SlideShare a Scribd company logo
1 of 12
A Scheme for Encrypted Image Data
Compression
Guide
Dr. D. G. Harkut
Department of Computer Science and Engineering
Prof Ram Meghe College of Engineering and Management
Badnera-Amravati, India.
2022-2023
By:
A. B. Xyssss (19)
S. F. Bdfjjjjj (23)
A. B. Xyssss (07)
S. F. Bdfjjjjj (67)
Content
 Introduction
 Literature Analysis
 Problem Definition
 Proposed Approach / Basic Idea / Algorithm
 Technology Used
 Advantages / Disadvantages of this approach and Conclusion
 References
Project Seminar-I
Introduction
Image Compression:
•The objective of Image Compression is to reduce
irrelevance and redundancy of the image data in order to be
able to store or transmit data in an efficient form.
• Types of image Compression are:
•Lossless Image Compression:
•Lossy Image Compression
Image Encryption:
• Image encryption techniques try to convert original image
to another image that is hard to understand; to keep the
image confidential between users, in other word, it is
essential that nobody should get to know the content without
a key for decryption.
Project Seminar-I
Introduction
Image Compression Standards:
•Different compression standard exists
• Image Compression Standrds are:
•JPEG:
Encryption Standards:
• Symmetric Encryption
• Asymmetric Encryption
Project Seminar-I
Literature Analysis
Reference Basic concept Database Performance
Evaluation parameters
Claim by Authors Our Findings
[1] Xinpeng Zhang,
Yanli Ren,Liquan
Shen, Zhenxing
Qian, Guorui Feng-
Aug. 2014
Image Compressing
with Encryption
Gray-scale Image Compression ratio A scheme with
improved
compression
performance and
reduced
computational
complexity.
Compression
approach is not
compatible with other
encryption methods
like standard stream
cipher or AES/DES.
[2] M. Johnson, P.
Ishwar, V. M.
Prabhakaran, D.
Schonberg, and K.
Ramchandran, Oct.
2004
Transmitting data
over an insecure and
bandwidth-
constrained channel
by applying
Compression prior
to Encryption.
Redundant Data. Channel Bandwidth,
Frequency,
Compression
efficiency,
encryption
efficiency,
encryption and
compression rate.
The encrypted
data can be
compressed to the
same rate as the
original,
unencrypted
data could have
been compressed.
The approach can be
extend in future for
multimedia data like
images and videos.
[3] Z. Erkin, A. Piva, S.
Katzenbeisser, R. L.
Lagendijk, J.
Shokrollahi, G. Neven,
and M. Barni, 2007
Protecting and
Retrieving of Encrypted
Multimedia Content
JPEG2000 bit streams Channel Bandwidth,
Frequency, encryption
efficiency, encryption
and compression rate.
The study focuses on
cryptography used in
existing solutions
to processing of
encrypted signals.
The study focuses on
analysis and retrieval
Of multimedia content, as
well as multimedia
content protection
domains of secure signal
processing.
Project Seminar-I
Reference Basic concept Database Performance
Evaluation
parameters
Claim by Authors Our Findings
[4] G. Jakimoski and K.
P. Subbalakshmi, 2007
Security constrains in
Compressing Encrypted
Data
Redundant Data Time , compression
ratio.
The
compression does not
compromise the security
of the system.
The approach can be
extend in future for
multimedia data like
images and videos.
[5] R. Lazzeretti and M.
Barni, Aug 2008.
Lossless compression of
encrypted grey-level and
color images
Grey-level and color
images
Bit rates, compression
ratio.
Spatial de-correlation,
working on the
prediction error gives
much better results
The results obtained are
promising, even if the
gap to state-of-the-art
compression in the plain
domain is still large.
[6] A. Kumar and A.
Makur, 2008.
Distributed source
coding based
encryption and
lossless compression
of gray scale and
color images
gray scale and color
images
Prediction error, bit
rate, compression
ratio.
An improvement on
the compression
gains of RGB color
images was obtained
by exploiting the
correlation
among the planes.
Both in terms
of computational
cost and lossless
compression it is
always advantageous
to apply encryption
on the prediction
errors
instead of applying
encryption directly
on the image.
Literature Analysis
Project Seminar-I
Problem Definition
After analyzing the literature, following problem definition is
formulated:
Data compression plays a very important role in the information
transmission domain. In transmission of information, security is the key
issue. To address the issue of security and optimal use of bandwidth,
there is a need of some mechanism which can perform both these tasks.
Here, the objective is to develop a scheme to perform compression of
encrypted image data. Firstly, the encryption mechanism will be
developed and later the compression mechanism.
Project Seminar-I
Proposed Approach / Basic Idea / Algorithm
Technology Used
 Advantages / Disadvantages of this approach and Conclusion
 References
Project Seminar-I
Technology Used
Advantages / Disadvantages of this approach and Conclusion
 References
Project Seminar-I
Conclusion
Advantages
Disadvantages
Conclusion
Project Seminar-I
References
[1] Xinpeng Zhang; Yanli Ren; Liquan Shen; Zhenxing Qian; Guorui Feng, "Compressing Encrypted Images With Auxiliary
Information," Multimedia, IEEE Transactions on , vol.16, no.5, pp.1327,1336, Aug. 2014
[2] M. Johnson, P. Ishwar, V. M. Prabhakaran, D. Schonberg, and K. Ramchandran, “On compressing encrypted data,”
IEEE Trans. Signal Process., vol. 52, no. 10, pp. 2992–3006, Oct. 2004.
[3] Z. Erkin, A. Piva, S. Katzenbeisser, R. L. Lagendijk, J. Shokrollahi, G. Neven, and M. Barni, “Protection and retrieval of
encrypted multimedia content: When cryptography meets signal processing,” EURASIP J. Inf. Security, pp. 1–20, 2007.
[4] G. Jakimoski and K. P. Subbalakshmi, “Security of compressing encrypted sources,” in Proc. 41st Asilomar Conf.
Signals, Systems and Computers (ACSSC 2007), 2007, pp. 901–903.
[5] R. Lazzeretti and M. Barni, “Lossless compression of encrypted greylevel and color images,” in Proc. 16th Eur. Signal
Processing Conf. (EUSIPCO 2008), Lausanne, Switzerland, Aug. 2008.
[6] A. Kumar and A. Makur, “Distributed source coding based encryption and lossless compression of gray scale and color
images,” in Proc. IEEE 10th Workshop Multimedia Signal Processing, 2008, pp. 760–764.
[7] W. Liu, W. Zeng, L. Dong, and Q. Yao, “Efficient compression of encrypted grayscale images,” IEEE Trans. Signal
Process, vol. 19, no. 4, pp. 1097–1102, Apr. 2010.
[8] D. Schonberg, S. C. Draper, C. Yeo, and K. Ramchandran, “Toward compression of encrypted images and video
sequences,” IEEE Trans. Inf. Forensics Security, vol. 3, no. 4, pp. 749–762, 2008.
[9] D. Klinc, C. Hazayy, A. Jagmohan, H. Krawczyk, and T. Rabinz, “On compression of data encrypted with block ciphers,”
in Proc. IEEE Data Compression Conf. (DCC ’09), 2009, pp. 213–222.
[10] E. J. Candes and M. B. Wakin, “An introduction to compressive sampling,” IEEE Signal Process. Mag., vol. 25, no. 2,
pp. 21–30, Mar-2008.
Project Seminar-I
Thank You………

