SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 837
GSVD Algorithm for Image Encryption
Smt. Suvarna Kabadi1, Guide: Smt. Shruti Jalapur2
1PG Student at SIET College of Engineering and Technology Vijaypur, Karnataka, India
2Asst. Prof, CSE Dept of SIET College of Engineering and Technology Vijaypur, Karnataka, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Cryptography is the technique to achieve the
security my making the recognizable information into
unrecognizable form. In this paper we used an algorithm
called Generalized singular valued decomposition(GSVD)
which supports only for RGB images in which a plain image is
divided in two segments with a initial key, and key image or
the reference image which is in exchanged form is used for
encrypting and decrypting theoriginal image. Mathematically
speaking the read original image which is in matrix form, uses
a initial key to generate two matrices and the GSVD algorithm
with the key image matrix to get the matrix of cipher image.
More security is achieved using this algorithm.
Keywords: encryption, Decryption, SVD, GSVD.
1. INTRODUCTION
As we speak about Computer Networks,securityisa
must. To protect our important or confidential information
security should be establishedduringcommunication.There
are many algorithms have been implemented to secure our
data through communication and each algorithms will have
their own processing time, which meanstheprocessingtime
of one algorithm may differ from another algorithm, some
algorithms take more time and some algorithms takes less
time, The algorithms which takes very less times that
algorithm will be treated as the best algorithm. The
processing time may vary dependinguponthespecifications
of the machine as well as the versions of the software we
used to develop the application. It is also very expensive to
process large amount of the compressed data. One of the
best methods to protect the data from others is toencrypt so
that only the sender and receiver can access the information
i.e only authorized persons can access the information.Here
we call original image or the input image is called the plain
image and output image is called the encrypted image or
cipher image. Encryption and decryption which we
commonly called as encoding and decoding of information.
Using encryption algorithm the sender can send the
information/original image in encoded form and only the
authorized receiver can decode information. Here this
algorithm is applied encryption and decryption ofonlycolor
images, there are many algorithms which may be applied to
text, audio and videos to protect their data. High security is
the goal of this paper for colorful images which have been
sent between recipients to keep them more secure from
hackers.
1.1 Motivation
Today encryption is the technique is used to protect the
important information from unauthorized access. To
enhance the security of color images transmitted between
the recipients. It is very expensive to encrypt the whole
compressed bit stream. This algorithm works with the two
keys the real number and the second is the key image which
makes very difficult to break the cryptosystem by any
person.
1.2 Problem Statement
In image communication system,thecomputational
process of encryption and decryption with the compression
and decompression of images which makes very difficult to
handle large amount of information be processedanddue to
processing time this is very expensive.
1.3 Objective
Here the proposed algorithm is called Generalized
Singular Valued Decomposition(GSVD) whichsupportsonly
for RGB images in which a plain image is divided in two
segments or parts with a initial key, and key image or the
reference image which is in exchanged form, this key image
is used for encrypting and decrypting the original image.
Mathematically speaking the read original image which is in
matrix form, uses a initial key to generate two matrices and
the GSVD algorithm with the key image matrix to get the
matrix of cipher image. This algorithm which is more
secured compared to other image encryption algorithms as
the images that has been transferred between the recipients
are more secured.
2. PROPOSED METHODLOGY
The proposed algorithm is Generalised SVD algorithm
using MATLAB R2018b latest version
2.1 Encryption Method
Read the Color Image, Split it into R,G and B Channel,
Apply GSVD encryption algorithm on each channel of color
image using encryption key, Combine three encrypted
channel of the image i.e your encrypted image.
1. Start with image of any dimension rather than
fixed as the algorithm is applied for any image and
in any dimensions
2. Input an image of any size but here 200X200
3. Convert the image to Matrix I
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 838
4. Select an initial key K to generate the following
matrices
A1=K*I and A2=--K*I for all the RGB Channels
5. Choose an encrypting key image that can be
converted to MatrixB
6. Compute the GSVD for each Matrix A1 and A2
with encrypting key Matrix B as the following
[U1,V1,X1,C1,S1]=gsvd(I1,B) and
[U2,V2,X2,C2,S2]=gsvd(I2,B)
7. Compute the following for all channnels
A11=U1*C2*X1 and AA21=U2*C1*X
Construct the encrypted image F such that
F=[AA11+AA21]
8. Obtain the encrypted image F
9. End of Encryption Algorithm.
2.2 Decryption Method
Acquisition of encrypted image, Split it into R,G and B
channel, Apply GSVD decryption algorithm on each channel
of encrypted color image using decryption key(encryption
key and decryption key should be same), Combine all three
decrypted channel of color image i.e is your decrypted
image.
