Abstract
In ancient times, there was a need to protect data. Due to the pervasive range in the field of security, several technologies came into existence. But the whole idea of securing data from attacks took a quick turn in the world of Internet. Here, data accuracy is the major issue. As in the previous existing methods, compression of data becomes an important research field that provides an efficient way for compressed data transmission over the Internet. The technique proposed here publicizes the concept of reliability and transmission mechanism. This is a faster and simple method of compression, and describes different lossless image compression algorithms for high performance. The newly adapted method produces better image quality without any loss of data. The suggested approach highlights security of data and provides a practical approach for compression of an image. The proposed ACE scheme works on binary concepts of compression of the image and encryption by reducing number of bits per pixel.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Gupta, K., Sharma, M., & Sharma, P. (2014). Lossless compression based Kmp technique. In Optimization, Reliabilty, and Information Technology (ICROIT), 2014 International Conference.
Gupta, K., Sharma, M., & Baweja, N. (2014). Three different KG version for image compression. In Issues and Challenges in Intelligent Computing Techniques (ICICT), 2014 International Conference.
Gupta, K., & Sharma, M. (2014). RGB based KMB image compression technique. In Optimization, Reliabilty, and Information Technology (ICROIT), 2014 International Conference.
Gupta, K., Sharma, M., & Saneja, K. (2014). A new lossless KMK technique for image compression. In Optimization, Reliabilty, and Information Technology (ICROIT), 2014 International Conference.
Sharma, M. (2012). Image compression using enhanced haar wavelet technique. In International Conference 2012.
Kaur, R., & Banga, V. K. (2012). Image security using encryption based algorithm. In International Conference on Trends in Electrical, Electronics and Power Engineering (ICTEEP 2012), Singapore, July 15–16, 2012.
Netravali, A. N., & Haskell, B. G. (1995). Digital pictures—representation, compression, and standards, 2nd ed. London: Plenum Press.
Bilgin, A., & Marcellin, B. W. (2003). JPEG2000: Highly scalable image compression. In K. Sayood, (Ed.) Lossless Compression Handbook, San Diego, CA: Elsevier, 2003, Chap. 18, pp. 351–369.
Netravali, N., & Haskell, B. G. (1995). Digital pictures—representation, compression, and standards, 2nd ed. New York: Plenum Press.
Olyaei, A., & Genov, R. (2005). Mixed-signal haar wavelet compression image architecture. MIWSCAS’05. Ohio: Cincinnati.
Gonzalez, R. C., & Woods, R. E. Digital Image Processing, 2nd ed. Pearson Education.
Gaikwad, D. P., Jagdale, T., Dhanokar, S., Moghe, A., & Pathak, A. Hiding the text and image message of variable size using encryption and compression algorithm in video steganography. International Journal of Engineering Research and Application (IJERA) 1(2), 102–108.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Science+Business Media Singapore
About this paper
Cite this paper
Sangwan, B., Bhatia, S. (2016). ACE (Advanced Compression Encryption) Scheme for Image Authentication. In: Satapathy, S., Joshi, A., Modi, N., Pathak, N. (eds) Proceedings of International Conference on ICT for Sustainable Development. Advances in Intelligent Systems and Computing, vol 408. Springer, Singapore. https://doi.org/10.1007/978-981-10-0129-1_24
Download citation
DOI: https://doi.org/10.1007/978-981-10-0129-1_24
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-0127-7
Online ISBN: 978-981-10-0129-1
eBook Packages: EngineeringEngineering (R0)