstract: Due to the widespread use of multimedia applications, the data communication channels feel short of bandwidth with regard to channel capacity requirements. As such, the need for improved image compression techniques, together with image security, is increasing day by day. In this paper, the concept of compressed image security has been explored. The input image data is applied to the image partitioning and vectorization block where the whole image is divided into 4x4 non-overlapping blocks. Each block serves as a vector of 16 elements for the Self Organizing Feature Map (SOFM) network by which the indexes of the codewords are determined. These indexes are coded in a binary stream of 0’s and 1’s using a variable length Entropy Coding Scheme. These long strings of 0’s and 1’s are scrambled by a typical scrambler in order to secure the image data from the unauthorized receiver. The simulation results demonstrate the improved coding efficiency of the proposed method, when compared with JPEG, in addition to providing the message security. The proposed scheme achieves a compression ratio upto 38:1. Keywords: SOFM, Entropy Coding, Codewords, Image Security, Scrambler, encryption, JPEG, Arithmetic Coding.. 80
  • 2. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.4, 2012 1. Introduction: Message security is the science and study of methods for protecting message signals from unauthorized disclosure and modification. The message signals include digital data from computers and other communication systems, digital image data, analog messages including audio signals like speech signals, video signals and other instrumentation signals. Secure image transmission is of paramount importance in defense, surveillance and other strategic applications. The compressed image data can be encrypted before transmission over an insecure channel. The image information can thus be denied to an unauthorized receiver thereby safeguarding eavesdropping. However, an intended receiver equipped with proper ‘Key’ and the decryption technique should be able to recover the original image from the received encrypted data. Cryptography is the science of deliberately disguising the signals using typical ciphers so that they assume the form of noise signal for an unauthorized receiver. The noise-like (encrypted) signals can be decrypted or deciphered back to recover the original message signals [1]. Scramblers are a class of substitution ciphers and have been found to be suitable for various security requirements such as those used by cable and satellite TV operators and mobile phone service providers [2,3]. In this paper secure compressed image compression scheme is presented where the input image data is first compressed using Self Organizing Feature Maps (SOFM) based technique. The compressed image data is then scrambled using a typical scrambler so that it appears noise like for an unauthorized receiver [4]. The Simulation results for the compressed image transmission and reception using the proposed techniques have been presented in the paper for standard grayscale images. 2 Proposed technique of secure image transmission using SOFM based Image Compression: Block Diagram of the proposed compressed Image Encryption technique is shown in Fig. 1. The input image data is applied to the image partitioning and vectorization block where the whole image is divided into 4x4 non-overlapping blocks. Each block serves as a vector of 16 elements for the Self Organizing Feature Map (SOFM) network by which the indexes of the codewords are determined. These indexes are coded in a binary stream of 0’s and 1’s using a variable length Entropy Coding Scheme. These long strings 81
  • 3. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.4, 2012 of 0’s and 1’s are scrambled by a typical scrambler shown in Fig. 2 in order to secure the image data from the unauthorized receivers. 3. Self Organizing Feature Maps: Self Organizing Feature Map (SOFM) has formed a basis for a great deal of research into applying network models to the problem of codebook design in Vector Quantization [5]. The SOFM introduced by Kohonen is an unsupervised learning method which has both clustering and visualization properties and creates a correspondence between the input space of stimuli and the output space constituted of the codebook elements (the code words or neurons) [6]. The learning algorithm ensures that the most highly activated node as well as its neighbors move towards a sample presented to the network. The networks are self organizing in that nodes tend to attain weight vectors that capture characteristics of the input vector space, with the neighborhood relation translating into proximity in Euclidean space, even if the initial values of weight vectors are arbitrary. In the SOFM algorithm, the vector X is used to update not only the winning class but also its neighboring classes according to the following rule: For each vector X in the training 1. X is classified according to: X ∈Ci if X −Wi = minX −Wj .......... 1) ..( 2. The weights Wj are then updated according to: W j (t ) + lr (X − W j (t ))2 if C j ∈ N (Ci , t )  W j (t + 1) =  ...(2) W j (t )  if C j ∉ N (Ci , t ) Where W is the feature vector, lr is the learning parameter in the range of 0-1 and N (Ci, t) is the set of classes, which are in the neighborhood of the winning class Ci at time t. The subscript ‘j’ represents the index of all vectors in the neighborhood of the ith feature vector. 4. Binary Arithmetic Coding: In Arithmetic coding (AC) Scheme, a one to one correspondence between source symbols and codewords does not exist; instead, an entire sequence of source symbols (or message) is assigned a single arithmetic 82
