Professional Documents
Culture Documents
Abstract—The increased demand of multimedia leads to information in the form of visuals exist on the World Wide
shortage of network bandwidth and memory capacity. As a Web.
result, image compression is more significant for decreasing
data redundancy, saving storage space and bandwidth. Along Every day, billions of photos are uploaded to social
with the compression the next major challenge in this field is to media like instagram, Twitter, Linkedin and Facebook, as
safeguard the compressed data further from the spy which are well as cloud storage systems like Google Drive and
commonly known as hackers. It is evident that the major Dropbox. Image compression technologies are required to
increments in the fields like communication, wireless sensor reduce the image size and save storage space when dealing
network, data science, cloud computing and machine learning with such vast amounts of information. Due to restricted
not only eases the operations of the related field but also bandwidth and spying, the image of interest should be
increases the challenges as well. This paper proposes a worthy protected and compressed too while sending through a
composition for image compression encryption based on channel [5].
unsupervised learning i.e. k-means clustering for compression
with logistic chaotic map for encryption. The main advantage Image compression process is eliminating unnecessary
of the above combination is to address the problem of data and repeated data from a digital image in order to reduce the
storage and the security of the visual data as well. The data needed to represent it. It entails downsizing image while
algorithm reduces the size of the input image and also gives the maintaining all of the relevant information which can appeals
larger key space for encryption. The validity of the algorithm is the human visual system.
testified with the PSNR, MSE, SSIM and Correlation
coefficient. Discrete wavelet transform, Discrete cosine transform,
SPHIT, JPEG, K-Means clustering, and Fuzzy Compression
Keywords—Compression, Encryption, Chaotic map, [6] are few of the majorly used image compression
Clustering, Data security. algorithms previously. Some hybrid combinations such as
PCA with K means clustering were also employed in the
I. INTRODUCTION past. It operates with the goal of reducing unnecessary data
by applying dimension reduction and color quantization [7].
Since an image carries a huge set of information as Pixels are the units of measurement for the intensity of a
compared to almost all data types hence the strongest popular picture. Each pixel in a colorful image is made up of three
medium of communication at this time. The today’s modern bytes, each of which contains RGB (Red-Blue-Green) data
era of social networking, advancements in satellite, with Red, Blue, and Green intensities.
communication, cloud storage and advanced high class
algorithms like machine learning and deep learning are In the proposed work, k mean clustering is used with the
working like catalyst in the widespread use of visual data logistic chaotic map for compression and encryption
communication. Because images are frequently transmitted respectively. The objective here is to provide the security
across an insecure channel like the internet, protecting with the compression.
images against cyber-attacks is a critical issue in a wide The said combination has the following two advantages:
range of applications including medical services like
telemedicine, smart devices like electric vehicles, navigation • The K means clustering effectively reduce the size
and the defense. of an image up to the adequate level of human
visual system.
Image encryption is a useful technique for converting
visual data into a form that is hard for humans to • The Logistic chaotic map provides the good level of
comprehend. Secure form of communication for images is encryption with larger key space.
always provided by the variety of research in the field of The following is a breakdown of the remaining article:
cryptography. Different approaches for image cryptography The early notions are the topic of Section II. The III section
have recently been suggested, including optical image displays proposed technique, while section IV exhibits the
encryption [1], DNA coding [2], Compressive sensing [3], effectiveness of the scheme through computer simulations.
and Chaos. Finally, in part V, a conclusion is reached.
Due to the extreme sensitivity of chaotic maps to their
originating states, a number of cryptographic algorithms II. PREREQUISITES
dependent on chaos theory have been proposed [4]. As a
result, in the encryption algorithm, their originating A. K-Means Clustering
circumstances are being used as a key. Large volumes of For resolving the clustering difficulty, K-Means has been
one of the easiest unsupervised learning method. It also finds
Authorized licensed use limited to: National Institute of Technology. Downloaded on December 03,2021 at 17:52:38 UTC from IEEE Xplore. Restrictions apply.
application in image compression. K-Means employs lossy y n1 u yn (1 y n )
compression rather than lossless compression, therefore the
original picture cannot be recovered again from compressed
Two arguments are used in the above technique to
image. The disparity between the compressed picture and the
generate random sequencing. As a result, this technique
original image grows as the compression ratio increases.
exhibits disordered conduct, often referred as chaotic
It is a clustering method based on centroid values. The behavior. Fig. 2 depicts a schematic approach of illustrating
method divides the data into k distinct clusters as shown in this process, in which the bifurcation diagram provides
fig. 1. The centroid point represents each cluster in the K- information on machine dynamics. Fig. 2 shows a bifurcation
Means clustering technique. It divides data sets into k diagram where value begins at u = 3.75 and ends at u = 4.
clusters Si(0,1,2,....k), each of which has a centroid (cluster For y1, y2, y3.....yn , it obtains values between 0 and 1 [10].
center) Ci [8]. The K-means clustering technique for picture
compression works on the following principle:
The value of k (Number of chosen clusters) is
critical in the sense that k must be smaller than the
number of picture pixels N.
By using pixel of the picture as a data set, the
centroid is calculated using the K-means method to
get the centroid µ.
Every pixel's centroid and index of the centroid are
stored, eliminating the need to preserve all of the
source data.
Authorized licensed use limited to: National Institute of Technology. Downloaded on December 03,2021 at 17:52:38 UTC from IEEE Xplore. Restrictions apply.
Fig. 3. Flow diagram of the proposed compression encryption algorithm.
Authorized licensed use limited to: National Institute of Technology. Downloaded on December 03,2021 at 17:52:38 UTC from IEEE Xplore. Restrictions apply.
Fig. 6. Correlation coefficient for original and compressed encrypted Pepper image.
Authorized licensed use limited to: National Institute of Technology. Downloaded on December 03,2021 at 17:52:38 UTC from IEEE Xplore. Restrictions apply.