More Related Content

Similar to Presentation_Format (1).ppt

Image compression and reconstruction using a new approach by artificial neura...
Image compression and reconstruction using a new approach by artificial neura...Image compression and reconstruction using a new approach by artificial neura...
Image compression and reconstruction using a new approach by artificial neura...
Hưng Đặng
 

Similar to Presentation_Format (1).ppt (20)

Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
 
Elliptical curve cryptography image encryption scheme with aid of optimizatio...
Elliptical curve cryptography image encryption scheme with aid of optimizatio...Elliptical curve cryptography image encryption scheme with aid of optimizatio...
Elliptical curve cryptography image encryption scheme with aid of optimizatio...
 
Elliptical curve cryptography image encryption scheme with aid of optimizatio...
Elliptical curve cryptography image encryption scheme with aid of optimizatio...Elliptical curve cryptography image encryption scheme with aid of optimizatio...
Elliptical curve cryptography image encryption scheme with aid of optimizatio...
 
1.pdf
1.pdf1.pdf
1.pdf
 
D010312230
D010312230D010312230
D010312230
 
A secured-rgb-image-steganography-using-secret-key
A secured-rgb-image-steganography-using-secret-keyA secured-rgb-image-steganography-using-secret-key
A secured-rgb-image-steganography-using-secret-key
 
A Literature Review on Image Steganography Using AES
A Literature Review on Image Steganography Using AESA Literature Review on Image Steganography Using AES
A Literature Review on Image Steganography Using AES
 
August 2022: Top 10 Read Articles in Signal & Image Processing
August 2022: Top 10 Read Articles in Signal & Image ProcessingAugust 2022: Top 10 Read Articles in Signal & Image Processing
August 2022: Top 10 Read Articles in Signal & Image Processing
 
