SlideShare a Scribd company logo
1 of 6
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1334
IMAGE COMPRESSION TECHNIQUE FOR QUANTIZED ENCRYPTED
IMAGES USING SVD
CHALAPAKA VEERENDRA BHARGHAV KUMAR1, K DURGA GANGA RAO2
1Student, Dept. of ECE, UCEK, JNTUK, AP, India
2Assistant Professor, Dept. of ECE, UCEK, JNTUK, AP, India.
-----------------------------------------------------------------------***--------------------------------------------------------------------
Abstract -A lossy compression technique for encrypted images using Discrete Wavelet Transform (DWT), Singular Value
Decomposition (SVD) and Huffman coding is analyzed in this paper. At the sender side first the image is encrypted by using
quantized wavelet coefficients and secret key. In the image selection of significant and less significant coefficients are performed
by using the wavelet domain. Encrypted LL sub-band data is quantized and compressedbyHuffmancodingwhile;othersub-bands
encrypted data is efficiently compressed by discarding irrelevant information using SVD and compressed by Huffman coding
techniques. At receiver side, a reliable decompression and decryption technique is used to reconstruct the original image content
with the help of compressed bit streams and inversequantization&secretkey. Theproposedmethodisevaluated using parameters
such as Compression Ratio (CR) and Peak-Signal-to-Noise Ratio (PSNR). This scheme has an advantage of using SVD duetowhich
we have obtained good compression performance while retaining the desirable features of the reconstructed image.
Key Words: Compression ratio, Quantized image coefficients (QIC), Quantized wavelet coefficients (QWC), discrete
wavelet transform, Huffman coding, Singular value decomposition, Image compression, Peak signal to noise ratio.
1. INTROUCTION
Image compression is an application of data compression that encodes the original image with few bits.Theobjective
of image compression is to reduce the redundancy of the image and to store or transmitdata inanefficientform. Themaingoal
of such system is to reduce the storage quantity as much as possible, and the decoded image displayed in the monitor can be
similar to the original image as much as can be. The rapid increase in of transmitting images in social networking sites has
raised two problems like secure transmission and large size of image. To rectifythisproblem we need quantized&encryptthe
image and then compression the image.
Lossy compression for Gaussian source can be achieved through Wyner–Ziv theorem [1]. Recently,a prediction error
based ETC technique is proposed by Vaish et al. [2]in which prediction errors are calculated by using a sub-imageandefficient
compression is achieved by using quantization and Huffman coding. More recently, an efficient compression of encrypted
image using wavelet difference coding is given by Kumar and Vaish[3].Inthispaper,a lossyETCtechniqueisproposedthrough
which good compression performance can be achieved while ensuring the security of images.
2. RELATED WORK
2.1 Singular value decomposition
SVD does is split a matrix into three important sub matrices to representthedata.GiventhematrixA,wherethesizeof
a is 𝑚 × 𝑛 where 𝑚 represents the number of rows in the matrix, and 𝑛 represents the number of columns, A can be broken
down into three sub matrices 𝐴 = 𝑈S𝑉 𝑇 where 𝑈 is of size 𝑚 × 𝑚, S is of size 𝑚 × 𝑛 and is diagonal, and 𝑉T is of size 𝑛 × 𝑛.
Um×n=Um×n× Sm×n×(Vn×n)T (1)
S m × n =[S’ c × d ...0; 0 ...0], c ≤ m, d ≤ n (2)
As S’ has less number of rows and columns with respect to S, therefore,tomakematrix multiplicationpossiblesomecolumnsof
U and rows of V need to be reduced as given below in eq.(3):
Um×m= U’m×c× U’m×(m-c)
and Vn×n = V’n×d ×V’n×(n-d) (3)
Hence the reconstructed matrix can be obtained as:
T’
m×n
= U’
m×c
×S’
c×d
×(V’n×n)T (4)
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1335
Since the singular matrix stores singular values (in descending order) therefore by the use of psychovisual concept,
