SlideShare a Scribd company logo
1 of 17
Lossy Compression and Iterative
Reconstruction for Encrypted
Image

Presented By : Ganesh Gunjal
Guided by : Prof.Neeta A. Deshpande
Overview
ā€¢ Introduction

ā€¢ Literature Survey
ā€¢ Proposed Scheme
ā€¢ Conclusions and Future Scope

ā€¢ References
Introduction
Literature Survey
Sr.No

Year

Author

Technique used

Description

1

1963

R.G. Gallgar

Low ā€“density
parity ā€“
check(LDPC)

Original binary image is
encrypted by adding
pseudorandom string and
encrypted data are compressed
by finding the syndromes with
respect to LDPC.

2

2004

M . Johnson &
P. Ishwar

Gaussian Sequence
(Lossy as well as
Lossless
Compression)

Performance of compressing
encrypted image data is as good
as compressing non encrypted
image data.

3

2008

R. Lazzereti &
M. Barni

Low ā€“density
parity ā€“
check(LDPC)

Used for lossless compression of
gray value as well as color
encrypted images.
Literature Survey Contdā€¦.
Sr.No

Year

Author

Technique used

Description

3

2008

D. Schonbarg

Turbo Codes

Most significant bits (MSB) of
gray value encrypted image are
compressed same technique can
be extended for video
compression.

4

2009

A. Kumar &
A. Makur

compressive
sensing
techniques

Used to achieve lossy
compression of encrypted image
data same algorithm can be
extended for joint
decompression and decryption.
The Proposed Scheme
Image Encryption
Compression
Compression Contdā€¦..
Compression Contdā€¦..
Compression Contdā€¦..
Compression Contdā€¦..
Image Reconstruction

Where
Conclusions and Future Scope
ļ±Proposed scheme compresses encrypted image.
ļ±Proposed scheme only shuffles pixel position .

ļ±Higher the compression ratio and smoother the original image
gives better quality reconstructed image.
ļ±In future lossy compression for encrypted image can be
implemented more secure methods.
References
[1] M. Johnson, P. Ishwar, V. M. Prabhakaran, D. Schonberg, and K.
Ramchandran, ā€œOn compressing encrypted data,ā€ IEEE Trans. Signal
Process., vol. 52, no. 10, pt. 2, pp. 2992ā€“3006, Oct. 2004.
[2] R. G. Gallager, ā€œLow Density Parity Check Codes,ā€ Ph.D.
dissertation, Mass. Inst. Technol., Cambridge, MA, 1963.

[3] D. Schonberg, S. C. Draper, and K. Ramchandran, ā€œOn blind
compression of encrypted correlated data approaching the source
entropy rate,ā€ in Proc. 43rd Annu. Allerton Conf., Allerton, IL, 2005.
[4] R. Lazzeretti and M. Barni, ā€œLossless compression of encrypted
grey-level and color images,ā€ in Proc.16th Eur. Signal Processing
Conf. (EUSIPCO 2008), Lausanne, Switzerland, Aug. 2008 [Online].
References Contdā€¦..
[5]W. Liu, W. Zeng, L. Dong, and Q. Yao, ā€œEfficient compression of
encrypted grayscale images,ā€ IEEE Trans. Image Process., vol. 19, no. 4,
pp. 1097ā€“1102, Apr. 2010.
[6] D. Schonberg, S. C. Draper, C. Yeo, and K. Ramchandran, ā€œToward
compression of encrypted images and video sequences,ā€ IEEE Trans. Inf.
Forensics Security, vol. 3, no. 4, pp. 749ā€“762, Dec. 2008.
[7] A. Kumar and A. Makur, ā€œLossy compression of encrypted image
by compressing sensing technique,ā€ in Proc. IEEE Region 10
Conf.(TENCON 2009), 2009, pp. 1ā€“6.

[8] T. Bianchi, A. Piva, and M. Barni, ā€œComposite signal representation
for fast and storage-efficient processing of encrypted signals,ā€ IEEE
Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 180ā€“187, Mar. 2010.
Thank Youā€¦..

