CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Fractional Bio-Image Encryption using Karhunen-Loeve Transform

by T. Sivakumar, R. Venkatesan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 74 - Number 6
Year of Publication: 2013
Authors: T. Sivakumar, R. Venkatesan
10.5120/12888-9758

T. Sivakumar, R. Venkatesan . Fractional Bio-Image Encryption using Karhunen-Loeve Transform. International Journal of Computer Applications. 74, 6 ( July 2013), 16-20. DOI=10.5120/12888-9758

@article{ 10.5120/12888-9758,
author = { T. Sivakumar, R. Venkatesan },
title = { Fractional Bio-Image Encryption using Karhunen-Loeve Transform },
journal = { International Journal of Computer Applications },
issue_date = { July 2013 },
volume = { 74 },
number = { 6 },
month = { July },
year = { 2013 },
issn = { 0975-8887 },
pages = { 16-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume74/number6/12888-9758/ },
doi = { 10.5120/12888-9758 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:41:30.932753+05:30
%A T. Sivakumar
%A R. Venkatesan
%T Fractional Bio-Image Encryption using Karhunen-Loeve Transform
%J International Journal of Computer Applications
%@ 0975-8887
%V 74
%N 6
%P 16-20
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Bio-images such as fingerprint, face and iris are sensitive and hence small change in such images could affect the result substantially. The processing overhead could be reduced by encrypting a preferred region instead of encrypting the entire image. In this paper a novel fractional bio-image encryption method is presented using Karhunen-Loeve (KL) transform, which is a reversible linear transform. The original image (x) is given as input to cropping function to identify and extract the region to be encrypted. Next, the extracted region, in the form of square, is given as input to the KL transform which in turn produces the cipher image (y) and the inverse transform key (T). The encrypted region is combined with the original image to get the partial cipher image. Since the inverse transform key (T) plays a major role for decryption, it could be given to the receiver by encrypting with symmetric key cryptosystem. On receiving the partial encrypted image (y) the receiver identify and extract the encrypted region and apply the inverse of KL transform using the inverse key (T). The result is merged with the received image to get the original image (x). The histograms of the encrypted portion of the images are nearly uniform and different from the histogram of original images. This method of fractional bio-image cryptosystem will reduce the overhead of encryption and decryption processes.

References
  1. Hongjun Liu. Xingyuan Wang. and Abdurahman kadir, "Image encryption using DNA complementary rule and chaotic maps", Elsevier, 2012.
  2. Ismet Ozturk and Ibrahim Sogukpinar, "Analysis and Comparison of Image Encryption Algorithms", World Academy of Science, Engineering and Technology, 2005.
  3. Sumathy K, and R. Tamilselvi, "Comparison of Encryption Levels for Image Security Using Various Transforms", International Conference on Information and Network Technology, IACSIT Press, Singapore, 2011.
  4. Kanso, M. Ghebleh, "A Novel Image Encryption Algorithm based on 3D Chaotic Map", Elsevier, December 2011.
  5. Liu Hongjun and Wang Xingyuan, "Color Image Encryption based on One-time Keys and Robust Chaotic Maps", Computers and Mathematics with Applications – Elsevier, 2010.
  6. Mohammad Ali Bani Younes and Aman Jantan, "Image Encryption using Block-Based Transformation Algorithm", International Journal of Computer Science, 2008.
  7. Nooshin Bigdeli,Yousef Farid, Karim Afshar, "A Novel Image Encryption/Decryption Scheme based on Chaotic Neural Networks", Elsevier, 2012.
  8. Sathyanarayana S. V, M. Aswatha Kumar and K. N. Hari Bhat, "Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence of Cyclic Elliptic Curve Points", International Journal of Network Security, 2011.
  9. Seyed Mohammad Seyedzadeh, and Sattar Mirzakuchaki, "Fast Color Image Encryption Algorithm Based on Coupled 2D Piecewise Chaotic Map", Elsevier, 2011.
  10. Tzung-Her Chen, Kuang-Che Li, "Multi-image Encryption by Circular Random Grids", Elsevier, 2011.
  11. Sapna Sasidharan and Deepu Sleeba Philip, "A Fast Partial Image Encryption Scheme with Wavelet Transform and RC4", International Journal of Advances in Engineering & Technology, 2011.
  12. Subba Rao Y. V, Abhijit Mitra and S. R. Mahadeva Prasanna, "A Partial Image Encryption Method with Pseudo Random Sequences", Springer, 2006.
Index Terms

Computer Science
Information Sciences

Keywords

Bio-image encryption Partial image encryption KL transform Histogram Correlation