ignoring the lower singular values will not significantly reduce the visual quality of the image [5].
2.2 Discrete Wavelet Transform
At first, the input image will be filtered into lowpass and highpass components through analysis filters.Afterfiltering,
the data amount of the lowpass and highpass components will become twice that of the original signal; therefore, the lowpass
and highpass components must be downsampled to reduce the data quantity. At the receiver, the received data must be
upsampled to approximate the original signal. Finally, the upsampled signal passes the synthesis filters and is added to form
the reconstructed approximation signal.
Figure (1) One level wavelet decomposition
3. PROPOSED METHOD
Block diagram of proposed ETC technique is demonstrated in Fig.2, and the complete process is summarized in the
following subsections.
Figure (2) Proposed quantized & encryption then compression scheme
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1336
Step1: Initially we will find QI Coefficients for the input image.
Step2: Then encryption will be carried out by using pseudo random coefficient permutation method.
Step3: apply DWT for encrypted image, then will get LL, LH, HL and HH sub-bands.
Step4: For LL sub-band section we will apply QWC and quantization.
Step5: Then Huffman coding decoding and Dequantization & inverse QWC are applied.
Step6: For LH, HL, HH sub-bands we will find QW coefficients.
Step7: Then SVD and Huffman coding decoding and inverse QWC will be carried out.
Step8: LL sub-band section and LH, HL, HH sub-band section will be merged by inverse DWT.
Step9: We apply inverse QI coefficients and inverse pseudo random coefficients permutation.
Step10: Finally reconstructed image is obtained.
Required equations list: [8]
QIC (i, j) = ((I (i, j)-IC min).R)/(IC max- IC min)(5)
E( i , j) = mod[QWC( i , j)-S( i , j) , 512] (6)
QWC( i, j )=|((WC(I ,j)-WCmin).R)/(WCmax- WCmin )|,
1 ≤ i ≤ P/2,1 ≤ j ≤ Q/2 (7)
Q( i, j ) =|E(i ,j)/ƞ|, 1 ≤ i ≤ P/2,1 ≤ j ≤ Q/2 (8) B=B1+B2+B3+B4 (9) CR=B/(P×Q)
(10)
Q’’ (i, j) as: Q’’ (i, j) = Q’(i, j)×ƞ.
A( i,j)=(Q’(i, j)/R).(WCmax – WCmin)+WCmin (11)
E’( i , j) = mod[A( i , j)-S( i , j) , 512] (12)
I’( i , j ) =(E’(i ,j)/R).( IC max – IC min)+IC min) (13)
4. EXPERIMENTAL RESULTS
The proposed ETC technique is implemented using Matlab 9.4.0. To demonstrate various 8-bit gray scale images like Lena,
Peppers each of size 512 ×512,are used which are shown in Figure(3)and Reconstructed images are shown in Figure(4).
4.1.1 Security analysis
The values of input image are encrypted using the pseudo random permutation is used to scramble the position of
each of the detail wavelet coefficients independently. Hence, it would be difficult to any attacker to practically implement a
successful brute force search on encrypted detail wavelet subbands. Therefore, the proposed scheme has attained a desired
level of security
4.1.2 Compression performance evalution
The compression performance of proposed work for various images, CR and PSNR values are calculated with η=1and on
different SVs. The proposed work is evaluated on different wavelets such as Biorthogonal, Haar. The results obtainedonthese
wavelets with the variation of SVs are demonstrated in Tables I–II, it can be analyzed from average values shown in various
tables that the proposed work gives better compression performance with improved image quality on Biorthogonal wavelet.
For an instance, when Lena image is compressed using Biorthogonal wavelet on 256 SVs and η=1it gives 3.7144 CR with
44.7610dB PSNR while the CR values for other waveletssuchasSymlets,Daubechies, Coiflets,HaarandDiscreteMeyerwavelet
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1337
are3.7174,3.714,3.7108,3.7124 and 3.7185 respectively while the corresponding PSNR values are 45.4934dB, 45.4366dB,
45.5626dB, 45.5292dB and 45.5087dB.
Figure(3) Original images
TABLE I
PSNR (DB) AND CR VARIOUS TEST IMAGES WITH VARYING SINGULAR VALUES ON BIORTHOGONAL (BIOR3.1) WAVELET.
TABLE II
PSNR (DB) AND CR VARIOUS TEST IMAGES WITH VARYING SINGULAR VALUES ON HAAR (HAAR) WAVELET.
