Presently these days there is accelerated advancement in multimedia and network technologies. For that reason the privacy and security evolves into the preeminent issues because the multimedia is disseminated openly over network. In our proposed work, asymmetric key encryption is used means where encryption key is known to everyone where decryption key is known to receiver side that allow receiver to read the encrypted image. The proposed scheme of encrypting image is operated with prediction error clustering method that is shown to provide high level of security reasonably. After that image compression algorithm is implemented using Haar Wavelet Transform which efficiently compresses the image encrypted. The compression approach applied to encrypted image is proved more efficient in terms of Compression Ratio (CR), Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR), Entropy and Bit error rate (BER). For the implementation of this proposed work we use image processing toolbox under MATLAB software.
Haweel T.I., “A new square wave transform based on the DCT”, Signal Process., 2001.
M. J. Weinberger, G. Seroussi, and G. Sapiro, “The LOCO-I loss-less image compression algorithm: Principles and standardization into JPEG-LS”, IEEE Trans. Imag. Process., vol. 9, issue 8, Aug. 2000.
Bryan Usevitch, “A Tutorial on Modern Lossy Wavelet Image Compression: Foundations of JPEG 2000”, IEEE Signal Processing Magazine, 2001.
M. Johnson, P. Ishwar, V. M. Prabhakaran, D. Schonberg, and K. Ramchandran, “On compressing encrypted data”, IEEE Trans. Signal Process., vol. 52, issue 10, Oct. 2004.
K. Wahid, V. Dimitrov, G. Jullien ,“Error-free computation of 8×8 2D DCT and IDCT using two-dimensional algebraic integer quantization ”, IEEE Computer Arithmetic, June 2005.
D. Schonberg, S. C. Draper, and K. Ramchandran, “On blind compression of encrypted correlated data approaching the source entropy rate”, in Proc. 43rd Annu. Allerton Conf., 2005.
D. Schonberg, S. C. Draper, and K. Ramchandran, “On compression of encrypted images”, in Proc. IEEE Int. Conf. Image Process., Oct. 2006.
R. Lazzeretti and M. Barni, “Lossless compression of encrypted grey-level and color images”, in Proc. 16th Eur. Signal Process. Conf., Aug. 2008.
A. Kumar and A. Makur, “Distributed source coding based encryption and lossless compression of gray scale and color images”, IEEE in Proc. MMSP, 2008.
D. Schonberg, S. C. Draper, C. Yeo, and K. Ramchandran, “Toward compression of encrypted images and video sequences”, IEEE Trans. Inf. Forensics Security, vol. 3, issue 4, Dec. 2008.
T. Bianchi, A. Piva, and M. Barni, “Encrypted domain DCT based on homomorphic cryptosystems”, EURASIP J. Inf. Security, 2009, Article ID 716357.
A. Kumar and A. Makur, “Lossy compression of encrypted image by compressing sensing technique”, in Proc. IEEE Region 10 Conf. TENCON, Jan. 2009.
T. Bianchi, A. Piva, and M. Barni, “On the implementation of the discrete Fourier transform in the encrypted domain”, IEEE Trans. Inf. Forensics Security, vol. 4, issue 1, Mar. 2009.
Q. M. Yao, W. J. Zeng, and W. Liu, “Multi-resolution based hybrid spatiotemporal compression of encrypted videos,” IEEE in Proc. ICASSP, Apr. 2009, pp. 725–728.
V. Ashok, T. Balakumaran, C. Gowrishankar, Dr. ILA.Vennila, Dr.A.Nirmal kumar, “The Fast Haar Wavelet Transform for Signal & Image Processing”, (IJCSIS) International Journal of Computer Science and Information Security, Vol. 7, issue 1, 2010.
T. Bianchi, A. Piva, and M. Barni, “Composite signal representation for fast and storage-efficient processing of encrypted signals”, IEEE Trans. Inf. Forensics Security, vol. 5, issue 1, Mar. 2010.
W. Liu, W. J. Zeng, L. Dong, and Q. M. Yao, “Efficient compression of encrypted grayscale images”, IEEE Trans. Imag. Process, vol. 19, issue 4, Apr. 2010.
X. Zhang, “Lossy compression and iterative reconstruction for encrypted image”, IEEE Trans. Inf. Forensics Security, vol. 6, issue 1, Mar. 2011.
