Journal of Engineering and Applied Sciences

Year: 2018
Volume: 13
Issue: 21
Page No. 9194 - 9203

Image Encryption and Decryption via. (GSVD-Modular Numbers)

Authors : Mohammed Abdul Hameed Jassim AL-Kufi, Dheiaa Shakir Redhaa and Mujtaba Zuhair Ali

References

Abbadi, N.K.E., A. Mohamad and M. Abdul-Hameed, 2014. Image encryption based on singular value decomposition. J. Comput. Sci., 10: 1222-1230.
CrossRef  |  Direct Link  |  

Abdul-Hameed, M. and J. Al-Kufi, 2014. Image encryption with singular values decomposition aided. MSc Thesis, University of Kufa, Kufa, Iraq.

Abdulla, S., 2010. New visual cryptography algorithm for colored image. J. Comput., 2: 21-25.
Direct Link  |  

Aggarwal, E., E. Kaur and E. Anantdeep, 2010. An efficient watermarking algorithm to improve payload and robustness without affecting image perceptual quality. J. Comput., 2: 105-109.
Direct Link  |  

Al-Kufi, M.A.H.J., H.R. Hashim, A.M. Hussein and H.R. Mohammed, 2017. An algorithm based on GSVD for image encryption. Math. Comput. Appl., 22: 1-8.
CrossRef  |  Direct Link  |  

Al-Rammahi, A. and M. Al-Kufi, 2016. Image cryptography via SVD modular numbers. Eur. J. Sci. Res., 138: 1-2.
Direct Link  |  

Chaudhari, J.C., 2010. Design of artificial back propagation neural network for drug pattern recognition. Intl. J. Comput. Sci. Eng., 2010: 1-6.
Direct Link  |  

Divya, V.V., S.K. Sudha and V.R. Resmy, 2012. Simple and secure image encryption. Intl. J. Comput. Sci. Issues, 9: 286-289.
Direct Link  |  

El-said, S.A., K.F. Hussein and M.M. Fouad, 2010. Securing image transmission using in-compression encryption technique. Intl. J. Comput. Sci. Secur., 4: 466-481.
Direct Link  |  

Gonzalez, R.C. and R.E. Woods, 2008. Digital Image Processing. 3rd Edn., Prentice hall, Upper Saddle River, New Jersey, USA., ISBN:9780135052679, Pages: 954.

Hameed, M.A. and J. Al-Kufi, 2018. An a new algorithm based on (General Singular values Decomposition) for image cryptography. Elixir Digital Process., 114: 49604-49609.

Hansen, P.C., 1989. Regularization, GSVD and truncated GSVD. BIT. Numer. Math., 29: 491-504.
CrossRef  |  Direct Link  |  

Jain, A.K., 1989. Fundamentals of Digital Image Processing. 4th Edn., Prentice Hall, Upper Saddle River, New Jersey, USA., ISBN:9780133361650, Pages: 569.

Jassim, M.A.H., 2016. Text and image encryption via text and image keys using singular value decomposition. Intl. J. Eng. Future Technol., 1: 1-16.
Direct Link  |  

Kamdar, N.P., D.G. Kamdar and D.N. Khandhar, 2013. Performance evaluation of lsb based steganography foroptimization of PSNR and MSE. J. Inf. Knowledge Res. Electron. Commun. Eng., 2: 505-509.
Direct Link  |  

Knuth, D.E., 1997. The Art of Computer Programming: Sorting and Searching. Addison-Wesley, Boston, Massachusetts, USA., ISBN:9780201896855, Pages: 780.

Kolman, B., 1984. Introductory Linear Algebra with Applications. 3rd Edn., Macmillan Publishers, Basingstoke, USA., ISBN:9780023660108, Pages: 455.

Leung, L.W., B. King and V. Vohora, 2001. Comparison of image data fusion techniques using entropy and INI. Proceedings of the 22ndAsian Conference on Remote Sensing Vol. 5, November 5-9, 2001, National University of Singapore, Singapore, pp:1-6.

Macq, B.M. and J.J. Quisquater, 2005. Cryptology for digital TV broadcasting. Proc. IEEE, 83: 944-957.
CrossRef  |  Direct Link  |  

Nori, A.S., Z.M. Taha and A.B. Sallow, 2010. An investigation for steganography using different color system. AL. Rafidain J. Comput. Sci. Math., 7: 91-108.
Direct Link  |  

Pareek, N.K., V. Patidar and K.K. Sud, 2006. Image encryption using chaotic logistic map. Image Vision Comput., 24: 926-934.
Direct Link  |  

Parker, T.S. and L.O. Chua, 1987. Chaos: A tutorial for engineers. Proc. IEEE, 75: 982-1008.
CrossRef  |  

Sathishkumar, G.A., K.B. Bagan and N. Sriraam, 2011. Image encryption based on diffusion and multiple chaotic maps. Int. J. Network Secur. Applic., 3: 181-194.
CrossRef  |  Direct Link  |  

Shah, J. and V. Saxena, 2011. Performance study on image encryption schemes. Intl. J. Comput. Sci. Issues, 8: 349-355.
Direct Link  |  

Tadala, T. and S.E.V. Narayana, 2012. A novel PSNR-B approach for evaluating the quality of De-blocked images. IOSR. J. Comput. Eng., 4: 40-49.
CrossRef  |  Direct Link  |  

Wei, Y., P. Xie and L. Zhang, 2016. Tikhonov regularization and randomized GSVD. SIAM. J. Matrix Anal. Appl., 37: 649-675.
CrossRef  |  Direct Link  |  

Wu, C.W. and N.F. Rul'kov, 1993. Studying chaos via 1-D maps-A tutorial. IEEE. Trans. Circuits Syst. I. Fundam. Theory Appl., 40: 707-721.
CrossRef  |  Direct Link  |  

Wu, C.W. and N.F. Rul'kov, 1993. Studying chaos via 1-D maps-A tutorial. IEEE. Trans. Circuits Syst. I. Fundam. Theory Appl., 40: 707-721.
CrossRef  |  Direct Link  |  

Yang, M., N. Bourbakis and S. Li, 2004. Data-image-video encryption. Potentials, 23: 28-34.
CrossRef  |  Direct Link  |  

Yen, J.C. and J.I. Guo, 2000. A new chaotic mirror-like image encryption algorithm and its VLSI architecture. Pattern Recognit. Image Anal. Adv. Math. Theory Appl., 10: 236-247.

Yi, X., C.H. Tan, C.K. Slew and M.R. Syed, 2001. Fast encryption for multimedia. IEEE. Trans. Consum. Electron., 47: 101-107.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved