We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

SVD-DWT Amalgamated Cryptography Scheme Antagonistic to Noise Attacks

by Swati Dwivedi, Amit Saxena
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 179 - Number 38
Year of Publication: 2018
Authors: Swati Dwivedi, Amit Saxena
10.5120/ijca2018916855

Swati Dwivedi, Amit Saxena . SVD-DWT Amalgamated Cryptography Scheme Antagonistic to Noise Attacks. International Journal of Computer Applications. 179, 38 ( Apr 2018), 15-19. DOI=10.5120/ijca2018916855

@article{ 10.5120/ijca2018916855,
author = { Swati Dwivedi, Amit Saxena },
title = { SVD-DWT Amalgamated Cryptography Scheme Antagonistic to Noise Attacks },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2018 },
volume = { 179 },
number = { 38 },
month = { Apr },
year = { 2018 },
issn = { 0975-8887 },
pages = { 15-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume179/number38/29324-2018916855/ },
doi = { 10.5120/ijca2018916855 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:57:46.644529+05:30
%A Swati Dwivedi
%A Amit Saxena
%T SVD-DWT Amalgamated Cryptography Scheme Antagonistic to Noise Attacks
%J International Journal of Computer Applications
%@ 0975-8887
%V 179
%N 38
%P 15-19
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In order to improve the robustness and imperceptibleness of the algorithm, a new embedding and extracting method with DWT-SVD is proposed. The approximation matrix of the third level of image in DWT domain is modified with SVD to embed the singular value of watermark to the singular value of DWT coefficient. The proposed embedding and extracting method was employed to accelerate the hybrid DWT-SVD cryptography and to avoid the leak of watermark. This hybrid technique leads to optimize both the fundamentally conflicting requirements. The experimental results show both the good robustness under numerous attacks and the high fidelity. The time needed to perform the program is greatly decreased.

References
  1. N. Senthil Kumaran, and S. Abinaya, “Comparison Analysis of Digital Image Cryptography using DWT and LSB Technique”, International Conference on Communication and Signal Processing, April 6-8, 2016, India.
  2. Aase, S.O., Husoy, J.H. and Waldemar, P. (2014) A Critique of SVD-Based Image Coding Systems, IEEE International Symposium on Circuits and Systems VLSI, Orlando, FL, Vol. 4, Pp. 13-16.
  3. Ahmed, F. and Moskowitz, I.S. (2014) Composite Signature Based Cryptography for Fingerprint Authentication, ACM Multimedia and Security Workshop, New York, Pp.1-8.
  4. Akhaee, M.A., Sahraeian, S.M.E. and Jin, C. (2013) Blind Image Cryptography Using a Sample Projection Approach, IEEE Transactions on Information Forensics and Security, Vol. 6, Issue 3, Pp.883-893.
  5. Ali, J.M.H. and Hassanien, A.E. (2012) An Iris Recognition System to Enhance E-security Environment Based on Wavelet Theory, Advanced Modeling and Optimization, Vol. 5, No. 2, Pp. 93-104.
  6. Al-Otum, H.M. and Samara, N.A. (2009) A robust blind color image cryptography based on wavelet-tree bit host difference selection, Signal Processing, Vol. 90, Issue 8, Pp. 2498-2512.
  7. Ateniese, G., Blundo, C., De Santis, A. and Stinson, D.R. (1996) Visual cryptography for general access structures, Information Computation, Vol. 129, Pp. 86-106.
  8. Baaziz, N., Zheng, D. and Wang, D. (2011) Image quality assessment based on multiple cryptography approach, IEEE 13th International Workshop on Multimedia Signal Processing (MMSP), Hangzhou, Pp.1-5.
  9. Bao, F., Deng, R., Deing, X. and Yang, Y. (2008) Private Query on Encrypted Data in Multi-User Settings, Proceedings of 4th International Conference on Information Security Practice and Experience (ISPEC 2008), Pp. 71-85, 2008.
  10. Barni, M. and Bartolini, F. (2004) Cryptography systems engineering: Enabling digital assets security and other application, Signal processing and communications series, Marcel Dekker Inc., New York.
  11. Barni, M., Bartolini, F. and Piva, A. (2001) Improved Wavelet based Cryptography Through Pixel-Wise Masking, IEEE Transactions on Image Processing, Vol. 10, Pp. 783-791.
Index Terms

Computer Science
Information Sciences

Keywords

Discrete Wavelet Transform SVD PSNR MSE