SINGULARVALUES
256 128 64 32 16
PSNR CR PSNR CR PSNR CR PSNR CR PSNR CR
Lena 44.671 3.7144 31.1763 3.7131 27.2194 3.6697 26.5266 3.6074 26.3631 3.5458
Peppers 42.8998 3.7707 25.7576 3.7684 22.3036 3.7372 21.7012 3.6924 22.03 3.6495
Girl 44.6989 3.7285 36.3321 3.7346 32.5316 3.7047 31.9208 3.6607 32.2602 3.6089
Couple 43.0768 3.7211 29.9602 3.7178 25.8559 3.686 24.3602 3.638 23.8525 3.5921
Barbara 42.8276 3.6877 26.2814 3.6874 19.4147 3.6593 18.3028 3.6019 19.0613 3.5343
Boat 43.2044 3.7251 25.5841 3.705 21.9666 3.6764 21.204 3.6058 22.1529 3.5291
Baboon 40.5183 3.6501 28.2007 3.6436 24.6837 3.595 23.2061 3.525 22.4326 3.4464
Man 42.6831 3.7523 14.2492 3.7512 11.891 3.7198 11.9537 3.6747 12.4548 3.6326
Average 43.0724 3.7187 27.1927 3.7151 23.2333 3.681 22.3969 3.6257 22.5759 3.5673
SINGULARVALUES
256 128 64 32 16
PSNR CR PSNR CR PSNR CR PSNR CR PSNR CR
Lena 45.5292 3.7124 29.4322 3.7132 26.0479 3.6839 25.7669 3.635 26.7415 3.5872
Peppers 43.8741 3.7248 26.5318 3.7252 22.5342 3.7024 22.0475 3.6713 22.1539 3.6403
Girl 45.1921 3.7456 33.6053 3.746 30.0673 3.719 29.952 3.6747 30.3594 3.6287
Couple 44.217 3.6992 29.3154 3.6991 25.1571 3.6798 24.3589 3.6451 24.3256 3.6035
Barbara 41.2473 3.7018 25.8074 3.7007 20.0456 3.6705 19.0364 3.6138 19.7209 3.5418
Boat 44.4749 3.6615 25.8741 3.6598 22.3101 3.6325 21.0437 3.5867 21.2202 3.5364
Baboon 44.4175 3.7195 27.7242 3.7144 25.1509 3.6719 24.0118 3.6047 23.4898 3.5335
Man 40.8832 3.7473 14.0692 3.7479 11.7873 3.7245 11.6496 3.688 12.1284 3.6523
Average 44.1360 3.7092 28.3272 3.7083 24.4733 3.68 23.7453 3.633 24.0016 3.5816
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1338
Figure (4) Reconstructed images
5. CONCLUSIONS
This paper proposed a simplest effective Encryption-then-Compression technique using SVD and Huffmancoding. At
the sender end, content owner decomposed the original image into a waveletdecompositionusingDWT.Atthesendersidethe
input image is quantized and encrypted using pseudo random permutation, which makes the proposedschemesecureagainst
any brute force search. The encrypted LL sub-band is compressed by quantization and Huffman coding, the encrypted LH,HL,
HH sub-bands are compressed using SVD and Huffman coding technique. The receiver can perform the decompression,
decryption and inverse of DWT and inverse quantization to get the reconstructed image.
Figure (5) Graph between CR&PSNR for different compression schemes with comparison table.
The performance analysis of proposed work is evaluated by comparing the unencryptedimages.Itisevidentfromthe
quantitative and visual results that the proposed scheme over JPEG&JPEG2000 on compression ofencryptedimage.Proposed
scheme has an advantage of using SVD due to which we have obtained good compression performance while retaining the
desirable features of the reconstructed.
6. REFERENCES
[1] A. Wyner, J. Ziv, The rate-distortion function for source coding with side infor-mation at the decoder, IEEE Trans. Inf.
Theory IT-22 (1976) 1–10.J.
[2] A. Vaish, M. Kumar, Prediction error based compression of encrypted images, in: ICCCT-2015, ACM Digital Library, 2015,
pp.228–232.
[3] M. Kumar, A. Vaish, An efficient compression of encrypted images using WDR coding, in: SocPros-2015,in:SpringerSeries
Advances in Intelligent Systems and Computing, vol.436, 2016, pp.729–741..
[4] http://www.math.utah.edu/~goller/F15_M2270/BradyMathews_SVDImage.pdf.
[5] A.M. Rufai, G. Anbarjafari, H. Demirel, Lossy imagecompressionusingsingularvaluedecompositionandwaveletdifference
reduction, Digit. Signal Process. 24 (2014) 117–123.
[6] N. Bourbarkis, C. Alexopoulos, Picture data encryption using scan patterns, Pattern Recognit. 25(6) (1992) 567–581.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1339
[7] J.C. Yen, J.I. Guo, Efficient hierarchical chaotic image encryption algorithm and its VLSI realization, IEE Proc., Vis. Image
Signal Process. 147(2) (2000) 167–175.
[8] https://www.sciencedirect.com/science/article/pii/S1051200416301348?via%3Dihub

