Novel Crypting Methods Based on Singular Values Decomposition

Journal Title: Journal of Applied Computer Science & Mathematics - Year 2016, Vol 10, Issue 22


With the rapid development of multimedia exchanges, it is necessary to dispose secure systems to protect data and ensure the security of transfer. Two encryption schemes are proposed in this letter where the second is obtained by a simple modification on the first. The construction of the proposed schemes is based on the Singular Values Decomposition (SVD) which allows us to compress data by eliminating a number of singular values. So by these schemes instead to send an encrypted image, we send a set of three or six encrypting images. Both of schemes are applied on (PNG) images in different levels and their efficiency is tested by calculating MSE, NPSR and MAE. Numerical results and the reconstructed images are discussed.

Authors and Affiliations



Related Articles

Identification of Core Architecture Classes for Object-Oriented Software Systems

The new member of the software development team needs to understand the software prior making modifications to the unknown system. The core classes that constitute the system architecture can reveal important structural...

Novel Kernel to Diagnose Dermatological Disorders

Development of computer aided system to diagnose dermatological disorders works as a second opinion when skin diseases have very little differences in clinical features. Support Vector Machine (SVM) is a good classifier...

A Method of Forming the Optimal Set of Disjoint Path in Computer Networks

This work provides a short analysis of algorithms of multipath routing. The modified algorithm of formation of the maximum set of not crossed paths taking into account their metrics is offered. Optimization of paths is c...

Kalman Filters for Estimating the potential GDP

The estimation of the potential GDP has a twofold importance: on one hand its accurate estimation allows the correct dimensioning of the macroeconomic policies and on the other hand, the study of potential GDP is a resea...

Real World Applications of MGR, Neeva and KN-Hash

Hash functions have prominent role in cryptography because of their ubiquitous applications in real world. Earlier, it was used for authentication only but with continuous research and development, it has been started us...

Download PDF file
  • EP ID EP446525
  • DOI 10.4316/JACSM.201602002
  • Views 114
  • Downloads 0

How To Cite

HOUAS Amrane, SOUALHI Sara, MOKHTARI Zouhir (2016). Novel Crypting Methods Based on Singular Values Decomposition. Journal of Applied Computer Science & Mathematics, 10(22), 15-20.