International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 54 - Issue 2 |
Published: September 2012 |
Authors: T. Sivakumar, R. Venkatesan |
![]() |
T. Sivakumar, R. Venkatesan . A Novel Framework for Image Encryption using Karhunen-Loeve Transform. International Journal of Computer Applications. 54, 2 (September 2012), 1-6. DOI=10.5120/8535-2073
@article{ 10.5120/8535-2073, author = { T. Sivakumar,R. Venkatesan }, title = { A Novel Framework for Image Encryption using Karhunen-Loeve Transform }, journal = { International Journal of Computer Applications }, year = { 2012 }, volume = { 54 }, number = { 2 }, pages = { 1-6 }, doi = { 10.5120/8535-2073 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2012 %A T. Sivakumar %A R. Venkatesan %T A Novel Framework for Image Encryption using Karhunen-Loeve Transform%T %J International Journal of Computer Applications %V 54 %N 2 %P 1-6 %R 10.5120/8535-2073 %I Foundation of Computer Science (FCS), NY, USA
The Karhunen-Loeve (KL) transform is widely used technique for image compression or clustering analysis. Since KL transform is a reversible linear transform, a novel cryptosystem is developed to provide confidentiality service for images. The original image (x), in the form of square matrix, is given as input to the KL transform which in turn produces the encrypted image (y) and the decryption key (k). Since the key matrix (k) plays a major role for decryption, it is encrypted by the receiver's public key by using RSA algorithm. The encrypted image (y) and key matrix (k) are transmitted over the public network. On receiving the encrypted image (y) and key matrix (k), the receiver takes the transpose of the decrypted key matrix (k) and multiplies the result with the encrypted image (y) to get the original image (x). The time complexity of the proposed scheme is calculated separately for both encryption, O(n2), and decryption, O(n3). The histograms of the encrypted images are almost uniform and different from that of the original images. This method of image cryptosystem is more suitable for small images.