  • 4. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.4, 2012 codeword. As the number of symbols in the message increases, the interval used to represent it becomes smaller and the number of information bits required to represent the interval becomes larger [7]. 5. Scrambler for Data: Fig. 2 shows the circuit diagram of the proposed scrambler. Here tap-gain values are continuously changed with the help of a PN-sequence. Inputs QA, QB, QC and QD to the AND gates are the outputs of a 15-bit PN- sequence generator. The value of a Qi=1 means that the corresponding shift register stage is effective in the generation of the Key ‘K’. Similarly Qi=0 means that ai =1. For unscrambling the received message, the receiver has to know the value of N, the PN-sequence and its starting point. Thus, the unscrambling becomes very difficult even for smaller values of N, thus minimizing the problem of error propagation 6. Simulation Results: The proposed Algorithm based on SOFM and Arithmetic Coding has been implemented using MATLAB- 7.02 and the proposed algorithm has been simulated on various grayscale images of size 256x256 with 8 bits per pixel over a PC with Intel Pentium IV, 2.9 GHz and 256MB RAM under Windows-XP operating system. The ‘Lena’ and ‘Couple’ images are used for training the initial set and codebook design. The performance of the proposed technique is tested for images ‘Einstein’ and ‘Woman’, which are outside the training sequence. The performance is measured for various codebook sizes of 2n where n is an integer varying from 5 to 8, and then compression efficiency is measured in terms of compression ratio (CR) which is defined as: . … … … 3 . … … 4 !" # The quality of the decoded image is measured in terms of Peak-Signal-to-Noise-Ratio (PSNR) which is defined as: 2551 %&' 10 log!- . ? … … 5 1 =;! ;! ∑ ∑ 45 6, 8 9 51 6, 8 : 1 2' ><- <- ! 83
  • 5. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.4, 2012 Where NxM is the image size, f1 (i, j) is the random field of the original field intensities and f2 (i, j) denotes the random field of the reconstructed image intensities. Fig. 3 outlines the simulation results of the image transmission over the proposed secure image transmission systems. Variation of CR with PSNR and Codebook size has been plotted. Standard grayscale image including Lena, Couple, Einstein were first compressed using SOFM based image compression technique. The compressed image data has been subsequently scrambled using the modified scrambler as shown in Fig. 2. The Scrambled image corresponding to the given standard image ‘woman’ is shown in Fig. 4 along with the original and the reconstructed images. The waveforms of the Key bits, Arithmetic Coded bits and the scrambled image data has been presented in Fig. 5. Further, the histogram of the original and encrypted image is shown in Fig. 6, and the Correlation analysis of the plain image and encrypted image has been presented in Fig. 7. 7. Comparison with JPEG: The performance of the proposed technique for image compression has been compared for the standard image ‘Woman’ with the performance obtained by using JPEG standard using 8x8 default quantization for compression. The results of the comparison have been presented in Fig. 8. It can be observed from the figure that the proposed method outperforms the DCT based JPEG by up to 1 dB. 8. Conclusion: The paper presents an interesting technique for fast mage data transmission with data security against eaves dropping. An SOFM technique has been used for data compression while as a typical scrambler has been used for data encryption for message security. The proposed technique is shown to be very efficient for secure image data compression with reduced bit error propagation. The transmission and reception of encrypted image using the proposed technique has been tested experimentally on standard grayscale images. The proposed technique provides a compression ratio of about 38:1 which outperforms the conventional JPEG standard for image compression. The simulation of the proposed system has been carried out using 84
