CFP last date
22 April 2024
Reseach Article

A Novel Framework for Image Encryption using Karhunen-Loeve Transform

by T. Sivakumar, R. Venkatesan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 54 - Number 2
Year of Publication: 2012
Authors: T. Sivakumar, R. Venkatesan
10.5120/8535-2073

T. Sivakumar, R. Venkatesan . A Novel Framework for Image Encryption using Karhunen-Loeve Transform. International Journal of Computer Applications. 54, 2 ( September 2012), 1-6. DOI=10.5120/8535-2073

@article{ 10.5120/8535-2073,
author = { T. Sivakumar, R. Venkatesan },
title = { A Novel Framework for Image Encryption using Karhunen-Loeve Transform },
journal = { International Journal of Computer Applications },
issue_date = { September 2012 },
volume = { 54 },
number = { 2 },
month = { September },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume54/number2/8535-2073/ },
doi = { 10.5120/8535-2073 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:54:37.843517+05:30
%A T. Sivakumar
%A R. Venkatesan
%T A Novel Framework for Image Encryption using Karhunen-Loeve Transform
%J International Journal of Computer Applications
%@ 0975-8887
%V 54
%N 2
%P 1-6
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The Karhunen-Loeve (KL) transform is widely used technique for image compression or clustering analysis. Since KL transform is a reversible linear transform, a novel cryptosystem is developed to provide confidentiality service for images. The original image (x), in the form of square matrix, is given as input to the KL transform which in turn produces the encrypted image (y) and the decryption key (k). Since the key matrix (k) plays a major role for decryption, it is encrypted by the receiver's public key by using RSA algorithm. The encrypted image (y) and key matrix (k) are transmitted over the public network. On receiving the encrypted image (y) and key matrix (k), the receiver takes the transpose of the decrypted key matrix (k) and multiplies the result with the encrypted image (y) to get the original image (x). The time complexity of the proposed scheme is calculated separately for both encryption, O(n2), and decryption, O(n3). The histograms of the encrypted images are almost uniform and different from that of the original images. This method of image cryptosystem is more suitable for small images.

References
  1. Bibhudendra, Soraj Kumar Panigrahy, Sarat Kumar Patra and Ganapati Panda, "Image Encryption using Advanced Hill Cipher Algorithm", International Journal of Recent Trends in Engineering, Vol. 1, No. 1, 2009.
  2. Douglas R Stinson, Cryptography: Theory and Practice, Chapman and Hall, New York, 2002.
  3. Dr. S. Sridharan, E. Dawson, and B. M Goldburg, "Speech Encryption Using Discrete Orthogonal Transforms", IEEE, 1990.
  4. G. A. Sathishkumar, Dr. K. Bhoopathy, bagan and Dr. R. Sriraam, "Image Encryption Based on Diffusion and Multiple Chaotic Maps", International Journal of Network Security & Its Applications, Vol. 3, No. 2, 2011.
  5. Han Shuihua and Yang Shuangyuan, "An Asymmetric Image Encryption Based on Matrix Transformation", ECTI Transactions on Computer and Information Technology Vol. 1, No. 2, November, 2005.
  6. HaojiangGao, Yisheng Zhang, Shuyun Liang and Dequn Li, "A New Chaotic Algorithm for Image Encryption", Elsevier Science Direct, 2005.
  7. Hongjun Liu, Xingyuan Wang, and Abdurahmankadir, "Image encryption using DNA complementary rule and chaotic maps", Elsevier, January 2012.
  8. Huaqian Yang, Kwok-Wo Wong, Xiaofeng Liao, Wei Zhang, Pengcheng Wei, "Fast image encryption and authentication scheme based on chaotic maps", Elsevier, 2010.
  9. IsmetOzturk and Ibrahim Sogukpinar, "Analysis and Comparison of Image Encryption Algorithms", World Academy of Science, Engineering and Technology, 2005.
  10. K. Sumathy 1, R. Tamilselvi, "Comparison of Encryption Levels for Image Security Using Various Transforms", International Conference on Information and Network Technology, IACSIT Press, Singapore, 2011.
  11. Kanso, M. Ghebleh, "A novel image encryption algorithm based on a 3D chaotic map", Elsevier, December 2011.
  12. Liu Hongjun and Wang Xingyuan, "Color image encryption based on one-time keys and robust chaotic maps", Computers and Mathematics with Applications – Elsevier, 2010.
  13. Mohammad Ali BaniYounes and AmanJantan, "Image Encryption using Block-Based Transformation Algorithm", International Journal of Computer Science, 35:1, IJCS_35_1_03, 2008.
  14. NooshinBigdeli,YousefFarid n, KarimAfshar, "A novel image encryption/decryption scheme based on chaotic neural networks ", Elsevier, 2012.
  15. S. S. Maniccam, N. G. Bourbakis, "Image and video encryption using SCAN patterns," Journal of Pattern Recognition Society, vol. 37, no. 4, pp. 725–737, 2004.
  16. S. V. Sathyanarayana, M. Aswatha Kumar and K. N. HariBhat, "Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence of Cyclic Elliptic Curve Points", International Journal of Network Security, Vol. 12, No. 3, PP. 137 -150, May 2011.
  17. Seyed Mohammad Seyedzadeh, and SattarMirzakuchaki, "Fast Color Image Encryption Algorithm Based on Coupled 2D Piecewise Chaotic Map", Elsevier, 2011.
  18. Tzung-Her Chen, Kuang-Che Li, "Multi-image encryption by circular random grids", Elsevier, November 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Image Encryption KL Transform Image Histogram and Correlation Coefficient