36,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 6-10 Tagen
  • Broschiertes Buch

In this work we encrypts image through the digital matrix on four levels The first level:- Implementation of six operations distracting the chromatically values of the image matrix in which we use svd twice. The result is an encrypted form to be half black and the other is white. Second level:- The process of switching between the two halves of the horizontal slide black and white of the first level code through of mathematical relationship enters the installed encryption keys. The result is an encrypted form horizontal striped black and white. Third level:- Same as Second level, but on the…mehr

Produktbeschreibung
In this work we encrypts image through the digital matrix on four levels The first level:- Implementation of six operations distracting the chromatically values of the image matrix in which we use svd twice. The result is an encrypted form to be half black and the other is white. Second level:- The process of switching between the two halves of the horizontal slide black and white of the first level code through of mathematical relationship enters the installed encryption keys. The result is an encrypted form horizontal striped black and white. Third level:- Same as Second level, but on the vertical slices and the relationship of different mathematical included in the installed encryption keys. The result is an encrypted form vertical striped black and white. Fourth level:- combining the second and third levels. The result is a panel resembling a chess board. One of important features of this algorithm is the result image (encrypted image) which is meaningful image. This is a very difficult process and most of encrypted image in other algorithms is scrambled color's. Up to our knowledge there are few algorithms gives meaningful image.
Autorenporträt
Ms.c mathematicsPublished Research:1-IMAGE ENCRYPTION BASED ON SINGULAR VALUE DECOMPOSITION.2- IMAGE COMPRESSION BASED ON SVD AND MPQ-BTC.3- IMAGE CRYPTOGRAPHY VIA SVD MODULAR NUMBERS.4- Text Encryption Based on Singular Value Decomposition.5- Use the Singular Values Decomposition in the Text Encryption with Encryption Key Is Real Number.