1. Start
2. Download the encrypted image F
3. Obtain the Matrix of the Encrypted Image F
4. Split F into F1 And F2
5. Obtain the decrypted key matrix B which is
similar to the encrypted key matrix
6. Compute the GSVD for each matrix F1 and F2 for
all channels with the decrypting key matrix B as
[U1,V1,X1,C1,S1]=GSVD(F1,B) and
[U2,V2,X2,C2,S2]=GSVD(F2,B)
7. Compute the plain matrix I as the following
A1=U1*C2*X1 for all channels
8. Out=Out/K to obtain the original image
9. End of Decryption Algorithm
3. EXPERIMENTAL RESULTS
Fig 1:Plain Img +Reference Img=Cipher Img
Fig 2: Before Encryption Histogram
Fig 3: After Decryption Histogram
Table-1: Feature Extraction before and after Encryption
and Decryption
CONCLUSION
This algorithm is used for encryption and decryption of
RGB images using MATLAB tool whichinvolvescompression
and decompression of images, the time taken for encrypting
and decrypting is less compared to other algorithms.
REFERENCES
[1] Selective Image Encryption using SVD and Arnold
Transform Kshiramani Naik, Arup Kumar Pal, and Rohit
Agarwal By The International Arab Journal of Information
Technology, Vol. 15, No. 4, July 2018
File Type JPG File
Size on Disk 3.68MB
Size after Encryption 235KB
Size after Decryption 65KB
Entropy B4 Encryption 7.7601
SD Before Encryption 0.6368
Elapsed Time for Encryption 2.818979
Elapsed Time for Decryption 0.915784
Entropy After Decryption 7.5151
SD for Decryption 0.6594
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 839
[2] Key Logistic to Image Cryptography via General Singular
Values Decomposition by Maheer Jalal Burjus Al-Bashkani ,
Prof. Dr. Adil Al Rammahi by JATIT on 15th July 2018
[3] A Singular value decomposition based approach for the
compression of encrypted images HIyam Hatem, Raed
Majeed Jumana Waleed by IJET 2018.
[4] Data Embedding into Image Encryption using the
Symmetric Key for RDH in Cloud Storage by IJAER G.
Preethi and N.P.Gopalan 2018
[5] Image Encryption Using Hybrid Chaotic Map Hikmat N.
Abdullah, Hamsa A. Abdullah by 2017 International
Conference on Current Research in Computer Science and
Information Technology(ICCIT),Slemani – Iraq,©2017IEEE
[6] An Algorithm Based on GSVD for Image Encryption
Mohammed Abdul Hameed Jassim AlKufi, Hayder Raheem
Hashim Ameer Mohammed Hussein and Hind Rustum
Mohammed, By MCA March 2017
[7] Image Encryption Based on Partitioning and Rearranged
Pixels Position by Lebanese French niversity Dr. Jamila H.
Al-A’meri, Salah T. Allawi, May M. Abbas April 2017
[8] Use the Singular Values Decomposition in the Text
Encryption with EncryptionKeyIsReal Number Mohammed
Abdul-Hameed Jassim Al-kufi University of Kufa, Najaf, Iraq
by IJIRCCE, February 2016
[9] Image Encryption & Decryption with Symmetric Key
Cryptography using MATLAB Jai Singh, Kanak Lata, and
Javed Ashraf by International Journal ofCurrentEngineering
and Technology Feb 2015
[10] Analysis and Implementation of Selective Image
Encryption Technique Using Matlab Upendra Bisht,
Shubhashish Goswami by IOSR Journal of Computer
Engineering (IOSR-JCE) in May-Jun. 2014.
[11] Image Encryption Based on Singular Value
Decomposition, Nidhal K. El Abbadi, Adil Mohamad and
Mohammed Abdul-Hameed by JCS July 2014

More Related Content

PDF
Implementation of image steganography using lab view
PDF
An Infallible Method to Transfer Confidential Data using Delta Steganography
PDF
IRJET- Mosaic Image Creation in Video for Secure Transmission
PDF
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
PDF
An LSB Method Of Image Steganographic Techniques
PDF
IRJET- Low Band Width High Secured Image Transmission in Robust Channels
PDF
Image Steganography Using HBC and RDH Technique
PDF
IJSRED-V2I2P12
Implementation of image steganography using lab view
An Infallible Method to Transfer Confidential Data using Delta Steganography
IRJET- Mosaic Image Creation in Video for Secure Transmission
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
An LSB Method Of Image Steganographic Techniques
IRJET- Low Band Width High Secured Image Transmission in Robust Channels
Image Steganography Using HBC and RDH Technique
IJSRED-V2I2P12

What's hot (18)

PDF
Reversible Encrypytion and Information Concealment
PDF
Encryption of Decomposed Image by using ASCII Code based Carrier Signal
PDF
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
PDF
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
PDF
A novel technique of visual cryptography for maintaining the security of visu...
