DocumentCode
3576216
Title
A heuristic approach for secured transmission of image based on Bernstein polynomial
Author
Sasi, Smitha ; Jyothi, L. Swarna
Author_Institution
Dept. of Telecommun. Eng., Dayananda Sagar Coll. of Eng., Bangalore, India
fYear
2014
Firstpage
312
Lastpage
315
Abstract
Public key cryptosystem or the asymmetric crypto system is more secured than secret key method because a pair of related keys is being used at both sender and receiver´s end. In this paper we propose an efficient Bernstein polynomial over Galois field GF(p). This public key cryptographic technique is used for secured transmission of image. This work considers compressing the original image using Bernstein image. The compressed image is encrypted at the sender´s end and decrypted by the receiver using the proposed cryptographic algorithm. The decrypted image is decompressed to recover the parent image.
Keywords
Galois fields; data compression; image coding; polynomials; public key cryptography; Bernstein image; Bernstein polynomial; GF(p); Galois field; asymmetric cryptosystem; heuristic approach; image compression; parent image recovery; public key cryptographic technique; secret key method; secured image transmission; Algorithm design and analysis; Encryption; Image coding; Polynomials; Receivers; Signal processing algorithms; Bernstien polynomial; Decryption; Encryption; Galois field; Private Key; Public Key;
fLanguage
English
Publisher
ieee
Conference_Titel
Circuits, Communication, Control and Computing (I4C), 2014 International Conference on
Print_ISBN
978-1-4799-6545-8
Type
conf
DOI
10.1109/CIMCA.2014.7057813
Filename
7057813
Link To Document