More Related Content

Similar to Presentation

Bilateral filtering for gray and color images
Bilateral filtering for gray and color imagesBilateral filtering for gray and color images
Bilateral filtering for gray and color images
Harshal Ladhe
Ā 

Similar to Presentation (20)

April 2022: Top Read Articles in Signal & Image Processing
April 2022: Top Read Articles in Signal & Image ProcessingApril 2022: Top Read Articles in Signal & Image Processing
April 2022: Top Read Articles in Signal & Image Processing
Ā 
April 2023: Top 10 Read Articles in Signal & Image Processing
April 2023: Top 10 Read Articles in Signal & Image ProcessingApril 2023: Top 10 Read Articles in Signal & Image Processing
April 2023: Top 10 Read Articles in Signal & Image Processing
Ā 
May 2022: Top Read Articles in Signal & Image Processing
May 2022: Top Read Articles in Signal & Image ProcessingMay 2022: Top Read Articles in Signal & Image Processing
May 2022: Top Read Articles in Signal & Image Processing
Ā 
October 2022: Top 10 Read Articles in Signal & Image Processing
October 2022: Top 10 Read Articles in Signal & Image ProcessingOctober 2022: Top 10 Read Articles in Signal & Image Processing
October 2022: Top 10 Read Articles in Signal & Image Processing
Ā 
August 2022: Top 10 Read Articles in Signal & Image Processing
August 2022: Top 10 Read Articles in Signal & Image ProcessingAugust 2022: Top 10 Read Articles in Signal & Image Processing
August 2022: Top 10 Read Articles in Signal & Image Processing
Ā 
September 2022: Top 10 Read Articles in Signal & Image Processing
September 2022: Top 10 Read Articles in Signal & Image ProcessingSeptember 2022: Top 10 Read Articles in Signal & Image Processing
September 2022: Top 10 Read Articles in Signal & Image Processing
Ā 
June 2022: Top 10 Read Articles in Signal & Image Processing
June 2022: Top 10 Read Articles in Signal & Image   ProcessingJune 2022: Top 10 Read Articles in Signal & Image   Processing
June 2022: Top 10 Read Articles in Signal & Image Processing
Ā 
January 2023: Top 10 Read Articles in Signal &Image Processing
January 2023: Top 10 Read Articles in Signal &Image Processing	January 2023: Top 10 Read Articles in Signal &Image Processing
January 2023: Top 10 Read Articles in Signal &Image Processing
Ā 
Comparison of thresholding methods
Comparison of thresholding methodsComparison of thresholding methods
Comparison of thresholding methods
Ā 
Bilateral filtering for gray and color images
Bilateral filtering for gray and color imagesBilateral filtering for gray and color images
Bilateral filtering for gray and color images
Ā 
Image Steganography: An Inevitable Need for Data Security, Authors: Sneh Rach...
Image Steganography: An Inevitable Need for Data Security, Authors: Sneh Rach...Image Steganography: An Inevitable Need for Data Security, Authors: Sneh Rach...
Image Steganography: An Inevitable Need for Data Security, Authors: Sneh Rach...
Ā 
Improved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesImproved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB images
Ā 
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINA SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
Ā 
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINA SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
Ā 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography Technique
Ā 
L045056469
L045056469L045056469
L045056469
Ā 
A Survey of Image Based Steganography
A Survey of Image Based SteganographyA Survey of Image Based Steganography
A Survey of Image Based Steganography
Ā 
Sub1586
Sub1586Sub1586
Sub1586
Ā 
Binarization of Ancient Document Images based on Multipeak Histogram Assumption
Binarization of Ancient Document Images based on Multipeak Histogram AssumptionBinarization of Ancient Document Images based on Multipeak Histogram Assumption
Binarization of Ancient Document Images based on Multipeak Histogram Assumption
Ā 
Hk3312911294
Hk3312911294Hk3312911294
Hk3312911294
Ā 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
Ā 