PDF
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
PDF
Conditional entrench spatial domain steganography
PDF
IRJET - Steganography based on Discrete Wavelet Transform
PDF
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
PPTX
Reversible data hiding using histogram shifting method
PDF
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
PDF
High capacity histogram shifting based reversible data hiding with data compr...
PDF
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
PDF
IRJET- A Novel Technique of Image Steganography
PDF
Analysis of color image noising process
PDF
Security using image processing
PDF
Reversible Watermarking based on Histogram Shifting Modification:A Review
PDF
OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USIN...
Reversible Encrypytion and Information Concealment
Encryption of Decomposed Image by using ASCII Code based Carrier Signal
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
A novel technique of visual cryptography for maintaining the security of visu...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Conditional entrench spatial domain steganography
IRJET - Steganography based on Discrete Wavelet Transform
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Reversible data hiding using histogram shifting method
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
High capacity histogram shifting based reversible data hiding with data compr...
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET- A Novel Technique of Image Steganography
Analysis of color image noising process
Security using image processing
Reversible Watermarking based on Histogram Shifting Modification:A Review
OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USIN...
Ad

Similar to IRJET- GSVD Algorithm for Image Encryption (20)

PDF
Improved anti-noise attack ability of image encryption algorithm using de-noi...
PDF
Color image encryption decryption using smt
PDF
Color image encryption decryption using smt
PDF
Color image encryption decryption using smt
PDF
DETECTING THE SECURITY LEVEL OF VARIOUS CRYPTOSYSTEMS USING MACHINE LEARNING ...
PDF
New Technique for Image Encryption Based on Choas and Change of MSB
PDF
Survey on Different Image Encryption Techniques with Tabular Form
PDF
A Modified Binary Encryption Algorithm based on Diffuse Representation
PDF
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
PDF
Hf2513081311
PDF
Hf2513081311
PDF
Vol 14 No 1 - July 2014
PPTX
Biometric Hashing technique for Authentication
PDF
A novel efficient multiple encryption algorithm for real time images
PDF
An efficient and highly secure technique to encrypt
PDF
An efficient and highly secure technique to encrypt
PDF
An efficient and highly secure technique to encrypt
PDF
An efficient and highly secure technique to encrypt
PDF
3D chaos graph deep learning method to encrypt and decrypt digital image
PDF
Retrieving Of Color Images Using SDS Technique
Improved anti-noise attack ability of image encryption algorithm using de-noi...
Color image encryption decryption using smt
Color image encryption decryption using smt
Color image encryption decryption using smt
DETECTING THE SECURITY LEVEL OF VARIOUS CRYPTOSYSTEMS USING MACHINE LEARNING ...
New Technique for Image Encryption Based on Choas and Change of MSB
Survey on Different Image Encryption Techniques with Tabular Form
A Modified Binary Encryption Algorithm based on Diffuse Representation
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
Hf2513081311
Hf2513081311
Vol 14 No 1 - July 2014
Biometric Hashing technique for Authentication
A novel efficient multiple encryption algorithm for real time images
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
3D chaos graph deep learning method to encrypt and decrypt digital image
Retrieving Of Color Images Using SDS Technique
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
PDF
Analyzing Impact of Pakistan Economic Corridor on Import and Export in Pakist...
PPT
Occupational Health and Safety Management System
PPT
introduction to datamining and warehousing
PPTX
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPT
A5_DistSysCh1.ppt_INTRODUCTION TO DISTRIBUTED SYSTEMS
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PDF
Abrasive, erosive and cavitation wear.pdf
PDF
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PDF
Integrating Fractal Dimension and Time Series Analysis for Optimized Hyperspe...
PDF
Exploratory_Data_Analysis_Fundamentals.pdf
PPT
Total quality management ppt for engineering students
PPTX
communication and presentation skills 01
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
PDF
Categorization of Factors Affecting Classification Algorithms Selection
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PPTX
Nature of X-rays, X- Ray Equipment, Fluoroscopy
PDF
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
Analyzing Impact of Pakistan Economic Corridor on Import and Export in Pakist...
