scispace - formally typeset
Open AccessJournal Article

Encryption Image via Mutual Singular Value Decomposition

Adil AL-Rammahi
- 03 Jan 2015 - 
- Vol. 9, Iss: 1, pp 286-289
TLDR
Two matrices images, one is the public, and the second is the secret (original) are introduced, which are needed through egovernment data base and the original image is deduced by mutual method of the three public files.
Abstract
Abstract—Image or document encryption is needed through egovernment data base. Really in this paper we introduce two matrices images, one is the public, and the second is the secret (original). The analyses of each matrix is achieved using the transformation of singular values decomposition. So each matrix is transformed or analyzed to three matrices say row orthogonal basis, column orthogonal basis, and spectral diagonal basis. Product of the two row basis is calculated. Similarly the product of the two column basis is achieved. Finally we transform or save the files of public, row product and column product. In decryption stage, the original image is deduced by mutual method of the three public files.

read more

Citations
More filters
Journal ArticleDOI

Image Cryptography with Least Squares Approximations

TL;DR: This work is one of the first attempts due to the use of the least squares polynomial of fifth degree technique as data interpolation in the image cryptography process, revealing its reliability and robustness against security attacks.
References
More filters
Journal ArticleDOI

The Essential Guide to Image Processing

TL;DR: This comprehensive and state-of-the art approach to image processing gives engineers and students a thorough introduction, and includes full coverage of key applications: image watermarking, fingerprint recognition, face recognition and iris recognition and medical imaging.
Book

Introductory Linear Algebra with Applications

TL;DR: The Matlab Matlab for linear algebra as discussed by the authors is a Matlab extension of Matlab with linear algebra matlab answers to odd-numbered exercises and chapter tests, and it can be used in linear algebra applications.
Journal ArticleDOI

Digital image copyright protection scheme based on visual cryptography and singular value decomposition

TL;DR: Experimental results show that the proposed scheme, compared with existing schemes, achieves stronger robustness against several attacks.
Journal ArticleDOI

Image encryption based on singular value decomposition

TL;DR: A novel secure encryption method based on using singular value decomposition SVD that is tested with many images encryption and gives promised results.
Proceedings ArticleDOI

A new image encryption based on chaotic systems and singular value decomposition

TL;DR: Simulation results justify the feasibility of the proposed scheme in image encryption purpose and show the ability to enforce security in chaotic systems and singular value decomposition.
Related Papers (5)