Lossless Compression for Raster Maps Based On Mobile
Keywords:
Quadtree, Block Encoding, Raster Map, Lossless CompressionAbstract
In this paper, the combination of quadtree and block encoding compression approach is proposed for lossless compression of raster maps. This application is implemented on the mobile phone. Firstly, this approach iteratively split the raster map into quarter sections and the quadtree structure will construct. To index the spatial data, quadtree uses Morton encoding method. This approach defined a limit of leaf level of quadtree. When the splitting is reach to the limit level, each leaf nodes use the block encoding approach.
References
[1] S. Ruj, M. Stojmenovic, and A. Nayak,†Decentralized Access Control with Anonymous Authentication of Data Stored in Cloudsâ€, IEEE transactions on Parallel and Distributed Systems, Vol. 25, No. 2, February 2014.
[2] S. Ruj, M. Stojmenovic, and A. Nayak, “Privacy Preserving Access Control with Authentication for Securing Data in Clouds,†Proc.IEEE/ACM Int’l Symp. Cluster, Cloud and Grid Computing, pp. 556-563, 2012.
[3] A.B. Lewko and B. Waters, “Decentralizing Attribute-Based Encryption,†Proc. Ann. Int’l Conf. Advances in Cryptology (EUROCRYPT), pp. 568-588, 2011.
[4] Mohamed Nabeel, Member, IEEE, Ning Shang, and Elisa Bertino, Fellow, IEEE,†Privacy Preserving Policy-Based Content Sharing in Public Clouds†IEEE Transactions on Knowledge and Data Engineering, Vol. 25, No. 11, November 2013.
[5] Changji Wang and Jianfa Luo,†An Efficient Key-Policy Attribute-Based Encryption Scheme withConstant Ciphertext Lengthâ€, Hindawi Publishing Corporation Mathematical Problems in Engineering, Volume 2013, Article ID 810969, 7 pages.
[6] S. Kamara and K. Lauter, “Cryptographic Cloud Storage,†Proc.14th Int’l Conf. Financial Cryptography and Data Security, pp. 136-149, 2010.
[7] Junbeom Hur and Dong Kun Noh,†Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systemsâ€, IEEE Transactions on Parallel and Distributed Systems, Vol. 22, No. 7, July 2011.
[8] Junzuo Lai, Robert H. Deng, Chaowen Guan, and Jian Weng,†Attribute-Based Encryption With Verifiable Outsourced Decryptionâ€, IEEE Transactions on Information Forensics and Security, Vol. 8, No. 8, August 2013.
[9] Fuchun Guo, Yi Mu,Willy Susilo,Duncan S. Wong, and Vijay dharajan,"CP-ABE With Constant-Size Keys for Lightweight Devicesâ€, IEEE Transactions on Information Forensics and Security, Vol. 9, No. 5, May 2014.
[10] Piotr K. Tysowski and M. Anwarul Hasan,†Hybrid Attribute- and Re-Encryption-Based Key Management for Secure and Scalable Mobile Applications in Clouds,†IEEE Transactions on Cloud Computing, Vol. 1, No. 2, July-December 2013.
[11] Jin Li, Xinyi Huang, Jingwei Li, Xiaofeng Chen, and Yang Xiang,†Securely Outsourcing Attribute-Based Encryption with Checkabilityâ€, IEEE Transactions on Parallel and Distributed Systems, Vol. 25, No. 8, August 2014.
[12] Ming Li, Shucheng Yu, Yao Zheng, Kui Ren and Wenjing Lou,†Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-Based Encryptionâ€, IEEE Transactions on Parallel and Distributed Systems, Vol. 24, No. 1, January 2013. [13]. John Bethencourt , Amit Sahai and Brent Waters,†Ciphertext-Policy Attribute-Based Encryptionâ€.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.