ABSTRACT
Images account for a significant and growing fraction of Web downloads. The traditional approach to transporting images uses TCP, which provides a generic reliable in-order byte-stream abstraction, but which is overly restrictive for image data. We analyze the progression of image quality at the receiver with time, and show that the in-order delivery abstraction provided by a TCP-based approach prevents the receiver application from processing and rendering portions of an image when they actually arrive. The end result is that an image is rendered in bursts interspersed with long idle times rather than smoothly. This paper describes the design, implementation, and evaluation of the image transport protocol (ITP) for image transmission over loss-prone congested or wireless networks. ITP improves user-perceived latency using application-level framing (ALF) and out-of-order application data unit (ADU) delivery, achieving significantly better interactive performance as measured by the evolution of peak signal-to-noise ratio (PSNR) with time at the receiver. ITP runs over UDP, incorporates receiver-driven selective reliability, uses the congestion manager (CM) to adapt to network congestion, and is customizable for specific image formats (e.g., JPEG and JPEG2000). ITP enables a variety of new receiver post-processing algorithms such as error concealment that further improve the interactivity and responsiveness of reconstructed images. Performance experiments using our implementation across a variety of loss conditions demonstrate the benefits of ITP in improving the interactivity of image downloads at the receiver. This is achieved with the help of some software like macromedia Dream weaver and Flash.
TABLE OF CONTENTS
TITLE PAGE
CERTIFICATION
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENTS
CHAPTER ONE
INTRODUCTION
1.1 BACKGROUND OF THE STUDY
1.2 STATE OF THE PROBLEM
1.3 PURPOSE OF THE STUDY
1.4 AIMS AND OBJECTIVES
1.5 SCOPE OF STUDY
1.6 LIMITATIONS OF STUDY
1.7 ASSUMPTIONS
1.8 DEFINITION OF TERMS
CHAPTER TWO
LITERATURE REVIEW
CHAPTER THREE
3.1 DESCRIPTION AND ANALYSIS OF EXISTING SYSTEM
3.2 FACT FINDING METHOD USED
3.3 ORGANIZATION STRUCTURE
3.4 OBJECTIVES OF EXISTING SYSTEM
3.5 INPUT, PROCESS AND OUTPUT ANALYSIS
3.6 INFORMATION FLOW DIAGRAMS
3.7 PROBLEMS OF THE EXISTING SYSTEM
3.8 JUSTIFICATION OF THE NEW SYSTEM
CHAPTER FOUR
4.1 DESIGN OF THE NEW SYSTEM
4.2 INPUT SPECIFICATION AND DESIGN
4.3 OUTPUT SPECIFICATION AND DESIGN
4.4 FILE DESIGN
4.5 PROCEDURE CHART
4.6 SYSTEM FLOW CHART
4.7 SYSTEM REQUIREMENTS
CHAPTER FIVE
5.1 IMPLEMENTATION
5.2 PROGRAM DESIGN
5.3 PROGRAM FLOWCHART
5.4 PSEUDO CODE
5.5 SOURCE PROGRAM: TEST RUN
5.6 DOCUMENTATION
5.7 RECOMMENDATION
5.8 CONCLUSION
BIBLIOGRAPHY
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2014, 08). Design And Implementation Of Selective Encryption Of Still Image (case Study Of Woman Of Faith).. ProjectStoc.com. Retrieved 08, 2014, from https://projectstoc.com/read/2771/design-and-implementation-of-selective-encryption-of-still-image-case-study-of-woman-of-faith-9884
"Design And Implementation Of Selective Encryption Of Still Image (case Study Of Woman Of Faith)." ProjectStoc.com. 08 2014. 2014. 08 2014 <https://projectstoc.com/read/2771/design-and-implementation-of-selective-encryption-of-still-image-case-study-of-woman-of-faith-9884>.
"Design And Implementation Of Selective Encryption Of Still Image (case Study Of Woman Of Faith).." ProjectStoc.com. ProjectStoc.com, 08 2014. Web. 08 2014. <https://projectstoc.com/read/2771/design-and-implementation-of-selective-encryption-of-still-image-case-study-of-woman-of-faith-9884>.
"Design And Implementation Of Selective Encryption Of Still Image (case Study Of Woman Of Faith).." ProjectStoc.com. 08, 2014. Accessed 08, 2014. https://projectstoc.com/read/2771/design-and-implementation-of-selective-encryption-of-still-image-case-study-of-woman-of-faith-9884.
- Related Works
- Design And Implementation Of Interactive Website For Internet Banking (a Case Study Of All States Trust Bank Plc Enugu)
- Design And Implementation Of A Computer Based Warehousing Information System (a Case Study Of Nigeria Ports Authority) (npa) Lagos
- Application Of Fuzzy Logic In An Elevator
- Design And Implementation Of Automated Motor Vehicle Driving Licensing System
- Design And Implementation Of A Computersized National Identity Card Processing System (a Case Study Of National Identity Card, Anaoch Local Governemnt Area Anambra State.)
- Design And Implementation Of A Protocol Sequencer And Subsystem Interface: Administrator Tool Which Will Monitor Application On A Lan Provide Functions (case Study Of Networking Training)
- Design And Implementation Of A Computer Based Warehousing Information System (a Case Study Of Nigeria Ports Authority) (npa) Lagos
- Design And Implementation Of A Computer Based Bill Of Material Processing System
- The Design And Implementation Of A Software For Automobile Insurance Scheme In Nigeria. A Case Study Of Motor Insurance Departmetn Of Universal Insurance Company Ltd Enugu.
- Location Aided Routing For Mobile Ad-hoc Networks (case Study Of Easy Link Cafee)
