Independent component analysis, a new concept?
Signal Processing - Special issue on higher order statistics
Independent component analysis: algorithms and applications
Neural Networks
Cryptography and data security
Cryptography and data security
A new encryption algorithm for image cryptosystems
Journal of Systems and Software
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Adaptive Blind Signal and Image Processing: Learning Algorithms and Applications
Adaptive Blind Signal and Image Processing: Learning Algorithms and Applications
Hidden Image Separation from Incomplete Image Mixtures by Independent Component Analysis
ICPR '96 Proceedings of the 13th International Conference on Pattern Recognition - Volume 2
General approach to blind source separation
IEEE Transactions on Signal Processing
Partial encryption of compressed images and videos
IEEE Transactions on Signal Processing
Image encryption for secure Internet multimedia applications
IEEE Transactions on Consumer Electronics
Fast and robust fixed-point algorithms for independent component analysis
IEEE Transactions on Neural Networks
A robust hybrid method for image encryption based on Hopfield neural network
Computers and Electrical Engineering
Image security and biometrics: a review
HAIS'12 Proceedings of the 7th international conference on Hybrid Artificial Intelligent Systems - Volume Part II
Hi-index | 0.01 |
Blind source separation (BSS) has been successfully applied to many fields such as communications and biomedical engineering. Its application for image encryption, however, remains largely unexplored. In this contribution, a novel BSS-based scheme is proposed for encrypting multiple images, in which the underdetermined BSS problem is fully exploited to achieve the image security. The necessary conditions for generating the key images required for this underdetermined system are presented. The sufficient conditions for constructing the underdetermined mixing matrix for encryption are then described. Extensive computer simulations, coupled with the performance analyses, demonstrate the high level of security of the proposed method.