September 2022: Top 10 Read Articles in Signal & Image Processing
September 2022: Top 10 Read Articles in Signal & Image ProcessingSeptember 2022: Top 10 Read Articles in Signal & Image Processing
September 2022: Top 10 Read Articles in Signal & Image Processing
 
January 2023: Top 10 Read Articles in Signal &Image Processing
January 2023: Top 10 Read Articles in Signal &Image Processing	January 2023: Top 10 Read Articles in Signal &Image Processing
January 2023: Top 10 Read Articles in Signal &Image Processing
 
Image compression and reconstruction using a new approach by artificial neura...
Image compression and reconstruction using a new approach by artificial neura...Image compression and reconstruction using a new approach by artificial neura...
Image compression and reconstruction using a new approach by artificial neura...
 
Image compression and reconstruction using a new approach by artificial neura...
Image compression and reconstruction using a new approach by artificial neura...Image compression and reconstruction using a new approach by artificial neura...
Image compression and reconstruction using a new approach by artificial neura...
 
June 2022: Top 10 Read Articles in Signal & Image Processing
June 2022: Top 10 Read Articles in Signal & Image   ProcessingJune 2022: Top 10 Read Articles in Signal & Image   Processing
June 2022: Top 10 Read Articles in Signal & Image Processing
 
October 2022: Top 10 Read Articles in Signal & Image Processing
October 2022: Top 10 Read Articles in Signal & Image ProcessingOctober 2022: Top 10 Read Articles in Signal & Image Processing
October 2022: Top 10 Read Articles in Signal & Image Processing
 
Image Steganography Techniques: An Overview
Image Steganography Techniques: An OverviewImage Steganography Techniques: An Overview
Image Steganography Techniques: An Overview
 
19_2
19_219_2
19_2
 
A0540106
A0540106A0540106
A0540106
 
July 2022: Top 10 Read Articles in Signal & Image Processing
July 2022: Top 10 Read Articles in Signal & Image ProcessingJuly 2022: Top 10 Read Articles in Signal & Image Processing
July 2022: Top 10 Read Articles in Signal & Image Processing
 
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET-  	  Hybrid Approach to Text & Image Steganography using AES and LSB Te...IRJET-  	  Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
 

Recently uploaded

UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 

Recently uploaded (20)

Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 

Presentation_Format (1).ppt

  • 1. A Scheme for Encrypted Image Data Compression Guide Dr. D. G. Harkut Department of Computer Science and Engineering Prof Ram Meghe College of Engineering and Management Badnera-Amravati, India. 2022-2023 By: A. B. Xyssss (19) S. F. Bdfjjjjj (23) A. B. Xyssss (07) S. F. Bdfjjjjj (67)
  • 2. Content  Introduction  Literature Analysis  Problem Definition  Proposed Approach / Basic Idea / Algorithm  Technology Used  Advantages / Disadvantages of this approach and Conclusion  References Project Seminar-I
  • 3. Introduction Image Compression: •The objective of Image Compression is to reduce irrelevance and redundancy of the image data in order to be able to store or transmit data in an efficient form. • Types of image Compression are: •Lossless Image Compression: •Lossy Image Compression Image Encryption: • Image encryption techniques try to convert original image to another image that is hard to understand; to keep the image confidential between users, in other word, it is essential that nobody should get to know the content without a key for decryption. Project Seminar-I
  • 4. Introduction Image Compression Standards: •Different compression standard exists • Image Compression Standrds are: •JPEG: Encryption Standards: • Symmetric Encryption • Asymmetric Encryption Project Seminar-I
  • 5. Literature Analysis Reference Basic concept Database Performance Evaluation parameters Claim by Authors Our Findings [1] Xinpeng Zhang, Yanli Ren,Liquan Shen, Zhenxing Qian, Guorui Feng- Aug. 2014 Image Compressing with Encryption Gray-scale Image Compression ratio A scheme with improved compression performance and reduced computational complexity. Compression approach is not compatible with other encryption methods like standard stream cipher or AES/DES. [2] M. Johnson, P. Ishwar, V. M. Prabhakaran, D. Schonberg, and K. Ramchandran, Oct. 2004 Transmitting data over an insecure and bandwidth- constrained channel by applying Compression prior to Encryption. Redundant Data. Channel Bandwidth, Frequency, Compression efficiency, encryption efficiency, encryption and compression rate. The encrypted data can be compressed to the same rate as the original, unencrypted data could have been compressed. The approach can be extend in future for multimedia data like images and videos. [3] Z. Erkin, A. Piva, S. Katzenbeisser, R. L. Lagendijk, J. Shokrollahi, G. Neven, and M. Barni, 2007 Protecting and Retrieving of Encrypted Multimedia Content JPEG2000 bit streams Channel Bandwidth, Frequency, encryption efficiency, encryption and compression rate. The study focuses on cryptography used in existing solutions to processing of encrypted signals. The study focuses on analysis and retrieval Of multimedia content, as well as multimedia content protection domains of secure signal processing. Project Seminar-I
  • 6. Reference Basic concept Database Performance Evaluation parameters Claim by Authors Our Findings [4] G. Jakimoski and K. P. Subbalakshmi, 2007 Security constrains in Compressing Encrypted Data Redundant Data Time , compression ratio. The compression does not compromise the security of the system. The approach can be extend in future for multimedia data like images and videos. [5] R. Lazzeretti and M. Barni, Aug 2008. Lossless compression of encrypted grey-level and color images Grey-level and color images Bit rates, compression ratio. Spatial de-correlation, working on the prediction error gives much better results The results obtained are promising, even if the gap to state-of-the-art compression in the plain domain is still large. [6] A. Kumar and A. Makur, 2008. Distributed source coding based encryption and lossless compression of gray scale and color images gray scale and color images Prediction error, bit rate, compression ratio. An improvement on the compression gains of RGB color images was obtained by exploiting the correlation among the planes. Both in terms of computational cost and lossless compression it is always advantageous to apply encryption on the prediction errors instead of applying encryption directly on the image. Literature Analysis Project Seminar-I
  • 7. Problem Definition After analyzing the literature, following problem definition is formulated: Data compression plays a very important role in the information transmission domain. In transmission of information, security is the key issue. To address the issue of security and optimal use of bandwidth, there is a need of some mechanism which can perform both these tasks. Here, the objective is to develop a scheme to perform compression of encrypted image data. Firstly, the encryption mechanism will be developed and later the compression mechanism. Project Seminar-I
  • 8. Proposed Approach / Basic Idea / Algorithm Technology Used  Advantages / Disadvantages of this approach and Conclusion  References Project Seminar-I
  • 9. Technology Used Advantages / Disadvantages of this approach and Conclusion  References Project Seminar-I
  • 11. References [1] Xinpeng Zhang; Yanli Ren; Liquan Shen; Zhenxing Qian; Guorui Feng, "Compressing Encrypted Images With Auxiliary Information," Multimedia, IEEE Transactions on , vol.16, no.5, pp.1327,1336, Aug. 2014 [2] M. Johnson, P. Ishwar, V. M. Prabhakaran, D. Schonberg, and K. Ramchandran, “On compressing encrypted data,” IEEE Trans. Signal Process., vol. 52, no. 10, pp. 2992–3006, Oct. 2004. [3] Z. Erkin, A. Piva, S. Katzenbeisser, R. L. Lagendijk, J. Shokrollahi, G. Neven, and M. Barni, “Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing,” EURASIP J. Inf. Security, pp. 1–20, 2007. [4] G. Jakimoski and K. P. Subbalakshmi, “Security of compressing encrypted sources,” in Proc. 41st Asilomar Conf. Signals, Systems and Computers (ACSSC 2007), 2007, pp. 901–903. [5] R. Lazzeretti and M. Barni, “Lossless compression of encrypted greylevel and color images,” in Proc. 16th Eur. Signal Processing Conf. (EUSIPCO 2008), Lausanne, Switzerland, Aug. 2008. [6] A. Kumar and A. Makur, “Distributed source coding based encryption and lossless compression of gray scale and color images,” in Proc. IEEE 10th Workshop Multimedia Signal Processing, 2008, pp. 760–764. [7] W. Liu, W. Zeng, L. Dong, and Q. Yao, “Efficient compression of encrypted grayscale images,” IEEE Trans. Signal Process, vol. 19, no. 4, pp. 1097–1102, Apr. 2010. [8] D. Schonberg, S. C. Draper, C. Yeo, and K. Ramchandran, “Toward compression of encrypted images and video sequences,” IEEE Trans. Inf. Forensics Security, vol. 3, no. 4, pp. 749–762, 2008. [9] D. Klinc, C. Hazayy, A. Jagmohan, H. Krawczyk, and T. Rabinz, “On compression of data encrypted with block ciphers,” in Proc. IEEE Data Compression Conf. (DCC ’09), 2009, pp. 213–222. [10] E. J. Candes and M. B. Wakin, “An introduction to compressive sampling,” IEEE Signal Process. Mag., vol. 25, no. 2, pp. 21–30, Mar-2008. Project Seminar-I