Call for Paper
CAE solicits original research papers for the May 2023 Edition. Last date of manuscript submission is April 30, 2023.
Image Encryption by PCA
Mohammad Mofarreh-Bonab and Mostafa Mofarreh-Bonab. Article: Image Encryption by PCA. Communications on Applied Electronics 3(3):28-30, October 2015. Published by Foundation of Computer Science (FCS), NY, USA. BibTeX
@article{key:article, author = {Mohammad Mofarreh-Bonab and Mostafa Mofarreh-Bonab}, title = {Article: Image Encryption by PCA}, journal = {Communications on Applied Electronics}, year = {2015}, volume = {3}, number = {3}, pages = {28-30}, month = {October}, note = {Published by Foundation of Computer Science (FCS), NY, USA} }
Abstract
Besides ever increasing digital world, the importance of information security aspects becomes increasingly clear day by day. Several solutions are introduced to provide the required security for various applications and encryption is one of these solutions [2]. In image encryption, conventional algorithms encounter some kinds of complexity due to high amount of data that should be processed. In this paper, a new method is introduced for image encryption using PCA method. This algorithm is more advantageous especially in applications that integrity of database is more important, such as a prison and the prisoner’s photo database. In such cases, the security system should provide two major requirements:1) avoid changing an image in the database and 2) hiding real images from unauthorized access. The simulation results show that the mentioned method is capable to manage these two requirements properly.
References
- Mostafa Mofarreh‐Bonab, Mohamad Mofarreh‐Bonab, “Face Database Compression by Hotelling Transform using a New Method” 2nd World Conference on Information Technology (WCIT‐2011), Bahcesehir University & Near East University, Antalya, Turkey, November 23‐26, 2011
- AditeeGautam, MeenakshiPanvar, P. R. Gupta, “A New Image Encryption Approach Using Block Based Transformation Algorithm”International Journal of Advanced Engineering Sciences and Technologies (IJAEST),Vol No. 8, Issue No. 1, 090 - 096.
- SeshaPallaviIndrakanti, P. S. Avadhani, “Permutation based Image Encryption Technique” International Journal of Computer Applications IJCA, vol. 28, No. 8, 2011.
- Linhua Zhang, Xiaofeng Liao,Xuebing Wang, “An Image Encryption Approach Based on Chaotic Maps”Chaos, Solitons and Fractals 24 (2005) pp: 759–765
- S. S. Maniccam, N. G. Bourbakis, “A Lossless Image Compression and Encryption using SCAN”, Pattern Recognition 34 (2001), 1229-1245
- Chen, Guanrong, Yaobin Mao, and Charles K. Chui. "A symmetric image encryption scheme based on 3D chaotic cat maps." Chaos, Solitons & Fractals 21.3 (2004) pp. 749-761.
Keywords
Encryption, security, database, image, storage, PCA, Eigen face