Home            Contact us            FAQs
    
      Journal Home      |      Aim & Scope     |     Author(s) Information      |      Editorial Board      |      MSP Download Statistics

     Research Journal of Applied Sciences, Engineering and Technology


Performance of Data Images Encryption Based Karhunen-Leoeve Transforms

1Hind Rustum Mohammed Shaban, 2Inaam R. Alsaiq and 1Alaa Abdul Hussein Mezher
1Computer Science Department
2Mathmatics Department, Faculty of Computer Science and Maths, Kufa University, Najaf, 54001, Iraq
Research Journal of Applied Sciences, Engineering and Technology  2017  3:95-100
http://dx.doi.org/10.19026/rjaset.14.4151  |  © The Author(s) 2017
Received: September 23, 2016  |  Accepted: February 20, 2017  |  Published: March 15, 2017

Abstract

The purpose of this study encryption method will apply on all parts image by the Karhunen-Loeve Transform (KLT). It will be discussed time complexity and storage complexity in method (database consists of 40 images). The Karhunen-Loeve Transform (KLT) is always used in image processing and it has a wide application area. It was called "the best transform" because the decorrelation, energy concentration and Mean Square Error (MSE) is very small. The first step is found The Characteristics of the (KLT) by convert image matrix to elements vector, the second step found the covariance matrix, then compute its Great ability of decorrelation. Finally, we will reconstruct the de-nosing matrix to the Image by KLT. The experimental results and security analysis confirm the effectiveness of the indicates the robustness and advantages of the algorithm.

Keywords:

Encryption algorithms, encryption data images, encryption decryption algorithm, karhunen-leoeve transforms, mathematics module,


References

  1. Dhaka, V., R.C. Poonia and Y.V. Singh, 2013. A novel algorithm for image steganography based on effective channel selection technique. Int. J. Adv. Res. Comput. Sci. Softw. Eng., 3(8): 428-433.
    Direct Link
  2. Divya, V.V., S.K. Sudha and V.R. Resmy, 2012. Simple and secure image encryption. Int. J. Comput. Sci. Issue., 9(6(3): 286-289.
    Direct Link
  3. Gonzalez, R.C. and R.E. Woods, 1992. Digital Image Processing. 2nd Edn., Prentice Hall, Upper Saddle River, NJ.
  4. Jin, S. and N. Gaoding, 2012. Signal processing using the wavelet transform and the Karhunen-Loeve transform. M.Sc. Thesis, Department Computer Science, School of Health and Society, Kristianstad University, Sweden.
    Direct Link
  5. Kaur, R. and E.K. Singh, 2013. Image encryption techniques: A selected review. IOSR J. Comput. Eng., 9(6): 80-83.
    CrossRef    
  6. Pareek, N.K., 2012. Design and analysis of a novel Digital image encryption scheme. Int. J. Netw. Secur. Appl., 4(2): 95-108.
    CrossRef    
  7. Rakesh, S., A.A. Kaller, B.C. Shadakshari and B. Annappa, 2012. Multilevel Image Encryption. Retrieved from: https://arxiv.org/ftp/arxiv/papers/1202/1202.4871.pdf.
    Direct Link
  8. Salleh, M., S. Ibrahim and I.F. Isnin, 2003. Image encryption algorithm based on chaotic mapping. J. Teknol., 39(D): 1-12.
    CrossRef    

Competing interests

The authors have no competing interests.

Open Access Policy

This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Copyright

The authors have no competing interests.

ISSN (Online):  2040-7467
ISSN (Print):   2040-7459
Submit Manuscript
   Information
   Sales & Services
Home   |  Contact us   |  About us   |  Privacy Policy
Copyright © 2024. MAXWELL Scientific Publication Corp., All rights reserved