An Improved Pixel Transpose Technique over Images

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
© 2014 by IJETT Journal
Volume-17 Number-6
Year of Publication : 2014
Authors : Menda.VasudhaRani, JayanthiRao Madina


Menda.VasudhaRani, JayanthiRao Madina"An Improved Pixel Transpose Technique over Images ", International Journal of Engineering Trends and Technology (IJETT), V17(6),280-283 Nov 2014. ISSN:2231-5381. published by seventh sense research group


In this proposed work we are emphasis on data privacy along with data embedding an extraction of data from and to image, for secure transmission of data we are proposing a simple and secure cryptography technique. In this paper we are proposed technique for image encryption and compression along with data confidentiality; with this technique we can also increase the efficiency of the system.In initial phase before transferring image through network we can hide data into image, prior to that, data into can be encrypted with AES algorithm and hide into image, followed by a image encryption with POTT (pixels xor transpose technique). In this paper we can also use arithmetic coding technique for image compression and decompression. By providing those techniques we can improve efficiency and more security of given system.


[1] “Methods for subjective determination of transmission quality,” ITU-R Recommendation P.800, 1996.
[2] “Methodology for the subjective assessment of the quality of television pictures,” ITU-R Recommendation BT.500-11, 2002.
[3] I. Avcibas, B. Sankur, and K. Sayood, “Statistical evaluation of image quality measures,” Journal of Electronic Imaging, vol. 11, no. 2, pp. 206–223, 2002.
[4] G. Chen, Y.Mao, and C. K. Chui, “A symmetric image encryption scheme based on 3D chaotic cat maps,” Chaos, Solitonsand Fractals, vol. 21, no. 3, pp. 749–761, 2004.
[5] S.-G. Cho, Z. Bojkovic, D. Milovanovic, J. Lee, and J.-J.Hwang, “Image quality evaluation: Jpeg 2000 versus intraonlyh.264/avc high profile,” FactaUniversitatis, Nis, Series: Electronics and Energetics, vol. 20, no. 1, pp. 71–83, 2007.
[6] J. Daemen and V. Rijmen, The Design of Rijndael: AES—The Advanced Encryption Standard, Springer, New York, NY, USA,2002.
[7] A. M. Eskicioglu, “Quality measurement for monochrome compressed images in the past 25 years,” in Proceedings of IEEEInternational Conference on Acoustics, Speech and Signal Processing(ICASSP ’00), vol. 4, pp. 1907–1910, Istanbul, Turkey,June 2000.
[8] J. Fridrich, “Symmetric ciphers based on two-dimensional chaotic maps,” International Journal of Bifurcation and Chaosin Applied Sciences and Engineering, vol. 8, no. 6, pp. 1259–1284, 1998.
[9] B. Furht and D. Kirovski, Eds.,Multimedia Security Handbook,CRC Press, Boca Raton, Fla, USA, 2005. [10] M. Gschwandtner, A. Uhl, and P. Wild, “Compression of encrypted visual data,” in Proceedings of the 10th IFIP International Conference on Communications and Multimedia Security(CMS ’06), H. Leitold and E. Markatos, Eds., vol. 4237 of Lecture Notes on Computer Science, pp. 141–150, Springer, Crete, Greece, October 2006.