Recently uploaded (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Ā 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Ā 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
Ā 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Ā 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Ā 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
Ā 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Ā 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
Ā 
šŸ¬ The future of MySQL is Postgres šŸ˜
šŸ¬  The future of MySQL is Postgres   šŸ˜šŸ¬  The future of MySQL is Postgres   šŸ˜
šŸ¬ The future of MySQL is Postgres šŸ˜
Ā 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Ā 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
Ā 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Ā 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Ā 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Ā 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
Ā 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Ā 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Ā 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
Ā 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
Ā 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Ā 

Presentation

  • 1. Lossy Compression and Iterative Reconstruction for Encrypted Image Presented By : Ganesh Gunjal Guided by : Prof.Neeta A. Deshpande
  • 2. Overview ā€¢ Introduction ā€¢ Literature Survey ā€¢ Proposed Scheme ā€¢ Conclusions and Future Scope ā€¢ References
  • 4. Literature Survey Sr.No Year Author Technique used Description 1 1963 R.G. Gallgar Low ā€“density parity ā€“ check(LDPC) Original binary image is encrypted by adding pseudorandom string and encrypted data are compressed by finding the syndromes with respect to LDPC. 2 2004 M . Johnson & P. Ishwar Gaussian Sequence (Lossy as well as Lossless Compression) Performance of compressing encrypted image data is as good as compressing non encrypted image data. 3 2008 R. Lazzereti & M. Barni Low ā€“density parity ā€“ check(LDPC) Used for lossless compression of gray value as well as color encrypted images.
  • 5. Literature Survey Contdā€¦. Sr.No Year Author Technique used Description 3 2008 D. Schonbarg Turbo Codes Most significant bits (MSB) of gray value encrypted image are compressed same technique can be extended for video compression. 4 2009 A. Kumar & A. Makur compressive sensing techniques Used to achieve lossy compression of encrypted image data same algorithm can be extended for joint decompression and decryption.
  • 14. Conclusions and Future Scope ļ±Proposed scheme compresses encrypted image. ļ±Proposed scheme only shuffles pixel position . ļ±Higher the compression ratio and smoother the original image gives better quality reconstructed image. ļ±In future lossy compression for encrypted image can be implemented more secure methods.
  • 15. References [1] M. Johnson, P. Ishwar, V. M. Prabhakaran, D. Schonberg, and K. Ramchandran, ā€œOn compressing encrypted data,ā€ IEEE Trans. Signal Process., vol. 52, no. 10, pt. 2, pp. 2992ā€“3006, Oct. 2004. [2] R. G. Gallager, ā€œLow Density Parity Check Codes,ā€ Ph.D. dissertation, Mass. Inst. Technol., Cambridge, MA, 1963. [3] D. Schonberg, S. C. Draper, and K. Ramchandran, ā€œOn blind compression of encrypted correlated data approaching the source entropy rate,ā€ in Proc. 43rd Annu. Allerton Conf., Allerton, IL, 2005. [4] R. Lazzeretti and M. Barni, ā€œLossless compression of encrypted grey-level and color images,ā€ in Proc.16th Eur. Signal Processing Conf. (EUSIPCO 2008), Lausanne, Switzerland, Aug. 2008 [Online].
  • 16. References Contdā€¦.. [5]W. Liu, W. Zeng, L. Dong, and Q. Yao, ā€œEfficient compression of encrypted grayscale images,ā€ IEEE Trans. Image Process., vol. 19, no. 4, pp. 1097ā€“1102, Apr. 2010. [6] D. Schonberg, S. C. Draper, C. Yeo, and K. Ramchandran, ā€œToward compression of encrypted images and video sequences,ā€ IEEE Trans. Inf. Forensics Security, vol. 3, no. 4, pp. 749ā€“762, Dec. 2008. [7] A. Kumar and A. Makur, ā€œLossy compression of encrypted image by compressing sensing technique,ā€ in Proc. IEEE Region 10 Conf.(TENCON 2009), 2009, pp. 1ā€“6. [8] T. Bianchi, A. Piva, and M. Barni, ā€œComposite signal representation for fast and storage-efficient processing of encrypted signals,ā€ IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 180ā€“187, Mar. 2010.