4. Literature Survey
Sr.No
Year
Author
Technique used
Description
1
1963
R.G. Gallgar
Low ādensity
parity ā
check(LDPC)
Original binary image is
encrypted by adding
pseudorandom string and
encrypted data are compressed
by finding the syndromes with
respect to LDPC.
2
2004
M . Johnson &
P. Ishwar
Gaussian Sequence
(Lossy as well as
Lossless
Compression)
Performance of compressing
encrypted image data is as good
as compressing non encrypted
image data.
3
2008
R. Lazzereti &
M. Barni
Low ādensity
parity ā
check(LDPC)
Used for lossless compression of
gray value as well as color
encrypted images.
5. Literature Survey Contdā¦.
Sr.No
Year
Author
Technique used
Description
3
2008
D. Schonbarg
Turbo Codes
Most significant bits (MSB) of
gray value encrypted image are
compressed same technique can
be extended for video
compression.
4
2009
A. Kumar &
A. Makur
compressive
sensing
techniques
Used to achieve lossy
compression of encrypted image
data same algorithm can be
extended for joint
decompression and decryption.
14. Conclusions and Future Scope
ļ±Proposed scheme compresses encrypted image.
ļ±Proposed scheme only shuffles pixel position .
ļ±Higher the compression ratio and smoother the original image
gives better quality reconstructed image.
ļ±In future lossy compression for encrypted image can be
implemented more secure methods.
15. References
[1] M. Johnson, P. Ishwar, V. M. Prabhakaran, D. Schonberg, and K.
Ramchandran, āOn compressing encrypted data,ā IEEE Trans. Signal
Process., vol. 52, no. 10, pt. 2, pp. 2992ā3006, Oct. 2004.
[2] R. G. Gallager, āLow Density Parity Check Codes,ā Ph.D.
dissertation, Mass. Inst. Technol., Cambridge, MA, 1963.
[3] D. Schonberg, S. C. Draper, and K. Ramchandran, āOn blind
compression of encrypted correlated data approaching the source
entropy rate,ā in Proc. 43rd Annu. Allerton Conf., Allerton, IL, 2005.
[4] R. Lazzeretti and M. Barni, āLossless compression of encrypted
grey-level and color images,ā in Proc.16th Eur. Signal Processing
Conf. (EUSIPCO 2008), Lausanne, Switzerland, Aug. 2008 [Online].
16. References Contdā¦..
[5]W. Liu, W. Zeng, L. Dong, and Q. Yao, āEfficient compression of
encrypted grayscale images,ā IEEE Trans. Image Process., vol. 19, no. 4,
pp. 1097ā1102, Apr. 2010.
[6] D. Schonberg, S. C. Draper, C. Yeo, and K. Ramchandran, āToward
compression of encrypted images and video sequences,ā IEEE Trans. Inf.
Forensics Security, vol. 3, no. 4, pp. 749ā762, Dec. 2008.
[7] A. Kumar and A. Makur, āLossy compression of encrypted image
by compressing sensing technique,ā in Proc. IEEE Region 10
Conf.(TENCON 2009), 2009, pp. 1ā6.
[8] T. Bianchi, A. Piva, and M. Barni, āComposite signal representation
for fast and storage-efficient processing of encrypted signals,ā IEEE
Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 180ā187, Mar. 2010.