CFP last date
20 December 2024
Reseach Article

A Cryptographic and Watermarking Encryption Technique for Securing and Authentication of Digital Images

by Quist-aphetsi Kester, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo M. Eghan, Nii Narku Quaynor
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 119 - Number 7
Year of Publication: 2015
Authors: Quist-aphetsi Kester, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo M. Eghan, Nii Narku Quaynor
10.5120/21078-3755

Quist-aphetsi Kester, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo M. Eghan, Nii Narku Quaynor . A Cryptographic and Watermarking Encryption Technique for Securing and Authentication of Digital Images. International Journal of Computer Applications. 119, 7 ( June 2015), 11-15. DOI=10.5120/21078-3755

@article{ 10.5120/21078-3755,
author = { Quist-aphetsi Kester, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo M. Eghan, Nii Narku Quaynor },
title = { A Cryptographic and Watermarking Encryption Technique for Securing and Authentication of Digital Images },
journal = { International Journal of Computer Applications },
issue_date = { June 2015 },
volume = { 119 },
number = { 7 },
month = { June },
year = { 2015 },
issn = { 0975-8887 },
pages = { 11-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume119/number7/21078-3755/ },
doi = { 10.5120/21078-3755 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:03:24.457019+05:30
%A Quist-aphetsi Kester
%A Laurent Nana
%A Anca Christine Pascu
%A Sophie Gire
%A Jojo M. Eghan
%A Nii Narku Quaynor
%T A Cryptographic and Watermarking Encryption Technique for Securing and Authentication of Digital Images
%J International Journal of Computer Applications
%@ 0975-8887
%V 119
%N 7
%P 11-15
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Identity management is crucial in cyberspace where infringement of one's privacy, copy right disputes, theft and other malicious activities are very rampant. There exists a need of ownership identification and authentication of digital images. In solving and contributing to this field, we proposed a cryptographic and watermarking encryption technique for securing and authentication of digital images for identity management. In our approach, we encrypt the data to be embedded into the image before embedding it to the image. We make sure we select a random position in the image based on an embedding key. We make sure the message to be embedded was converted into values that falls in between 0-255. This is to avoid it being detected using forensic or steganalytic software.

References
  1. Aslantas, Veysel, and Mevlut Dogru. "A new SVD based fragile image watermarking by using genetic algorithm. " Sixth International Conference on Graphic and Image Processing (ICGIP 2014). International Society for Optics and Photonics, 2015.
  2. Hu, W. C. , Chen, W. H. , Huang, D. Y. , & Yang, C. Y. (2015). Effective image forgery detection of tampered foreground or background image based on image watermarking and alpha mattes. Multimedia Tools and Applications, 1-22.
  3. Liu, S. , Hennelly, B. M. , Guo, C. , & Sheridan, J. T. (2015). Robustness of Double Random Phase Encoding spread-space spread-spectrum watermarking technique. Signal Processing, 109, 345-361.
  4. Ali, M. , Ahn, C. W. , Pant, M. , & Siarry, P. (2015). An image watermarking scheme in wavelet domain with optimized compensation of singular value decomposition via artificial bee colony. Information Sciences.
  5. Chowdhury, A. , Shahjamal, M. , & Biswas, K. (2015). A New DWT-SVD Based Image Watermarking Technique By Utilizing The Features Of Human Visual System. International Journal of Research in Computer Engineering & Electronics, 3(6).
  6. Kester, Quist-Aphetsi, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo Moses Eghan, and Nii Narku Quaynnor. "A hybrid encryption technique for securing biometric image data based on feistel network and RGB pixel displacement. " In Recent Trends in Computer Networks and Distributed Systems Security, pp. 530-539. Springer Berlin Heidelberg, 2014.
  7. Dongming, Chen, "A Feasible Chaotic Encryption Scheme for Image," Chaos-Fractals Theories and Applications, 2009. IWCFTA '09. International Workshop on , vol. , no. , pp. 172,176, 6-8 Nov. 2009 doi: 10. 1109/IWCFTA. 2009. 43
  8. Prema, G. ; Natarajan, S. , "An enhanced security algorithm for wireless application using RSA and genetic approach," Computing, Communications and Networking Technologies (ICCCNT),2013 Fourth International Conference on , vol. , no. , pp. 1,5, 4-6 July 2013 doi: 10. 1109/ICCCNT. 2013. 6726679
  9. Bansod, S. P. ; Mane, V. M. ; Ragha, L. R. , "Modified BPCS steganography using Hybrid cryptography for improving data embedding capacity," Communication, Information & Computing Technology (ICCICT), 2012 International Conference on , vol. , no. , pp. 1,6, 19-20 Oct. 2012 doi: 10. 1109/ICCICT. 2012. 6398199
  10. Quist-Aphetsi Kester,"Image Encryption based on the RGB PIXEL Transposition and Shuffling",IJCNIS, vol. 5, no. 7, pp. 43-50,2013. DOI: 10. 5815/ijcnis. 2013. 07. 05
  11. Qian, Z. , Zhang, X. , & Ren, Y. (2015). JPEG encryption for image rescaling in the encrypted domain. Journal of Visual Communication and Image Representation, 26, 9-13.
  12. Som, S. , Sen, S. , Mahapatra, S. , & Palit, S. (2015). A Selective Bitplane Based Encryption of Grayscale Images with Tamper Detection, Localization and Recovery Based on Watermark. In Information Systems Design and Intelligent Applications (pp. 793-802). Springer India.
  13. Jiang, D. , & Kim, J. (2015). A Spread Spectrum Zero Video Watermarking Scheme based on Dual Transform Domains and Log-Polar Transformation. International Journal of Multimedia & Ubiquitous Engineering, 10(4).
  14. Zhang, X. , Wang, J. , Wang, Z. , & Cheng, H. (2015). Lossless and Reversible Data Hiding in Encrypted Images with Public Key Cryptography.
  15. Irene, J. , Prabu, U. , Gomathi, V. , Tejaswini, M. K. , Kavipriya, M. , & Kumar, K. P. (2015, March). Random Grid and Deterministic Visual Cryptography with Enhanced color patterns. In Proceedings of the 2015 International Conference on Advanced Research in Computer Science Engineering & Technology (ICARCSET 2015) (p. 65). ACM.
Index Terms

Computer Science
Information Sciences

Keywords

Digital image encryption authentication watermarking