CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Combining Chaotic Encryption and Frequency Watermarking for Prior and Ahead Image Securing

by Hassen Seddik, Ben Braiek Ezzeddine
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 48 - Number 2
Year of Publication: 2012
Authors: Hassen Seddik, Ben Braiek Ezzeddine
10.5120/7322-0134

Hassen Seddik, Ben Braiek Ezzeddine . Combining Chaotic Encryption and Frequency Watermarking for Prior and Ahead Image Securing. International Journal of Computer Applications. 48, 2 ( June 2012), 30-36. DOI=10.5120/7322-0134

@article{ 10.5120/7322-0134,
author = { Hassen Seddik, Ben Braiek Ezzeddine },
title = { Combining Chaotic Encryption and Frequency Watermarking for Prior and Ahead Image Securing },
journal = { International Journal of Computer Applications },
issue_date = { June 2012 },
volume = { 48 },
number = { 2 },
month = { June },
year = { 2012 },
issn = { 0975-8887 },
pages = { 30-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume48/number2/7322-0134/ },
doi = { 10.5120/7322-0134 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:43:05.160795+05:30
%A Hassen Seddik
%A Ben Braiek Ezzeddine
%T Combining Chaotic Encryption and Frequency Watermarking for Prior and Ahead Image Securing
%J International Journal of Computer Applications
%@ 0975-8887
%V 48
%N 2
%P 30-36
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Applying cryptographic techniques in the field of 2D signal processing is an attractive approach in recent years. Different methods are proposed to ensure prior data protection. Symmetric block encryption schemes, designed on two-dimensional chaotic maps, are efficient and secure for real-time image encryption. In the case of numeric data, the encrypted information can be easily intercepted in order to be revealed. This creates a need to offer a posterior protection. In this paper a method combining chaotic encryption system with frequency watermarking is presented. The proposed technique is divided in two steps. In the first step, it consists in applying a modified Tao algorithm based chaotic map with higher complexity and applicable for all images sizes. The encrypted data is then hidden by coding it in the frequencies DCT coefficients of a transformed second image. The proposed approach presents more security and reliability for any kind of image data.

References
  1. Schlesinger, R. , "A Cryptograhy Cource for Non-Mathematicians", 1st annual conference on information security curriculum development, K ennesaw , Georgia, October 08-08,2004.
  2. Tao, . X, Liao, . X, Guoping, T. , Yong, C. , Kwok-wo W. , " A novel block cryptosystem based on iterating a chaotic map"; Elsevier, physics letter 15 February 2005, pp. 109-115.
  3. Maurer, . U, "The Role of cryptography in Database Security" , proceeding of the 2004ACM SIGMOD international conference on Management of data (SIGMOD'04), PP5-10, ISBN: 1-58113-859-8, Paris, France June 13- 18-2004.
  4. Bodo, . Y, « Elaboration d'une Technique D'accès Conditionnel par Tatouage et Embrouillage Vidéo basée sur la Perturbation des Vecteurs de Mouvement », Thèse de doctorat de L'école National supérieur des télécommunications, 2000.
  5. Anan, . T, Kuraki. K, Takahashi. J, "Paper Encryption Technology", Fujitsu Sci, Tech j, Vol 46, No. 1, pp. 87-94, Yan. 2010
  6. Y. Mao G. Chen, S. Lian, "A Novel Fast Image Encryption Scheme Based On 3D Chaoyic Baker Maps", International Journal of Bifurcation and Chaos, Vol. 14, No. 10 (2004) 3613-3624.
  7. Ali Bani Younes, and Jantan, . A, "Image Encryption Using Block-Based Transformation Algorithm", IAENG International Journal of Computer Science, 35:1, IJCS_35_1_03.
  8. Seddik, . H, Sayadi, . M et Fnaiech, . F "A new Multi-Domains Image Watermarking Method Based on Multi-Watermarks Embedding and Neural Network Segmentation" Applied Mathematical Sciences, Vol. 1, no. 39, pp. 1927 - 1939, 2007.
  9. H. Seddik, M. Sayadi, F. Fnaiech et M. Cheriet, "Image Watermarking Based on the Hessenberg Transform" the International Journal of Image and Graphics, Volume: 9, Issue: 3 (July 2009).
  10. H. Seddik and E. B. Braiek "Shaping optimal parameters selection for most favourable robustness and imperceptibility in watermarking in the DWT domain", ICGST, CSE-11 conference, 19--21 December 2011, Istanbul, Turkey.
  11. H. Seddik, M. Sayadi et F. Fnaiech "An Accurate Estimation of Gaussian Error Function Based Scur Watermarking Algoritm", JTEA Journée tunisienne d'électricité et d'automatique, image processing track, 26-28 Mars 2010, Hammamet, Tunisie.
  12. Xu, . X Dexter, S. and Eskicioglu, . A. M. , "A hybrid scheme for encryption and watermarkin", IEEE Journal on Selected Areas in Communications 18 (2000) 850–. 860.
Index Terms

Computer Science
Information Sciences

Keywords

Encryption Watermarking Security Image