A Fast Decryption Algorithm for BSS-Based Image Encryption

  • Qiu-Hua Lin
  • Fu-Liang Yin
  • Hua-Lou Liang
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3973)


The image encryption based on blind source separation (BSS) takes advantage of the underdetermined BSS problem to encrypt multiple confidential images. Its security can be further improved if the number of images to be simultaneously encrypted increases. However, the BSS decryption speed will correspondingly decrease since the computational load of the BSS algorithms usually has nonlinear relation with the number of the source signals. To solve the problem, this paper presents a fast decryption algorithm based on adaptive noise cancellation by using the knowledge of the key images, which are used in the BSS-based method and available at the receiving side. As a result, the number of the source signals for the fast BSS decryption is decreased in half, and the decryption time is considerably reduced. Both computer simulations and performance analyses demonstrate the efficiency of the proposed method.


Original Image Independent Component Analysis Image Encryption Blind Source Separation Encrypt Image 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Chang, C.C., Hwang, M.S., Chen, T.S.: A New Encryption Algorithm for Image Crypto-systems. The Journal of Systems and Software 58, 83–91 (2001)CrossRefGoogle Scholar
  2. 2.
    Cheng, H., Li, X.B.: Partial Encryption of Compressed Images and Videos. IEEE Trans. Signal Processing 48, 2439–2451 (2000)CrossRefGoogle Scholar
  3. 3.
    Hyvärinen, A., Karhunen, J., Oja, E.: Independent Component Analysis. John Wiley, Chichester (2001)CrossRefGoogle Scholar
  4. 4.
    Cichocki, A., Amari, S.: Adaptive Blind Signal and Image Processing: Learning Algo-rithms and Applications. John Wiley, Chichester (2003)Google Scholar
  5. 5.
    Kasprzak, W., Cichocki, A.: Hidden Image Separation from Incomplete Image Mixtures by Independent Component Analysis. In: Proc. 13th Int. Conf. Pattern Recognition, II, pp. 394–398 (1996)Google Scholar
  6. 6.
    Lin, Q.H., Yin, F.L.: Blind Source Separation Applied to Image Cryptosystems with Dual Encryption. Electronics Letters 38, 1092–1094 (2002)CrossRefGoogle Scholar
  7. 7.
    Lin, Q.H., Yin, F.L., Liang, H.L.: Blind Source Separation-Based Encryption of Images and Speeches. In: Wang, J., Liao, X.-F., Yi, Z. (eds.) ISNN 2005. LNCS, vol. 3497, pp. 544–549. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  8. 8.
    Menezes, A., Van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press Inc., Boca Raton (1996)CrossRefGoogle Scholar
  9. 9.
    Cao, X.R., Liu, R.W.: General Approach to Blind Source Separation. IEEE Trans. Signal Processing 44, 562–571 (1996)CrossRefGoogle Scholar
  10. 10.
    Haykin, S.: Adaptive Filter Theory. Prentice-Hall, Englewood Cliffs (1996)Google Scholar
  11. 11.
    Comon, P.: Independent Component Analysis, A New Concept? Signal Processing 36, 287–314 (1994)MATHCrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Qiu-Hua Lin
    • 1
  • Fu-Liang Yin
    • 1
  • Hua-Lou Liang
    • 2
  1. 1.School of Electronic and Information EngineeringDalian University of TechnologyDalianChina
  2. 2.School of Health Information SciencesThe University of Texas at HoustonHoustonUSA

Personalised recommendations