More Related Content

What's hot

Artificial Neural Network Based Graphical User Interface for Estimation of Fa...
Artificial Neural Network Based Graphical User Interface for Estimation of Fa...Artificial Neural Network Based Graphical User Interface for Estimation of Fa...
Artificial Neural Network Based Graphical User Interface for Estimation of Fa...
ijsrd.com
 
REVIEW ON SECRET IMAGE SHARING USING QR CODE GENERATION TECHNIC
REVIEW ON SECRET IMAGE SHARING USING QR CODE GENERATION TECHNICREVIEW ON SECRET IMAGE SHARING USING QR CODE GENERATION TECHNIC
REVIEW ON SECRET IMAGE SHARING USING QR CODE GENERATION TECHNIC
priyanka singh
 
Comparison of ezw and h.264 2
Comparison of ezw and h.264 2Comparison of ezw and h.264 2
Comparison of ezw and h.264 2
IAEME Publication
 
A Novel Approaches For Chromatic Squander Less Visceral Coding Techniques Usi...
A Novel Approaches For Chromatic Squander Less Visceral Coding Techniques Usi...A Novel Approaches For Chromatic Squander Less Visceral Coding Techniques Usi...
A Novel Approaches For Chromatic Squander Less Visceral Coding Techniques Usi...
IJERA Editor
 

What's hot (19)

Artificial Neural Network Based Graphical User Interface for Estimation of Fa...
Artificial Neural Network Based Graphical User Interface for Estimation of Fa...Artificial Neural Network Based Graphical User Interface for Estimation of Fa...
Artificial Neural Network Based Graphical User Interface for Estimation of Fa...
 
A proposed assessment metrics for image steganography
A proposed assessment metrics for image steganographyA proposed assessment metrics for image steganography
A proposed assessment metrics for image steganography
 
Project 2: Baseband Data Communication
Project 2: Baseband Data CommunicationProject 2: Baseband Data Communication
Project 2: Baseband Data Communication
 
REVIEW ON SECRET IMAGE SHARING USING QR CODE GENERATION TECHNIC
REVIEW ON SECRET IMAGE SHARING USING QR CODE GENERATION TECHNICREVIEW ON SECRET IMAGE SHARING USING QR CODE GENERATION TECHNIC
REVIEW ON SECRET IMAGE SHARING USING QR CODE GENERATION TECHNIC
 
Report
ReportReport
Report
 
Comparison of ezw and h.264 2
Comparison of ezw and h.264 2Comparison of ezw and h.264 2
Comparison of ezw and h.264 2
 
Effective Compression of Digital Video
Effective Compression of Digital VideoEffective Compression of Digital Video
Effective Compression of Digital Video
 
Gpu based-image-quality-assessment-using-structural-similarity-(ssim)-index
Gpu based-image-quality-assessment-using-structural-similarity-(ssim)-indexGpu based-image-quality-assessment-using-structural-similarity-(ssim)-index
Gpu based-image-quality-assessment-using-structural-similarity-(ssim)-index
 
Low-Cost Approximate and Adaptive Techniques for the Internet of Things
Low-Cost Approximate and Adaptive Techniques for the Internet of ThingsLow-Cost Approximate and Adaptive Techniques for the Internet of Things
Low-Cost Approximate and Adaptive Techniques for the Internet of Things
 
A Novel Approaches For Chromatic Squander Less Visceral Coding Techniques Usi...
A Novel Approaches For Chromatic Squander Less Visceral Coding Techniques Usi...A Novel Approaches For Chromatic Squander Less Visceral Coding Techniques Usi...
A Novel Approaches For Chromatic Squander Less Visceral Coding Techniques Usi...
 
Reversible encrypted data concealment in images by reserving room approach
Reversible encrypted data concealment in images by reserving room approachReversible encrypted data concealment in images by reserving room approach
Reversible encrypted data concealment in images by reserving room approach
 
Enhanced Human Computer Interaction using hand gesture analysis on GPU
Enhanced Human Computer Interaction using hand gesture analysis on GPUEnhanced Human Computer Interaction using hand gesture analysis on GPU
Enhanced Human Computer Interaction using hand gesture analysis on GPU
 
A0540106
A0540106A0540106
A0540106
 
International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...
 
Image Steganography Based On Non Linear Chaotic Algorithm
Image Steganography Based On Non Linear Chaotic AlgorithmImage Steganography Based On Non Linear Chaotic Algorithm
Image Steganography Based On Non Linear Chaotic Algorithm
 
IRJET- Image Classification – Cat and Dog Images
IRJET- Image Classification – Cat and Dog ImagesIRJET- Image Classification – Cat and Dog Images
IRJET- Image Classification – Cat and Dog Images
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
 
IRJET- Generating 3D Models Using 3D Generative Adversarial Network
IRJET- Generating 3D Models Using 3D Generative Adversarial NetworkIRJET- Generating 3D Models Using 3D Generative Adversarial Network
IRJET- Generating 3D Models Using 3D Generative Adversarial Network
 
