Lossless Compression for Raster Maps Based On Mobile

Authors

  • Phyo Phyo Wai  University of Computer Studies, Mandalay, Myanmar
  • Nyein Aye  Hardware Department, University of Computer Studies, Mandalay, Myanmar
  • Mie Mie Khin  Pro-Rector, University of Computer Studies, Mandalay, Myanmar

Keywords:

Quadtree, Block Encoding, Raster Map, Lossless Compression

Abstract

In this paper, the combination of quadtree and block encoding compression approach is proposed for lossless compression of raster maps. This application is implemented on the mobile phone. Firstly, this approach iteratively split the raster map into quarter sections and the quadtree structure will construct. To index the spatial data, quadtree uses Morton encoding method. This approach defined a limit of leaf level of quadtree. When the splitting is reach to the limit level, each leaf nodes use the block encoding approach.

References

[1] S. Ruj, M. Stojmenovic, and A. Nayak,” Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds”, IEEE transactions on Parallel and Distributed Systems, Vol. 25, No. 2, February 2014.
[2] S. Ruj, M. Stojmenovic, and A. Nayak, “Privacy Preserving Access Control with Authentication for Securing Data in Clouds,” Proc.IEEE/ACM Int’l Symp. Cluster, Cloud and Grid Computing, pp. 556-563, 2012.
[3] A.B. Lewko and B. Waters, “Decentralizing Attribute-Based Encryption,” Proc. Ann. Int’l Conf. Advances in Cryptology (EUROCRYPT), pp. 568-588, 2011.
[4] Mohamed Nabeel, Member, IEEE, Ning Shang, and Elisa Bertino, Fellow, IEEE,” Privacy Preserving Policy-Based Content Sharing in Public Clouds” IEEE Transactions on Knowledge and Data Engineering, Vol. 25, No. 11, November 2013.
[5] Changji Wang and Jianfa Luo,” An Efficient Key-Policy Attribute-Based Encryption Scheme withConstant Ciphertext Length”, Hindawi Publishing Corporation Mathematical Problems in Engineering, Volume 2013, Article ID 810969, 7 pages.
[6] S. Kamara and K. Lauter, “Cryptographic Cloud Storage,” Proc.14th Int’l Conf. Financial Cryptography and Data Security, pp. 136-149, 2010.
[7] Junbeom Hur and Dong Kun Noh,” Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems”, IEEE Transactions on Parallel and Distributed Systems, Vol. 22, No. 7, July 2011.
[8] Junzuo Lai, Robert H. Deng, Chaowen Guan, and Jian Weng,” Attribute-Based Encryption With Verifiable Outsourced Decryption”, IEEE Transactions on Information Forensics and Security, Vol. 8, No. 8, August 2013.
[9] Fuchun Guo, Yi Mu,Willy Susilo,Duncan S. Wong, and Vijay dharajan,"CP-ABE With Constant-Size Keys for Lightweight Devices”, IEEE Transactions on Information Forensics and Security, Vol. 9, No. 5, May 2014.
[10] Piotr K. Tysowski and M. Anwarul Hasan,” Hybrid Attribute- and Re-Encryption-Based Key Management for Secure and Scalable Mobile Applications in Clouds,” IEEE Transactions on Cloud Computing, Vol. 1, No. 2, July-December 2013.
[11] Jin Li, Xinyi Huang, Jingwei Li, Xiaofeng Chen, and Yang Xiang,” Securely Outsourcing Attribute-Based Encryption with Checkability”, IEEE Transactions on Parallel and Distributed Systems, Vol. 25, No. 8, August 2014.
[12] Ming Li, Shucheng Yu, Yao Zheng, Kui Ren and Wenjing Lou,” Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-Based Encryption”, IEEE Transactions on Parallel and Distributed Systems, Vol. 24, No. 1, January 2013. [13]. John Bethencourt , Amit Sahai and Brent Waters,” Ciphertext-Policy Attribute-Based Encryption”.

Downloads

Published

2015-04-25

Issue

Section

Research Articles

How to Cite

[1]
Phyo Phyo Wai, Nyein Aye, Mie Mie Khin, " Lossless Compression for Raster Maps Based On Mobile , International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 2, pp.1-6, March-April-2015.