12
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Symmetric text encryption scheme based Karhunen Loeve transform

&
Pages 2773-2781 | Received 01 Aug 2021, Published online: 20 Dec 2022

References

  • William H. and Matt W., “Information Warfare: Corporate Attack and Defence in a Digital World”, Butterworth-Heinemann, Oxford; 1st edition, 2012.
  • Standard, NIST FIPS: “Data Encryption Standard (DES)”, Federal Information Processing Standards Publication, 46-3, 1999.
  • Rivest, R. L., Shamir, A. and Adleman, L., “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems”, Communications of the ACM 21 (2): 120–126, 1978. doi: 10.1145/359340.359342
  • NIST, “Secure Hash Standard”, Federal Information Processing Standards Publication, 180-1, 1995.
  • Shivani Sharma, Yash Gupta, “Study on Cryptography and Techniques”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2(1): 249-252, 2017.
  • R. Fujdiak, P. Masek, et al., “Efficiency evaluation of different types of cryptography curves on low-power devices”, 7th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 269-274, 2015.
  • Gurpreet Singh, Supriya, “A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security”, International Journal of Computer Applications, 67(19): 33-38, 2013. doi: 10.5120/11507-7224
  • KefaRabah, “Theory and Implementation of Data Encryption Standard: A Review”, Information Technology Journal, 4(4): 307-325, 2005. doi: 10.3923/itj.2005.307.325
  • Arpana Kumari and Vivek Kapoor., “Competing secure text encryption in intranet using elliptic curve cryptography”, Journal of Discrete Mathematical Sciences and Cryptography, 23(2): 631-641, 2020. doi: 10.1080/09720529.2020.1729509
  • Arpana Kumari and Vivek Kapoor., “Secure Text Encryption in Intranet Using Elliptic Curve Cryptography”, International Journal of Computer Sciences and Engineering, 7(6): 981-984, 2019. doi: 10.26438/ijcse/v7i6.981984
  • K. Karhunen, “Uber line are methoden in der Wahrscheinlichkeitsrechnung”, Annales Academiae scientiarum Fennicae. Series A. 1, Mathematica-physica, vol. 37, 1947.
  • M. Fleury, et al., “Karhunen-Loeve Transform: An Exercise in Simple Image-Processing Parallel Pipelines”, European Conference on Parallel Processing. Springer, Berlin, Heidelberg, 815-819, 1997.
  • P. Soto-Quiros, A. Torokhti, ., “Extended karhunen-loève transform”, 0th International Conference on Telecommunications and Signal Processing, 484-487, 2017.
  • Junxiao Li, et al., “Extraction of reflected events from sonic-log waveforms using the Karhunen-Loève transform”, GEOPHYSICS, 82(50): 1SO-Z39, 2017.
  • Jae WoongSoh, et al., “An Image Compression Algorithm Based on the KarhunenLòeve Transform”, Asia-Pacific Signal and Information Processing Association Annual Summit and Conference,1436-1439, 2017.
  • Hind R. S., et al., “Performance of Data Images Encryption Based Karhunen-Leoeve Transforms”, Research Journal of Applied Sciences, Engineering and Technology, 14(3): 95-100, 2017. doi: 10.19026/rjaset.14.4151
  • Satish S. Bhairannawar, et al., “FPGA Implementation of Optimized Karhunen–Loeve Transform for Image Processing Applications”, Journal of Real-Time Image Processing, 17, 357–370, 2018. doi: 10.1007/s11554-018-0776-x
  • Subhajit Roy, et al., “Video Steganography Using Karhunen-Loève Transform”, 2nd International Conference on Digital Signal Processing, 142–146, 2018.
  • Daniela Stănescu, et al., “Message Processing-based Steganographic Algorithm using Karhunen-Loève Transform”, 23rd International Conference on System Theory, Control and Computing (ICSTCC), 143-148, 2019.
  • Hasan Rashaideh, et al., “Real-time image encryption and decryption methods based on the Karhunen-Loeve transform”, International Journal of Intelligent Engineering Informatics, 7(5): 399-421, 2019. doi: 10.1504/IJIEI.2019.103623
  • Ramya J. and Somasundareswari D., “KarhunenLoeve Transform with adaptive dictionary learning for coherent and random noise attenuation in seismic data”, Sådhanå, 45: 275-288, 2020. doi: 10.1007/s12046-020-01505-z
  • S. Saravanan and Sujitha, “Hybrid medical image compression using the IKLtransform with an efficient encoder”, International Journal of Nonlinear Analysis and Applications, 12(2): 757-767, 2021.
  • Claudio Maccone, “A simple introduction to the KLT and BAM-KLT”, In: Mathematical SETI (pp. 411-448), Springer Praxis Books. Springer, Berlin, 2012.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.