Open Access Open Access  Restricted Access Subscription or Fee Access

Lossy Image Compression Using Exponential Growth Equation and Encryption by Natural Exponential Function

M Purushotham Reddy, B. Venkata Ramana Reddy, C. Shoba Bindu

Abstract


Abstract

Image compression is an essential technology in transmission and storage of digital images because of vast data associated with them. So, image compression plays an important role in the transmission of digital images through the internet with less bandwidth and occupies less space in memory. This research suggests a new image compression method based on exponential growth equation. The exponential growth equation is used for the image compression. The effectiveness of the algorithm has been justified over some standard images. Experimental results demonstrate that the proposed technique provides high sufficient PSNR values and compression ratio values. Nowadays, it is important to provide security for images to avoid various security attacks and data integrity. So, one has to encrypt the image before sending and decrypt after receiving the image. This paper suggests a new image encryption algorithm using a natural exponential function. The main aim of presenting this scheme is to provide security for images. 

Keywords: Image compression, image encryption, exponential growth equation, natural exponential function

Cite this Article

Purushotham Reddy M, Venkata Ramana Reddy B, Shoba Bindu C. Lossy Image Compression Using Exponential Growth Equation and Encryption by Natural Exponential Function. Journal of Image Processing & Pattern Recognition Progress. 2017; 4(3): 46–55p.



Keywords


image compression, image encryption, exponential growth equation, natural exponential function.

Full Text:

PDF

References


Yuancheng Li, Yiliang Wang, Rui Xiao, Qiu Yang: Curvelet based image compression via core vector machine in Optik, Science direct,2013 page no:4859-4866.

Abdolhossein Fathi, Fatemeh Faraji-kheirabadi: ECG compression method based on adaptive quantization of main wavelet packet subbands, Springer,2016, DOI: 10.1007/s11760-016-0944-z.

Jerónimo Mora Pascual, Higinio Mora Mora, Andrés Fuster Guilló, Jorge Azorín López: Adjustable Compression Method for Still JPEG Images,2015, Signal processing: image communication, Science Direct, DOI: http://dx.doi.org/10.1016/j.image.2015.01.004.

Wei Fu, Shutao Li, Leyuan Fang, and Jón Atli Benediktsson: Adaptive Spectral-Spatial Compression of Hyperspectral Image With Sparse Representation, IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, 2016, DOI: 10.1109/TGRS.2016.2613848.

V. Bruni, D. Vitulano: Combined image compression and denoising using wavelets, Signal processing: image communication, Science Direct,2007, page no:86-101.

Tzong-Jer Chen, Keh-Shih Chuang: A Pseudo Lossless Image Compression Method, 3rd International Congress on Image and Signal Processing, IEEE 2010, page no:610-615.

Marco Conoscenti, Riccardo Coppola, and Enrico Magli: Constant SNR, Rate Control, and Entropy Coding for Predictive Lossy Hyperspectral Image Compression, IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING,2016, DOI: 10.1109/TGRS.2016.2603998.

Andras s CzihoH, Basel Solaiman, IstvaHn LovaHnyi, Guy Cazuguel, Christian Roux: An optimization of finite-state vector quantization for image compression, Signal processing: image communication, Science Direct,2000, page no:545-558.

Salih Dikbas, FanZhai: Lossless image compression using adjustable fractional line- buffer, Signal processing: image communication, Science Direct,2010, page no:345-351.

Evgeny Gershikov, Emilia Lavi-Burlak, Moshe Porat: the Correlation-based approach to color image compression, Signal processing: image communication, Science Direct,2007, page no:719-733.

Junhui Hou, Lap-Pui Chau, Nadia Magnenat-Thalmann, and Ying He, SLRMA: Sparse Low-Rank Matrix Approximation for Data Compression, IEEE TRANS. CSVT,2015,DOI: 10.1109/TCSVT.2015.2513698.

Gang Li, Xiao Li, Sheng Li, Huang Bai, Qianru Jiang, and Xiongxiong He: Designing Robust Sensing Matrix for Image Compression, IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 24, NO. 12, DECEMBER 2015,page no:5389-5400.

Lin Maa, DebinZhao, Wei Gao: Learning-based image restoration for compressed images, Signal processing: image communication, Science Direct,2012, page no:54-65.

Mahdi Mehrabi, FarzadZargari, Mohammad Ghanbari, MohammadAminShayegan: Fast content access and retrieval of JPEG compressed images, Signal processing: image communication, Science Direct,2016, page no:54-59.

Bin Xiao, Gang Lu, Yanhong Zhang, Weisheng Li, Guoyin Wang: Lossless Image Compression Based on Integer Discrete Tchebichef Transform, Neurocomputing, Science Direct,2016, DOI: http://dx.doi.org/10.1016/j.neucom.2016.06.050.

Adil AL-Rammahi: Calculus Logarithmic Function for Image Encryption, World Academy of Science, Engineering and Technology International Journal of Mathematical, Computational, Physical, Electrical and Computer Engineering Vol:8, No:3, 2014, page no:615-618.

Alireza Jolfaei and Abdolrasoul Mirghadri: Survey: Image Encryption Using Salsa20, IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 5, September 2010, page no:213-220.

I. Landge, B. Contractor, A. Patel, and R. Choudhary, "Image encryption and decryption using Blowfish algorithm," World Journal of Science and Technology, 2(3), 2012, pp. 151-156.

Ruisong Ye, Shaojun Zeng: A Secure and Efficient Image Encryption Scheme Based on Tent Map and Permutation-substitution Architecture, I.J. Modern Education and Computer Science, 2014, 3, 19-30.

Nidhal K. El Abbadi, Adil Mohamad, and Mohammed Abdul-Hameed: IMAGE ENCRYPTION BASED ON SINGULAR VALUE DECOMPOSITION, Journal of Computer Science 10 (7): 1222-1230, 2014, ISSN: 1549-3636.

Mohit Kumar, Anju Chahal: Effect of Encryption Technique and Size of Image on Correlation Coefficient in Encrypted Image, International Journal of Computer Applications (0975 – 8887) Volume 97– No.12, July 2014.

M.A. Shreef and H. K. Hoomod, "Image Encryption Using Lagrange-Least Squares Interpolation," International Journal of Advanced Computer Science and Information Technology, 2(4), 2013, pp. 35-55.


Refbacks

  • There are currently no refbacks.