  • 6. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.4, 2012 MATLAB 7.02 and the performance results have been presented in the paper. The performance of the proposed secure image transmission system has been found to be satisfactory. References: 1. Shaaban, E., “Data Compression Basics,”, 2002, Retrieved from- http://meseec.ce.rit.edu/eecc694-spring2000/694-5-9-2000.pdf 2. M. Buer and J. Wallace, “Integrated Security for digital video broadcast”, IEEE Trans. Cons. Elect., Aug. 1996, vol. 42, No. 3, pp. 500-503. 3. Dorothy Elizabeth and Robling Denning, “Cryptography and Data Security”, Addison Wesley, 1982. 4. H. Feistel, “Cryptography and Computer Privacy”, Scientific America, May 1973, vol. 228, pp. 15-23, 5. Wu, Chung-Ping & Kuo, C.-C.J., “Design of integrated multimedia compression and encryption systems,” IEEE Transactions on Multimedia, 2005, Vol. 7, No. 5, pp 828 – 839. 6. P. Wayner, “A redundancy reducing Cipher”, Cryptologia, April 1988, vol. XII, pp. 107. 7. J. B. Kam & G. I. Davida, “Structured design of substitutional permutation encryption networks”, IEEE Trans. Computers, Oct. 1979, vol. C-28, pp. 747-753. Input SOFM based Arithmetic Image Image Vector coding partition and Scrambler Coded quantization Bit stream Code book Fig. 1 Proposed Image Encryption using SOFM based Image Compression 85
  • 7. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.4, 2012 QA QA QB QB SHIFT SHIFT QC QC QD QD Compressed image data Cryptogram Decrypted Compressed Image data Fig. 2 Proposed Image Data Scrambler Fig. 3 (a) Variation of Compression ratio with PSNR (b) Variation of Compression ratio with Codebook Size 86
  • 8. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.4, 2012 (a) (b) (c) Fig. 4 SOFM based Secure Image transmission using standard Image Woman (a) Original Image (b) Scrambled Image (c) Reconstructed Image (a) (b) (c) Fig. 5 Various Waveforms generated: (a) Key bits (b) Arithmetic Code (c) Scrambled Image data 87
  • 9. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.4, 2012 Fig. 6 Histograms of Original and Encrypted Image ‘Woman’ Fig. 7 Correlation analysis of original image and encrypted image Fig. 8 Performance comparison of the proposed method with JPEG for image woman 88
  • 10. International Journals Call for Paper The IISTE, a U.S. publisher, is currently hosting the academic journals listed below. The peer review process of the following journals usually takes LESS THAN 14 business days and IISTE usually publishes a qualified article within 30 days. Authors should send their full paper to the following email address. More information can be found in the IISTE website : www.iiste.org Business, Economics, Finance and Management PAPER SUBMISSION EMAIL European Journal of Business and Management EJBM@iiste.org Research Journal of Finance and Accounting RJFA@iiste.org Journal of Economics and Sustainable Development JESD@iiste.org Information and Knowledge Management IKM@iiste.org Developing Country Studies DCS@iiste.org Industrial Engineering Letters IEL@iiste.org Physical Sciences, Mathematics and Chemistry PAPER SUBMISSION EMAIL Journal of Natural Sciences Research JNSR@iiste.org Chemistry and Materials Research CMR@iiste.org Mathematical Theory and Modeling MTM@iiste.org Advances in Physics Theories and Applications APTA@iiste.org Chemical and Process Engineering Research CPER@iiste.org Engineering, Technology and Systems PAPER SUBMISSION EMAIL Computer Engineering and Intelligent Systems CEIS@iiste.org Innovative Systems Design and Engineering ISDE@iiste.org Journal of Energy Technologies and Policy JETP@iiste.org Information and Knowledge Management IKM@iiste.org Control Theory and Informatics CTI@iiste.org Journal of Information Engineering and Applications JIEA@iiste.org Industrial Engineering Letters IEL@iiste.org Network and Complex Systems NCS@iiste.org Environment, Civil, Materials Sciences PAPER SUBMISSION EMAIL Journal of Environment and Earth Science JEES@iiste.org Civil and Environmental Research CER@iiste.org Journal of Natural Sciences Research JNSR@iiste.org Civil and Environmental Research CER@iiste.org Life Science, Food and Medical Sciences PAPER SUBMISSION EMAIL Journal of Natural Sciences Research JNSR@iiste.org Journal of Biology, Agriculture and Healthcare JBAH@iiste.org Food Science and Quality Management FSQM@iiste.org Chemistry and Materials Research CMR@iiste.org Education, and other Social Sciences PAPER SUBMISSION EMAIL Journal of Education and Practice JEP@iiste.org Journal of Law, Policy and Globalization JLPG@iiste.org Global knowledge sharing: New Media and Mass Communication NMMC@iiste.org EBSCO, Index Copernicus, Ulrich's Journal of Energy Technologies and Policy JETP@iiste.org Periodicals Directory, JournalTOCS, PKP Historical Research Letter HRL@iiste.org Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Public Policy and Administration Research PPAR@iiste.org Zeitschriftenbibliothek EZB, Open J-Gate, International Affairs and Global Strategy IAGS@iiste.org OCLC WorldCat, Universe Digtial Library , Research on Humanities and Social Sciences RHSS@iiste.org NewJour, Google Scholar. Developing Country Studies DCS@iiste.org IISTE is member of CrossRef. All journals Arts and Design Studies ADS@iiste.org have high IC Impact Factor Values (ICV).