Occupational Health and Safety Management System
introduction to datamining and warehousing
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
Automation-in-Manufacturing-Chapter-Introduction.pdf
A5_DistSysCh1.ppt_INTRODUCTION TO DISTRIBUTED SYSTEMS
III.4.1.2_The_Space_Environment.p pdffdf
Abrasive, erosive and cavitation wear.pdf
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
Integrating Fractal Dimension and Time Series Analysis for Optimized Hyperspe...
Exploratory_Data_Analysis_Fundamentals.pdf
Total quality management ppt for engineering students
communication and presentation skills 01
R24 SURVEYING LAB MANUAL for civil enggi
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
Categorization of Factors Affecting Classification Algorithms Selection
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
Nature of X-rays, X- Ray Equipment, Fluoroscopy
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION

IRJET- GSVD Algorithm for Image Encryption

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 837 GSVD Algorithm for Image Encryption Smt. Suvarna Kabadi1, Guide: Smt. Shruti Jalapur2 1PG Student at SIET College of Engineering and Technology Vijaypur, Karnataka, India 2Asst. Prof, CSE Dept of SIET College of Engineering and Technology Vijaypur, Karnataka, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Cryptography is the technique to achieve the security my making the recognizable information into unrecognizable form. In this paper we used an algorithm called Generalized singular valued decomposition(GSVD) which supports only for RGB images in which a plain image is divided in two segments with a initial key, and key image or the reference image which is in exchanged form is used for encrypting and decrypting theoriginal image. Mathematically speaking the read original image which is in matrix form, uses a initial key to generate two matrices and the GSVD algorithm with the key image matrix to get the matrix of cipher image. More security is achieved using this algorithm. Keywords: encryption, Decryption, SVD, GSVD. 1. INTRODUCTION As we speak about Computer Networks,securityisa must. To protect our important or confidential information security should be establishedduringcommunication.There are many algorithms have been implemented to secure our data through communication and each algorithms will have their own processing time, which meanstheprocessingtime of one algorithm may differ from another algorithm, some algorithms take more time and some algorithms takes less time, The algorithms which takes very less times that algorithm will be treated as the best algorithm. The processing time may vary dependinguponthespecifications of the machine as well as the versions of the software we used to develop the application. It is also very expensive to process large amount of the compressed data. One of the best methods to protect the data from others is toencrypt so that only the sender and receiver can access the information i.e only authorized persons can access the information.Here we call original image or the input image is called the plain image and output image is called the encrypted image or cipher image. Encryption and decryption which we commonly called as encoding and decoding of information. Using encryption algorithm the sender can send the information/original image in encoded form and only the authorized receiver can decode information. Here this algorithm is applied encryption and decryption ofonlycolor images, there are many algorithms which may be applied to text, audio and videos to protect their data. High security is the goal of this paper for colorful images which have been sent between recipients to keep them more secure from hackers. 1.1 Motivation Today encryption is the technique is used to protect the important information from unauthorized access. To enhance the security of color images transmitted between the recipients. It is very expensive to encrypt the whole compressed bit stream. This algorithm works with the two keys the real number and the second is the key image which makes very difficult to break the cryptosystem by any person. 1.2 Problem Statement In image communication system,thecomputational process of encryption and decryption with the compression and decompression of images which makes very difficult to handle large amount of information be processedanddue to processing time this is very expensive. 1.3 Objective Here the proposed algorithm is called Generalized Singular Valued Decomposition(GSVD) whichsupportsonly for RGB images in which a plain image is divided in two segments or parts with a initial key, and key image or the reference image which is in exchanged form, this key image is used for encrypting and decrypting the original image. Mathematically speaking the read original image which is in matrix form, uses a initial key to generate two matrices and the GSVD algorithm with the key image matrix to get the matrix of cipher image. This algorithm which is more secured compared to other image encryption algorithms as the images that has been transferred between the recipients are more secured. 2. PROPOSED METHODLOGY The proposed algorithm is Generalised SVD algorithm using MATLAB R2018b latest version 2.1 Encryption Method Read the Color Image, Split it into R,G and B Channel, Apply GSVD encryption algorithm on each channel of color image using encryption key, Combine three encrypted channel of the image i.e your encrypted image. 1. Start with image of any dimension rather than fixed as the algorithm is applied for any image and in any dimensions 2. Input an image of any size but here 200X200 3. Convert the image to Matrix I
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 838 4. Select an initial key K to generate the following matrices A1=K*I and A2=--K*I for all the RGB Channels 5. Choose an encrypting key image that can be converted to MatrixB 6. Compute the GSVD for each Matrix A1 and A2 with encrypting key Matrix B as the following [U1,V1,X1,C1,S1]=gsvd(I1,B) and [U2,V2,X2,C2,S2]=gsvd(I2,B) 7. Compute the following for all channnels A11=U1*C2*X1 and AA21=U2*C1*X Construct the encrypted image F such that F=[AA11+AA21] 8. Obtain the encrypted image F 9. End of Encryption Algorithm. 2.2 Decryption Method Acquisition of encrypted image, Split it into R,G and B channel, Apply GSVD decryption algorithm on each channel of encrypted color image using decryption key(encryption key and decryption key should be same), Combine all three decrypted channel of color image i.e is your decrypted image. 1. Start 2. Download the encrypted image F 3. Obtain the Matrix of the Encrypted Image F 4. Split F into F1 And F2 5. Obtain the decrypted key matrix B which is similar to the encrypted key matrix 6. Compute the GSVD for each matrix F1 and F2 for all channels with the decrypting key matrix B as [U1,V1,X1,C1,S1]=GSVD(F1,B) and [U2,V2,X2,C2,S2]=GSVD(F2,B) 7. Compute the plain matrix I as the following A1=U1*C2*X1 for all channels 8. Out=Out/K to obtain the original image 9. End of Decryption Algorithm 3. EXPERIMENTAL RESULTS Fig 1:Plain Img +Reference Img=Cipher Img Fig 2: Before Encryption Histogram Fig 3: After Decryption Histogram Table-1: Feature Extraction before and after Encryption and Decryption CONCLUSION This algorithm is used for encryption and decryption of RGB images using MATLAB tool whichinvolvescompression and decompression of images, the time taken for encrypting and decrypting is less compared to other algorithms. REFERENCES [1] Selective Image Encryption using SVD and Arnold Transform Kshiramani Naik, Arup Kumar Pal, and Rohit Agarwal By The International Arab Journal of Information Technology, Vol. 15, No. 4, July 2018 File Type JPG File Size on Disk 3.68MB Size after Encryption 235KB Size after Decryption 65KB Entropy B4 Encryption 7.7601 SD Before Encryption 0.6368 Elapsed Time for Encryption 2.818979 Elapsed Time for Decryption 0.915784 Entropy After Decryption 7.5151 SD for Decryption 0.6594
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 839 [2] Key Logistic to Image Cryptography via General Singular Values Decomposition by Maheer Jalal Burjus Al-Bashkani , Prof. Dr. Adil Al Rammahi by JATIT on 15th July 2018 [3] A Singular value decomposition based approach for the compression of encrypted images HIyam Hatem, Raed Majeed Jumana Waleed by IJET 2018. [4] Data Embedding into Image Encryption using the Symmetric Key for RDH in Cloud Storage by IJAER G. Preethi and N.P.Gopalan 2018 [5] Image Encryption Using Hybrid Chaotic Map Hikmat N. Abdullah, Hamsa A. Abdullah by 2017 International Conference on Current Research in Computer Science and Information Technology(ICCIT),Slemani – Iraq,©2017IEEE [6] An Algorithm Based on GSVD for Image Encryption Mohammed Abdul Hameed Jassim AlKufi, Hayder Raheem Hashim Ameer Mohammed Hussein and Hind Rustum Mohammed, By MCA March 2017 [7] Image Encryption Based on Partitioning and Rearranged Pixels Position by Lebanese French niversity Dr. Jamila H. Al-A’meri, Salah T. Allawi, May M. Abbas April 2017 [8] Use the Singular Values Decomposition in the Text Encryption with EncryptionKeyIsReal Number Mohammed Abdul-Hameed Jassim Al-kufi University of Kufa, Najaf, Iraq by IJIRCCE, February 2016 [9] Image Encryption & Decryption with Symmetric Key Cryptography using MATLAB Jai Singh, Kanak Lata, and Javed Ashraf by International Journal ofCurrentEngineering and Technology Feb 2015 [10] Analysis and Implementation of Selective Image Encryption Technique Using Matlab Upendra Bisht, Shubhashish Goswami by IOSR Journal of Computer Engineering (IOSR-JCE) in May-Jun. 2014. [11] Image Encryption Based on Singular Value Decomposition, Nidhal K. El Abbadi, Adil Mohamad and Mohammed Abdul-Hameed by JCS July 2014