An Uncompressed Image Encryption Algorithm Based on DNA Sequences
An Uncompressed Image Encryption Algorithm Based on DNA Sequences An Uncompressed Image Encryption Algorithm Based on DNA Sequences
An Uncompressed Image Encryption Algorithm Based on DNA Sequences
 

Similar to IRJET- Image Compression Technique for Quantized Encrypted Images using SVD

Digital image watermarking using dct with high security of
Digital image watermarking using dct with high security ofDigital image watermarking using dct with high security of
Digital image watermarking using dct with high security of
IAEME Publication
 

Similar to IRJET- Image Compression Technique for Quantized Encrypted Images using SVD (20)

Survey paper on image compression techniques
Survey paper on image compression techniquesSurvey paper on image compression techniques
Survey paper on image compression techniques
 
Enhancement of genetic image watermarking robust against cropping attack
Enhancement of genetic image watermarking robust against cropping attackEnhancement of genetic image watermarking robust against cropping attack
Enhancement of genetic image watermarking robust against cropping attack
 
IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...
IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...
IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...
 
A Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder PiracyA Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder Piracy
 
Tchebichef image watermarking along the edge using YCoCg-R color space for co...
Tchebichef image watermarking along the edge using YCoCg-R color space for co...Tchebichef image watermarking along the edge using YCoCg-R color space for co...
Tchebichef image watermarking along the edge using YCoCg-R color space for co...
 
A novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacksA novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacks
 
IRJET - Steganography based on Discrete Wavelet Transform
IRJET -  	  Steganography based on Discrete Wavelet TransformIRJET -  	  Steganography based on Discrete Wavelet Transform
IRJET - Steganography based on Discrete Wavelet Transform
 
IRJET- Design and Implementation of ATM Security System using Vibration Senso...
IRJET- Design and Implementation of ATM Security System using Vibration Senso...IRJET- Design and Implementation of ATM Security System using Vibration Senso...
IRJET- Design and Implementation of ATM Security System using Vibration Senso...
 
IRJET- Real Time Implementation of Bi-Histogram Equalization Method on Androi...
IRJET- Real Time Implementation of Bi-Histogram Equalization Method on Androi...IRJET- Real Time Implementation of Bi-Histogram Equalization Method on Androi...
IRJET- Real Time Implementation of Bi-Histogram Equalization Method on Androi...
 
IRJET- SEPD Technique for Removal of Salt and Pepper Noise in Digital Images
IRJET- SEPD Technique for Removal of Salt and Pepper Noise in Digital ImagesIRJET- SEPD Technique for Removal of Salt and Pepper Noise in Digital Images
IRJET- SEPD Technique for Removal of Salt and Pepper Noise in Digital Images
 
Z03301550160
Z03301550160Z03301550160
Z03301550160
 
IRJET - Wavelet based Image Fusion using FPGA for Biomedical Application
 IRJET - Wavelet based Image Fusion using FPGA for Biomedical Application IRJET - Wavelet based Image Fusion using FPGA for Biomedical Application
IRJET - Wavelet based Image Fusion using FPGA for Biomedical Application
 
A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics
 
A REVIEW ON LATEST TECHNIQUES OF IMAGE COMPRESSION
A REVIEW ON LATEST TECHNIQUES OF IMAGE COMPRESSIONA REVIEW ON LATEST TECHNIQUES OF IMAGE COMPRESSION
A REVIEW ON LATEST TECHNIQUES OF IMAGE COMPRESSION
 
A Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
A Robust Image Watermarking using Svd and Differential Evolution in DWT DomainA Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
A Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
 
DEVELOPMENT OF FAST AND ROBUST IMAGE REGISTRATION METHOD USING DISTANCE MEASU...
DEVELOPMENT OF FAST AND ROBUST IMAGE REGISTRATION METHOD USING DISTANCE MEASU...DEVELOPMENT OF FAST AND ROBUST IMAGE REGISTRATION METHOD USING DISTANCE MEASU...
DEVELOPMENT OF FAST AND ROBUST IMAGE REGISTRATION METHOD USING DISTANCE MEASU...
 
