Skip to main content

ACE (Advanced Compression Encryption) Scheme for Image Authentication

  • Conference paper
  • First Online:
Book cover Proceedings of International Conference on ICT for Sustainable Development

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 408))

  • 1447 Accesses

Abstract

In ancient times, there was a need to protect data. Due to the pervasive range in the field of security, several technologies came into existence. But the whole idea of securing data from attacks took a quick turn in the world of Internet. Here, data accuracy is the major issue. As in the previous existing methods, compression of data becomes an important research field that provides an efficient way for compressed data transmission over the Internet. The technique proposed here publicizes the concept of reliability and transmission mechanism. This is a faster and simple method of compression, and describes different lossless image compression algorithms for high performance. The newly adapted method produces better image quality without any loss of data. The suggested approach highlights security of data and provides a practical approach for compression of an image. The proposed ACE scheme works on binary concepts of compression of the image and encryption by reducing number of bits per pixel.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gupta, K., Sharma, M., & Sharma, P. (2014). Lossless compression based Kmp technique. In Optimization, Reliabilty, and Information Technology (ICROIT), 2014 International Conference.

    Google Scholar 

  2. Gupta, K., Sharma, M., & Baweja, N. (2014). Three different KG version for image compression. In Issues and Challenges in Intelligent Computing Techniques (ICICT), 2014 International Conference.

    Google Scholar 

  3. Gupta, K., & Sharma, M. (2014). RGB based KMB image compression technique. In Optimization, Reliabilty, and Information Technology (ICROIT), 2014 International Conference.

    Google Scholar 

  4. Gupta, K., Sharma, M., & Saneja, K. (2014). A new lossless KMK technique for image compression. In Optimization, Reliabilty, and Information Technology (ICROIT), 2014 International Conference.

    Google Scholar 

  5. Sharma, M. (2012). Image compression using enhanced haar wavelet technique. In International Conference 2012.

    Google Scholar 

  6. Kaur, R., & Banga, V. K. (2012). Image security using encryption based algorithm. In International Conference on Trends in Electrical, Electronics and Power Engineering (ICTEEP 2012), Singapore, July 15–16, 2012.

    Google Scholar 

  7. Netravali, A. N., & Haskell, B. G. (1995). Digital pictures—representation, compression, and standards, 2nd ed. London: Plenum Press.

    Google Scholar 

  8. Bilgin, A., & Marcellin, B. W. (2003). JPEG2000: Highly scalable image compression. In K. Sayood, (Ed.) Lossless Compression Handbook, San Diego, CA: Elsevier, 2003, Chap. 18, pp. 351–369.

    Google Scholar 

  9. Netravali, N., & Haskell, B. G. (1995). Digital pictures—representation, compression, and standards, 2nd ed. New York: Plenum Press.

    Google Scholar 

  10. Olyaei, A., & Genov, R. (2005). Mixed-signal haar wavelet compression image architecture. MIWSCAS’05. Ohio: Cincinnati.

    Google Scholar 

  11. Gonzalez, R. C., & Woods, R. E. Digital Image Processing, 2nd ed. Pearson Education.

    Google Scholar 

  12. Gaikwad, D. P., Jagdale, T., Dhanokar, S., Moghe, A., & Pathak, A. Hiding the text and image message of variable size using encryption and compression algorithm in video steganography. International Journal of Engineering Research and Application (IJERA) 1(2), 102–108.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bhavna Sangwan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Sangwan, B., Bhatia, S. (2016). ACE (Advanced Compression Encryption) Scheme for Image Authentication. In: Satapathy, S., Joshi, A., Modi, N., Pathak, N. (eds) Proceedings of International Conference on ICT for Sustainable Development. Advances in Intelligent Systems and Computing, vol 408. Springer, Singapore. https://doi.org/10.1007/978-981-10-0129-1_24

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0129-1_24

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0127-7

  • Online ISBN: 978-981-10-0129-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics