CFP last date
02 December 2024
Call for Paper
January Edition
CAE solicits high quality original research papers for the upcoming January edition of the journal. The last date of research paper submission is 02 December 2024

Submit your paper
Know more
Reseach Article

Image Encryption by PCA

by Mohammad Mofarreh-Bonab, Mostafa Mofarreh-Bonab
Communications on Applied Electronics
Foundation of Computer Science (FCS), NY, USA
Volume 3 - Number 3
Year of Publication: 2015
Authors: Mohammad Mofarreh-Bonab, Mostafa Mofarreh-Bonab
10.5120/cae2015651893

Mohammad Mofarreh-Bonab, Mostafa Mofarreh-Bonab . Image Encryption by PCA. Communications on Applied Electronics. 3, 3 ( October 2015), 28-30. DOI=10.5120/cae2015651893

@article{ 10.5120/cae2015651893,
author = { Mohammad Mofarreh-Bonab, Mostafa Mofarreh-Bonab },
title = { Image Encryption by PCA },
journal = { Communications on Applied Electronics },
issue_date = { October 2015 },
volume = { 3 },
number = { 3 },
month = { October },
year = { 2015 },
issn = { 2394-4714 },
pages = { 28-30 },
numpages = {9},
url = { https://www.caeaccess.org/archives/volume3/number3/449-2015651893/ },
doi = { 10.5120/cae2015651893 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-09-04T19:43:57.593027+05:30
%A Mohammad Mofarreh-Bonab
%A Mostafa Mofarreh-Bonab
%T Image Encryption by PCA
%J Communications on Applied Electronics
%@ 2394-4714
%V 3
%N 3
%P 28-30
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Besides ever increasing digital world, the importance of information security aspects becomes increasingly clear day by day. Several solutions are introduced to provide the required security for various applications and encryption is one of these solutions [2]. In image encryption, conventional algorithms encounter some kinds of complexity due to high amount of data that should be processed. In this paper, a new method is introduced for image encryption using PCA method. This algorithm is more advantageous especially in applications that integrity of database is more important, such as a prison and the prisoner’s photo database. In such cases, the security system should provide two major requirements:1) avoid changing an image in the database and 2) hiding real images from unauthorized access. The simulation results show that the mentioned method is capable to manage these two requirements properly.

References
  1. Mostafa Mofarreh‐Bonab, Mohamad Mofarreh‐Bonab, “Face Database Compression by Hotelling Transform using a New Method” 2nd World Conference on Information Technology (WCIT‐2011), Bahcesehir University & Near East University, Antalya, Turkey, November 23‐26, 2011
  2. AditeeGautam, MeenakshiPanvar, P. R. Gupta, “A New Image Encryption Approach Using Block Based Transformation Algorithm”International Journal of Advanced Engineering Sciences and Technologies (IJAEST),Vol No. 8, Issue No. 1, 090 - 096.
  3. SeshaPallaviIndrakanti, P. S. Avadhani, “Permutation based Image Encryption Technique” International Journal of Computer Applications IJCA, vol. 28, No. 8, 2011.
  4. Linhua Zhang, Xiaofeng Liao,Xuebing Wang, “An Image Encryption Approach Based on Chaotic Maps”Chaos, Solitons and Fractals 24 (2005) pp: 759–765
  5. S. S. Maniccam, N. G. Bourbakis, “A Lossless Image Compression and Encryption using SCAN”, Pattern Recognition 34 (2001), 1229-1245
  6. Chen, Guanrong, Yaobin Mao, and Charles K. Chui. "A symmetric image encryption scheme based on 3D chaotic cat maps." Chaos, Solitons & Fractals 21.3 (2004) pp. 749-761.
Index Terms

Computer Science
Information Sciences

Keywords

Encryption security database image storage PCA Eigen face