COMPOSITE IMAGELET IDENTIFIER FOR ML PROCESSORS
COMPOSITE IMAGELET IDENTIFIER FOR ML PROCESSORSCOMPOSITE IMAGELET IDENTIFIER FOR ML PROCESSORS
COMPOSITE IMAGELET IDENTIFIER FOR ML PROCESSORS
 
Digital image watermarking using dct with high security of
Digital image watermarking using dct with high security ofDigital image watermarking using dct with high security of
Digital image watermarking using dct with high security of
 
IRJET- Survey on Image Denoising Algorithms
IRJET- Survey on Image Denoising AlgorithmsIRJET- Survey on Image Denoising Algorithms
IRJET- Survey on Image Denoising Algorithms
 
Improving AI surveillance using Edge Computing
Improving AI surveillance using Edge ComputingImproving AI surveillance using Edge Computing
Improving AI surveillance using Edge Computing
 

More from IRJET Journal

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
pritamlangde
 

Recently uploaded (20)

1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 

IRJET- Image Compression Technique for Quantized Encrypted Images using SVD

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1334 IMAGE COMPRESSION TECHNIQUE FOR QUANTIZED ENCRYPTED IMAGES USING SVD CHALAPAKA VEERENDRA BHARGHAV KUMAR1, K DURGA GANGA RAO2 1Student, Dept. of ECE, UCEK, JNTUK, AP, India 2Assistant Professor, Dept. of ECE, UCEK, JNTUK, AP, India. -----------------------------------------------------------------------***-------------------------------------------------------------------- Abstract -A lossy compression technique for encrypted images using Discrete Wavelet Transform (DWT), Singular Value Decomposition (SVD) and Huffman coding is analyzed in this paper. At the sender side first the image is encrypted by using quantized wavelet coefficients and secret key. In the image selection of significant and less significant coefficients are performed by using the wavelet domain. Encrypted LL sub-band data is quantized and compressedbyHuffmancodingwhile;othersub-bands encrypted data is efficiently compressed by discarding irrelevant information using SVD and compressed by Huffman coding techniques. At receiver side, a reliable decompression and decryption technique is used to reconstruct the original image content with the help of compressed bit streams and inversequantization&secretkey. Theproposedmethodisevaluated using parameters such as Compression Ratio (CR) and Peak-Signal-to-Noise Ratio (PSNR). This scheme has an advantage of using SVD duetowhich we have obtained good compression performance while retaining the desirable features of the reconstructed image. Key Words: Compression ratio, Quantized image coefficients (QIC), Quantized wavelet coefficients (QWC), discrete wavelet transform, Huffman coding, Singular value decomposition, Image compression, Peak signal to noise ratio. 1. INTROUCTION Image compression is an application of data compression that encodes the original image with few bits.Theobjective of image compression is to reduce the redundancy of the image and to store or transmitdata inanefficientform. Themaingoal of such system is to reduce the storage quantity as much as possible, and the decoded image displayed in the monitor can be similar to the original image as much as can be. The rapid increase in of transmitting images in social networking sites has raised two problems like secure transmission and large size of image. To rectifythisproblem we need quantized&encryptthe image and then compression the image. Lossy compression for Gaussian source can be achieved through Wyner–Ziv theorem [1]. Recently,a prediction error based ETC technique is proposed by Vaish et al. [2]in which prediction errors are calculated by using a sub-imageandefficient compression is achieved by using quantization and Huffman coding. More recently, an efficient compression of encrypted image using wavelet difference coding is given by Kumar and Vaish[3].Inthispaper,a lossyETCtechniqueisproposedthrough which good compression performance can be achieved while ensuring the security of images. 2. RELATED WORK 2.1 Singular value decomposition SVD does is split a matrix into three important sub matrices to representthedata.GiventhematrixA,wherethesizeof a is 𝑚 × 𝑛 where 𝑚 represents the number of rows in the matrix, and 𝑛 represents the number of columns, A can be broken down into three sub matrices 𝐴 = 𝑈S𝑉 𝑇 where 𝑈 is of size 𝑚 × 𝑚, S is of size 𝑚 × 𝑛 and is diagonal, and 𝑉T is of size 𝑛 × 𝑛. Um×n=Um×n× Sm×n×(Vn×n)T (1) S m × n =[S’ c × d ...0; 0 ...0], c ≤ m, d ≤ n (2) As S’ has less number of rows and columns with respect to S, therefore,tomakematrix multiplicationpossiblesomecolumnsof U and rows of V need to be reduced as given below in eq.(3): Um×m= U’m×c× U’m×(m-c) and Vn×n = V’n×d ×V’n×(n-d) (3) Hence the reconstructed matrix can be obtained as: T’ m×n = U’ m×c ×S’ c×d ×(V’n×n)T (4)
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1335 Since the singular matrix stores singular values (in descending order) therefore by the use of psychovisual concept, ignoring the lower singular values will not significantly reduce the visual quality of the image [5]. 2.2 Discrete Wavelet Transform At first, the input image will be filtered into lowpass and highpass components through analysis filters.Afterfiltering, the data amount of the lowpass and highpass components will become twice that of the original signal; therefore, the lowpass and highpass components must be downsampled to reduce the data quantity. At the receiver, the received data must be upsampled to approximate the original signal. Finally, the upsampled signal passes the synthesis filters and is added to form the reconstructed approximation signal. Figure (1) One level wavelet decomposition 3. PROPOSED METHOD Block diagram of proposed ETC technique is demonstrated in Fig.2, and the complete process is summarized in the following subsections. Figure (2) Proposed quantized & encryption then compression scheme
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1336 Step1: Initially we will find QI Coefficients for the input image. Step2: Then encryption will be carried out by using pseudo random coefficient permutation method. Step3: apply DWT for encrypted image, then will get LL, LH, HL and HH sub-bands. Step4: For LL sub-band section we will apply QWC and quantization. Step5: Then Huffman coding decoding and Dequantization & inverse QWC are applied. Step6: For LH, HL, HH sub-bands we will find QW coefficients. Step7: Then SVD and Huffman coding decoding and inverse QWC will be carried out. Step8: LL sub-band section and LH, HL, HH sub-band section will be merged by inverse DWT. Step9: We apply inverse QI coefficients and inverse pseudo random coefficients permutation. Step10: Finally reconstructed image is obtained. Required equations list: [8] QIC (i, j) = ((I (i, j)-IC min).R)/(IC max- IC min)(5) E( i , j) = mod[QWC( i , j)-S( i , j) , 512] (6) QWC( i, j )=|((WC(I ,j)-WCmin).R)/(WCmax- WCmin )|, 1 ≤ i ≤ P/2,1 ≤ j ≤ Q/2 (7) Q( i, j ) =|E(i ,j)/ƞ|, 1 ≤ i ≤ P/2,1 ≤ j ≤ Q/2 (8) B=B1+B2+B3+B4 (9) CR=B/(P×Q) (10) Q’’ (i, j) as: Q’’ (i, j) = Q’(i, j)×ƞ. A( i,j)=(Q’(i, j)/R).(WCmax – WCmin)+WCmin (11) E’( i , j) = mod[A( i , j)-S( i , j) , 512] (12) I’( i , j ) =(E’(i ,j)/R).( IC max – IC min)+IC min) (13) 4. EXPERIMENTAL RESULTS The proposed ETC technique is implemented using Matlab 9.4.0. To demonstrate various 8-bit gray scale images like Lena, Peppers each of size 512 ×512,are used which are shown in Figure(3)and Reconstructed images are shown in Figure(4). 4.1.1 Security analysis The values of input image are encrypted using the pseudo random permutation is used to scramble the position of each of the detail wavelet coefficients independently. Hence, it would be difficult to any attacker to practically implement a successful brute force search on encrypted detail wavelet subbands. Therefore, the proposed scheme has attained a desired level of security 4.1.2 Compression performance evalution The compression performance of proposed work for various images, CR and PSNR values are calculated with η=1and on different SVs. The proposed work is evaluated on different wavelets such as Biorthogonal, Haar. The results obtainedonthese wavelets with the variation of SVs are demonstrated in Tables I–II, it can be analyzed from average values shown in various tables that the proposed work gives better compression performance with improved image quality on Biorthogonal wavelet. For an instance, when Lena image is compressed using Biorthogonal wavelet on 256 SVs and η=1it gives 3.7144 CR with 44.7610dB PSNR while the CR values for other waveletssuchasSymlets,Daubechies, Coiflets,HaarandDiscreteMeyerwavelet