M. Barni, P. Failla, R. Lazzeretti, A. R. Sadeghi, and T. Schneider, “Privacy-preserving ECG classification with branching programs and neural networks”, IEEE Trans. Inf. Forensics Security, vol. 6, issue 2, June 2011.
X. Zhang, Y. L. Ren, G. R. Feng, and Z. X. Qian, “Compressing encrypted image using compressive sensing”, in Proc. IEEE 7th IIH-MSP, Oct. 2011.
Nidhi Sethi, Ram Krishna, R. P. Arora, “Image Compression using HAAR Wavelet Transform”, IISTE Comp. Engg. & Intelligent Systems, ISSN 2222-1719, 2011
X. Zhang, G. Feng, Y. Ren, and Z. Qian, “Scalable coding of encrypted images”, IEEE Trans. Imag. Process, vol. 21, issue 6, June 2012.
Z. Erkin, T. Veugen, T. Toft, and R. L. Lagendijk, “Generating private recommendations efficiently using homomorphic encryption and data packing”, IEEE Trans. Inf. Forensics Security, vol. 7, issue 3, June 2012.
D. Klinc, C. Hazay, A. Jagmohan, H. Krawczyk, and T. Rabin, “On compression of data encrypted with block ciphers”, IEEE Trans. Inf. Theory, vol. 58, issue 11, Nov. 2012.
J. Zhou, X. Wu, and L. Zhang, “l2 restoration of l∞-decoded images via soft-decision estimation”, IEEE Trans. Imag. Process., vol. 21, issue 12, Dec. 2012.
X. Zhang, G. Sun, L. Shen, and C. Qin, “Compression of encrypted images with multilayer decomposition”, Multimed. Tools Appl., vol. 78, issue 3, Feb. 2013.
R. Mehala and K. Kuppusamy, “A New Image Compression Algorithm using Haar Wavelet Transformation”, International Journal of Computer Applications(0975-8887), International Conference on Computing and Information Technology, 2013.
M. Sifuzzaman1, M.R. Islam and M.Z. Ali, “Application of Wavelet Transform and its Advantages Compared to Fourier Transform” Journal of Physical Sciences, Vol. 13, 2009.
Piotr Porwik, Agnieszka Lisowsk, “The Haar–Wavelet Transform in Digital Image Processing: Its Status and Achievements”, Machine Graphics and Vision, vol. 13, issue 1/2, 2004.
Jashanbir Singh Kalka, Reecha Sharma(2012), “Comparative Performance Analysis of Haar, Symlets and Bior wavelets on Image compression using Discrete Wavelet Transform”, International Journal of Computers & Distributed System, Volume 1, Issue 2, August, 2012.
Kamrul Hasan Talukder and Koichi Harada, “Haar Wavelet Based Approach for Image Compression and Quality Assessment of Compressed Image”, IAENG International Journal of Applied Mathematics, 36:1, IJAM,Dec 2012.
Lisa M. Marvel and George W. Hartwig, Jr. ,“A Survey of Image Compression Techniques and Their Performance in Noisy Environments”, IEEE Transactions on Circuits & Systems for Video Technology, Vol. 23, Issue.2, pp.311-325, IEEE 2013.
Jiantao Zhou, Xianming Liu, Oscar C. Au and Yuan Yan Tang, “Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Prediction error clustering”, IEEE Trans. Inf. Forensics Security, vol. 9, issue 1, January 2014.
X. Wu and N. Memon, “Context-based, adaptive, lossless image codec”, IEEE Trans. Commun., vol. 45, issue 4, Apr. 1997.
A. J. Menezes, P. C. Van Oorschot, and S. A. Vanstone, “Handbook of Applied Cryptography”, Cleveland, OH, USA: CRC Press, 1997
Jerome Shapiro, “Embedded Image Coding Using Zerotrees of Wavelet Coefficients”, IEEE Transactions in Signal Processing, 1993.
Gregory Wallace, “The JPEG Still Picture Compression Standard”, IEEE Transactions on Consumer Electronics, 1991.
Ch. Samson, V. U. K. Sastry, “An RGB Image Encryption Supported by Wavelet-based Lossless Compression”, International Journal of Advanced Computer Science and Applications, Vol. 3, Issue 9, 2012.
http://www.imageprocessingplace.com/root_files_V3/image_databases.html
ETC, Encryption, Compression, Haar wavelet, mean square error, CR, peak signal to noise ratio, entropy, bit error rate.