DESIGN AND IMPLEMENTATION OF SELECTIVE ENCRYPTION OF STILL IMAGE (CASE STUDY OF WOMAN OF FAITH)

ABSTRACT
Images account for a significant and growing fraction of Web downloads. The traditional approach to transporting images uses TCP, which provides a generic reliable in-order byte-stream abstraction, but which is overly restrictive for image data. We analyze the progression of image quality at the receiver with time, and show that the in-order delivery abstraction provided by a TCP-based approach prevents the receiver application from processing and rendering portions of an image when they actually arrive. The end result is that an image is rendered in bursts interspersed with long idle times rather than smoothly. This paper describes the design, implementation, and evaluation of the image transport protocol (ITP) for image transmission over loss-prone congested or wireless networks. ITP improves user-perceived latency using application-level framing (ALF) and out-of-order application data unit (ADU) delivery, achieving significantly better interactive performance as measured by the evolution of peak signal-to-noise ratio (PSNR) with time at the receiver. ITP runs over UDP, incorporates receiver-driven selective reliability, uses the congestion manager (CM) to adapt to network congestion, and is customizable for specific image formats (e.g., JPEG and JPEG2000). ITP enables a variety of new receiver post-processing algorithms such as error concealment that further improve the interactivity and responsiveness of reconstructed images. Performance experiments using our implementation across a variety of loss conditions demonstrate the benefits of ITP in improving the interactivity of image downloads at the receiver. This is achieved with the help of some software like macromedia Dream weaver and Flash. 

TABLE OF CONTENTS
TITLE PAGE
CERTIFICATION
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENTS

CHAPTER ONE
INTRODUCTION
1.1BACKGROUND OF THE STUDY
1.2STATE OF THE PROBLEM
1.3PURPOSE OF THE STUDY
1.4AIMS AND OBJECTIVES
1.5SCOPE OF STUDY
1.6LIMITATIONS OF STUDY
1.7ASSUMPTIONS
1.8DEFINITION OF TERMS

CHAPTER TWO
LITERATURE REVIEW

CHAPTER THREE
3.1DESCRIPTION AND ANALYSIS OF EXISTING SYSTEM
3.2FACT FINDING METHOD USED
3.3ORGANIZATION STRUCTURE
3.4OBJECTIVES OF EXISTING SYSTEM
3.5INPUT, PROCESS AND OUTPUT ANALYSIS
3.6INFORMATION FLOW DIAGRAMS
3.7PROBLEMS OF THE EXISTING SYSTEM
3.8JUSTIFICATION OF THE NEW SYSTEM

CHAPTER FOUR
4.1DESIGN OF THE NEW SYSTEM
4.2INPUT SPECIFICATION AND DESIGN
4.3OUTPUT SPECIFICATION AND DESIGN
4.4FILE DESIGN
4.5PROCEDURE CHART
4.6SYSTEM FLOW CHART
4.7SYSTEM REQUIREMENTS

CHAPTER FIVE
5.1IMPLEMENTATION
5.2PROGRAM DESIGN
5.3PROGRAM FLOWCHART
5.4PSEUDO CODE
5.5SOURCE PROGRAM: TEST RUN
5.6DOCUMENTATION
5.7RECOMMENDATION
5.8CONCLUSION
BIBLIOGRAPHY

Overall Rating

0

5 Star
(0)
4 Star
(0)
3 Star
(0)
2 Star
(0)
1 Star
(0)
APA

Possibility, A. (2018). DESIGN AND IMPLEMENTATION OF SELECTIVE ENCRYPTION OF STILL IMAGE (CASE STUDY OF WOMAN OF FAITH). Afribary. Retrieved from https://afribary.com/works/design-and-implementation-of-selective-encryption-of-still-image-case-study-of-woman-of-faith-9884

MLA 8th

Possibility, Aka "DESIGN AND IMPLEMENTATION OF SELECTIVE ENCRYPTION OF STILL IMAGE (CASE STUDY OF WOMAN OF FAITH)" Afribary. Afribary, 29 Jan. 2018, https://afribary.com/works/design-and-implementation-of-selective-encryption-of-still-image-case-study-of-woman-of-faith-9884. Accessed 22 Nov. 2024.

MLA7

Possibility, Aka . "DESIGN AND IMPLEMENTATION OF SELECTIVE ENCRYPTION OF STILL IMAGE (CASE STUDY OF WOMAN OF FAITH)". Afribary, Afribary, 29 Jan. 2018. Web. 22 Nov. 2024. < https://afribary.com/works/design-and-implementation-of-selective-encryption-of-still-image-case-study-of-woman-of-faith-9884 >.

Chicago

Possibility, Aka . "DESIGN AND IMPLEMENTATION OF SELECTIVE ENCRYPTION OF STILL IMAGE (CASE STUDY OF WOMAN OF FAITH)" Afribary (2018). Accessed November 22, 2024. https://afribary.com/works/design-and-implementation-of-selective-encryption-of-still-image-case-study-of-woman-of-faith-9884