Lossless Compression for Raster Maps Based On Mobile

Authors(3) :-Phyo Phyo Wai, Nyein Aye, Mie Mie Khin

In this paper, the combination of quadtree and block encoding compression approach is proposed for lossless compression of raster maps. This application is implemented on the mobile phone. Firstly, this approach iteratively split the raster map into quarter sections and the quadtree structure will construct. To index the spatial data, quadtree uses Morton encoding method. This approach defined a limit of leaf level of quadtree. When the splitting is reach to the limit level, each leaf nodes use the block encoding approach.

Authors and Affiliations

Phyo Phyo Wai
University of Computer Studies, Mandalay, Myanmar
Nyein Aye
Hardware Department, University of Computer Studies, Mandalay, Myanmar
Mie Mie Khin
Pro-Rector, University of Computer Studies, Mandalay, Myanmar

Quadtree, Block Encoding, Raster Map, Lossless Compression

[1] S. Ruj, M. Stojmenovic, and A. Nayak,” Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds”, IEEE transactions on Parallel and Distributed Systems, Vol. 25, No. 2, February 2014.
[2] S. Ruj, M. Stojmenovic, and A. Nayak, “Privacy Preserving Access Control with Authentication for Securing Data in Clouds,” Proc.IEEE/ACM Int’l Symp. Cluster, Cloud and Grid Computing, pp. 556-563, 2012.
[3] A.B. Lewko and B. Waters, “Decentralizing Attribute-Based Encryption,” Proc. Ann. Int’l Conf. Advances in Cryptology (EUROCRYPT), pp. 568-588, 2011.
[4] Mohamed Nabeel, Member, IEEE, Ning Shang, and Elisa Bertino, Fellow, IEEE,” Privacy Preserving Policy-Based Content Sharing in Public Clouds” IEEE Transactions on Knowledge and Data Engineering, Vol. 25, No. 11, November 2013.
[5] Changji Wang and Jianfa Luo,” An Efficient Key-Policy Attribute-Based Encryption Scheme withConstant Ciphertext Length”, Hindawi Publishing Corporation Mathematical Problems in Engineering, Volume 2013, Article ID 810969, 7 pages.
[6] S. Kamara and K. Lauter, “Cryptographic Cloud Storage,” Proc.14th Int’l Conf. Financial Cryptography and Data Security, pp. 136-149, 2010.
[7] Junbeom Hur and Dong Kun Noh,” Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems”, IEEE Transactions on Parallel and Distributed Systems, Vol. 22, No. 7, July 2011.
[8] Junzuo Lai, Robert H. Deng, Chaowen Guan, and Jian Weng,” Attribute-Based Encryption With Verifiable Outsourced Decryption”, IEEE Transactions on Information Forensics and Security, Vol. 8, No. 8, August 2013.
[9] Fuchun Guo, Yi Mu,Willy Susilo,Duncan S. Wong, and Vijay dharajan,"CP-ABE With Constant-Size Keys for Lightweight Devices”, IEEE Transactions on Information Forensics and Security, Vol. 9, No. 5, May 2014.
[10] Piotr K. Tysowski and M. Anwarul Hasan,” Hybrid Attribute- and Re-Encryption-Based Key Management for Secure and Scalable Mobile Applications in Clouds,” IEEE Transactions on Cloud Computing, Vol. 1, No. 2, July-December 2013.
[11] Jin Li, Xinyi Huang, Jingwei Li, Xiaofeng Chen, and Yang Xiang,” Securely Outsourcing Attribute-Based Encryption with Checkability”, IEEE Transactions on Parallel and Distributed Systems, Vol. 25, No. 8, August 2014.
[12] Ming Li, Shucheng Yu, Yao Zheng, Kui Ren and Wenjing Lou,” Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-Based Encryption”, IEEE Transactions on Parallel and Distributed Systems, Vol. 24, No. 1, January 2013. [13]. John Bethencourt , Amit Sahai and Brent Waters,” Ciphertext-Policy Attribute-Based Encryption”.

Publication Details

Published in : Volume 1 | Issue 2 | March-April 2015
Date of Publication : 2015-04-25
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 1-6
Manuscript Number : IJSRSET151172
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

Phyo Phyo Wai, Nyein Aye, Mie Mie Khin, " Lossless Compression for Raster Maps Based On Mobile , International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 2, pp.1-6, March-April-2015. Citation Detection and Elimination     |     
Journal URL : https://ijsrset.com/IJSRSET151172

Article Preview