• DocumentCode
    3576216
  • Title

    A heuristic approach for secured transmission of image based on Bernstein polynomial

  • Author

    Sasi, Smitha ; Jyothi, L. Swarna

  • Author_Institution
    Dept. of Telecommun. Eng., Dayananda Sagar Coll. of Eng., Bangalore, India
  • fYear
    2014
  • Firstpage
    312
  • Lastpage
    315
  • Abstract
    Public key cryptosystem or the asymmetric crypto system is more secured than secret key method because a pair of related keys is being used at both sender and receiver´s end. In this paper we propose an efficient Bernstein polynomial over Galois field GF(p). This public key cryptographic technique is used for secured transmission of image. This work considers compressing the original image using Bernstein image. The compressed image is encrypted at the sender´s end and decrypted by the receiver using the proposed cryptographic algorithm. The decrypted image is decompressed to recover the parent image.
  • Keywords
    Galois fields; data compression; image coding; polynomials; public key cryptography; Bernstein image; Bernstein polynomial; GF(p); Galois field; asymmetric cryptosystem; heuristic approach; image compression; parent image recovery; public key cryptographic technique; secret key method; secured image transmission; Algorithm design and analysis; Encryption; Image coding; Polynomials; Receivers; Signal processing algorithms; Bernstien polynomial; Decryption; Encryption; Galois field; Private Key; Public Key;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Circuits, Communication, Control and Computing (I4C), 2014 International Conference on
  • Print_ISBN
    978-1-4799-6545-8
  • Type

    conf

  • DOI
    10.1109/CIMCA.2014.7057813
  • Filename
    7057813