Nowadays there is quick advancement in the media and network technologies. That is the reason the protection and security turns into the real issues subsequent to the mixed media is transmitted straightforwardly over the network. Alongside the protection and security, storage space is likewise a vital point that can’t be missed. That is the reason to give the privacy and security to the media, encryption function as the root and also to reduce the storage space compression can be utilized. Decrease in size additionally reduces the time taken for transmission. In many practical situations, image encryption must be led preceding image compression. This has prompted the issue of how to plan a pair of image encryption and compression algorithms such that compressing the encrypted images can still be efficiently performed. In this work, we design and implement a productive image encryption-compression system where lossy compression is considered. The proposed image encryption plan is operated with random permutation technique which is shown to be able to give reasonably high level of security. It also implement a new image compression algorithm or solution using Haar and Symlet Wavelet Transform which can be used to efficiently compress the encrypted image. After that the compression approach applied to encrypted image is proved more efficient in terms of Compression Ratio (CR), Mean Square Error (MSE), and Peak Signal to Noise Ratio (PSNR).
Jiantao Zhou, Xianming Liu, Oscar C. Au and Yuan Yan Tang, “Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation”, IEEE Trans. Inf. Forensics Security, vol. 9, issue 1, January 2014.
R. Mehala and K. Kuppusamy, “A New Image Compression Algorithm using Haar Wavelet Transformation”, International Journal of Computer Applications(0975-8887), International Conference on Computing and Information Technology, 2013.
X. Zhang, G. Sun, L. Shen, and C. Qin, “Compression of encrypted images with multilayer decomposition”, Multimed. Tools Appl., vol. 78, issue 3, Feb. 2013.
J. Zhou, X. Wu, and L. Zhang, “l2 restoration of l∞-decoded images via soft-decision estimation”, IEEE Trans. Imag. Process. vol. 21, issue 12, Dec. 2012.
D. Klinc, C. Hazay, A. Jagmohan, H. Krawczyk, and T. Rabin, “On compression of data encrypted with block ciphers”, IEEE Trans. Inf. Theory, vol. 58, issue 11, Nov. 2012.
Z. Erkin, T. Veugen, T. Toft, and R. L. Lagendijk, “Generating private recommendations efficiently using homomorphic encryption and data packing”, IEEE Trans. Inf. Forensics Security, vol. 7, issue 3, June 2012.
X. Zhang, G. Feng, Y. Ren, and Z. Qian, “Scalable coding of encrypted images”, IEEE Trans. Imag. Process, vol. 21, issue 6, June 2012.
Nidhi Sethi, Ram Krishna, R. P. Arora, “Image Compression using HAAR Wavelet Transform”, IISTE Comp. Engg. & Intelligent Systems, ISSN 2222-1719, 2011
X. Zhang, Y. L. Ren, G. R. Feng, and Z. X. Qian, “Compressing encrypted image using compressive sensing”, in Proc. IEEE 7th IIH-MSP, Oct. 2011.
M. Barni, P. Failla, R. Lazzeretti, A. R. Sadeghi, and T. Schneider, “Privacy-preserving ECG classification with branching programs and neural networks”, IEEE Trans. Inf. Forensics Security, vol. 6, issue 2, June 2011.
X. Zhang, “Lossy compression and iterative reconstruction for encrypted image”, IEEE Trans. Inf. Forensics Security, vol. 6, issue 1, Mar. 2011.
W. Liu, W. J. Zeng, L. Dong, and Q. M. Yao, “Efficient compression of encrypted grayscale images”, IEEE Trans. Imag. Process, vol. 19, issue 4, Apr. 2010.
T. Bianchi, A. Piva, and M. Barni, “Composite signal representation for fast and storage-efficient processing of encrypted signals”, IEEE Trans. Inf. Forensics Security, vol. 5, issue 1, Mar. 2010.
V. Ashok, T. Balakumaran, C. Gowrishankar, Dr. ILA.Vennila, Dr.A.Nirmal kumar, “The Fast Haar Wavelet Transform for Signal & Image Processing”, (IJCSIS) International Journal of Computer Science and Information Security, Vol. 7, issue 1, 2010.
Q. M. Yao, W. J. Zeng, and W. Liu, “Multi-resolution based hybrid spatiotemporal compression of encrypted videos,” IEEE in Proc. ICASSP, Apr. 2009, pp. 725–728.
T. Bianchi, A. Piva, and M. Barni, “On the implementation of the discrete Fourier transform in the encrypted domain”, IEEE Trans. Inf. Forensics Security, vol. 4, issue 1, Mar. 2009.
Image Encryption, Image Compression, New HAAR Wavelet Transform and Symlet Wavelet Transform