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1337 are3.7174,3.714,3.7108,3.7124 and 3.7185 respectively while the corresponding PSNR values are 45.4934dB, 45.4366dB, 45.5626dB, 45.5292dB and 45.5087dB. Figure(3) Original images TABLE I PSNR (DB) AND CR VARIOUS TEST IMAGES WITH VARYING SINGULAR VALUES ON BIORTHOGONAL (BIOR3.1) WAVELET. TABLE II PSNR (DB) AND CR VARIOUS TEST IMAGES WITH VARYING SINGULAR VALUES ON HAAR (HAAR) WAVELET. SINGULARVALUES 256 128 64 32 16 PSNR CR PSNR CR PSNR CR PSNR CR PSNR CR Lena 44.671 3.7144 31.1763 3.7131 27.2194 3.6697 26.5266 3.6074 26.3631 3.5458 Peppers 42.8998 3.7707 25.7576 3.7684 22.3036 3.7372 21.7012 3.6924 22.03 3.6495 Girl 44.6989 3.7285 36.3321 3.7346 32.5316 3.7047 31.9208 3.6607 32.2602 3.6089 Couple 43.0768 3.7211 29.9602 3.7178 25.8559 3.686 24.3602 3.638 23.8525 3.5921 Barbara 42.8276 3.6877 26.2814 3.6874 19.4147 3.6593 18.3028 3.6019 19.0613 3.5343 Boat 43.2044 3.7251 25.5841 3.705 21.9666 3.6764 21.204 3.6058 22.1529 3.5291 Baboon 40.5183 3.6501 28.2007 3.6436 24.6837 3.595 23.2061 3.525 22.4326 3.4464 Man 42.6831 3.7523 14.2492 3.7512 11.891 3.7198 11.9537 3.6747 12.4548 3.6326 Average 43.0724 3.7187 27.1927 3.7151 23.2333 3.681 22.3969 3.6257 22.5759 3.5673 SINGULARVALUES 256 128 64 32 16 PSNR CR PSNR CR PSNR CR PSNR CR PSNR CR Lena 45.5292 3.7124 29.4322 3.7132 26.0479 3.6839 25.7669 3.635 26.7415 3.5872 Peppers 43.8741 3.7248 26.5318 3.7252 22.5342 3.7024 22.0475 3.6713 22.1539 3.6403 Girl 45.1921 3.7456 33.6053 3.746 30.0673 3.719 29.952 3.6747 30.3594 3.6287 Couple 44.217 3.6992 29.3154 3.6991 25.1571 3.6798 24.3589 3.6451 24.3256 3.6035 Barbara 41.2473 3.7018 25.8074 3.7007 20.0456 3.6705 19.0364 3.6138 19.7209 3.5418 Boat 44.4749 3.6615 25.8741 3.6598 22.3101 3.6325 21.0437 3.5867 21.2202 3.5364 Baboon 44.4175 3.7195 27.7242 3.7144 25.1509 3.6719 24.0118 3.6047 23.4898 3.5335 Man 40.8832 3.7473 14.0692 3.7479 11.7873 3.7245 11.6496 3.688 12.1284 3.6523 Average 44.1360 3.7092 28.3272 3.7083 24.4733 3.68 23.7453 3.633 24.0016 3.5816
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1338 Figure (4) Reconstructed images 5. CONCLUSIONS This paper proposed a simplest effective Encryption-then-Compression technique using SVD and Huffmancoding. At the sender end, content owner decomposed the original image into a waveletdecompositionusingDWT.Atthesendersidethe input image is quantized and encrypted using pseudo random permutation, which makes the proposedschemesecureagainst any brute force search. The encrypted LL sub-band is compressed by quantization and Huffman coding, the encrypted LH,HL, HH sub-bands are compressed using SVD and Huffman coding technique. The receiver can perform the decompression, decryption and inverse of DWT and inverse quantization to get the reconstructed image. Figure (5) Graph between CR&PSNR for different compression schemes with comparison table. The performance analysis of proposed work is evaluated by comparing the unencryptedimages.Itisevidentfromthe quantitative and visual results that the proposed scheme over JPEG&JPEG2000 on compression ofencryptedimage.Proposed scheme has an advantage of using SVD due to which we have obtained good compression performance while retaining the desirable features of the reconstructed. 6. REFERENCES [1] A. Wyner, J. Ziv, The rate-distortion function for source coding with side infor-mation at the decoder, IEEE Trans. Inf. Theory IT-22 (1976) 1–10.J. [2] A. Vaish, M. Kumar, Prediction error based compression of encrypted images, in: ICCCT-2015, ACM Digital Library, 2015, pp.228–232. [3] M. Kumar, A. Vaish, An efficient compression of encrypted images using WDR coding, in: SocPros-2015,in:SpringerSeries Advances in Intelligent Systems and Computing, vol.436, 2016, pp.729–741.. [4] http://www.math.utah.edu/~goller/F15_M2270/BradyMathews_SVDImage.pdf. [5] A.M. Rufai, G. Anbarjafari, H. Demirel, Lossy imagecompressionusingsingularvaluedecompositionandwaveletdifference reduction, Digit. Signal Process. 24 (2014) 117–123. [6] N. Bourbarkis, C. Alexopoulos, Picture data encryption using scan patterns, Pattern Recognit. 25(6) (1992) 567–581.
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1339 [7] J.C. Yen, J.I. Guo, Efficient hierarchical chaotic image encryption algorithm and its VLSI realization, IEE Proc., Vis. Image Signal Process. 147(2) (2000) 167–175. [8] https://www.sciencedirect.com/science/article/pii/S1051200416301348?via%3Dihub