We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

A Novel Approach of Message Encryption based on Steganography and Watermarking

by Sonia Bansal, Sandeep Dalal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 98 - Number 18
Year of Publication: 2014
Authors: Sonia Bansal, Sandeep Dalal
10.5120/17284-7775

Sonia Bansal, Sandeep Dalal . A Novel Approach of Message Encryption based on Steganography and Watermarking. International Journal of Computer Applications. 98, 18 ( July 2014), 25-27. DOI=10.5120/17284-7775

@article{ 10.5120/17284-7775,
author = { Sonia Bansal, Sandeep Dalal },
title = { A Novel Approach of Message Encryption based on Steganography and Watermarking },
journal = { International Journal of Computer Applications },
issue_date = { July 2014 },
volume = { 98 },
number = { 18 },
month = { July },
year = { 2014 },
issn = { 0975-8887 },
pages = { 25-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume98/number18/17284-7775/ },
doi = { 10.5120/17284-7775 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:26:32.377396+05:30
%A Sonia Bansal
%A Sandeep Dalal
%T A Novel Approach of Message Encryption based on Steganography and Watermarking
%J International Journal of Computer Applications
%@ 0975-8887
%V 98
%N 18
%P 25-27
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Even after rapid development of encryption and decryption algorithms, the communication channels still face acute threat of illegal intelligence gathering. The science of steganography has also simultaneously emerged as a means of covert communication. One major reason is spread of digital images as means for passing classified information include the easy distribution, easy coping and simple means of modification. This is so vital that the aspect of image content modification and protection has become a major security issue. Recently, fragile watermarking has been used as a technique to achieve image authentication and tampering localization. The main purpose of this work is to present an algorithm for generation of stego file based on alternative watermarking. In this paper, we present an implementation of a fragile image modification scheme for classified communication. This scheme is based on chaos theory wherein a labile signal that is sensitive to modifications is embedded in the image so as to detect the image (and thus textual) tampering inconsistency. This approach can be implemented for content authentication.

References
  1. William Stallings, "Cryptography and Network Security, Principles and Practice" Edition 3rd. Prentice Hall 2003, ISBN 0-13-091429-0.
  2. Kevin Curran and Karen Bailey "An evaluation of Image based Steganography methods" International Journal of Digital Evidence Fall 2003, Vol-2, Issue-2.
  3. A. Cheddad, J. Condell, K. Curran, P. M. Kevitt, "Digital image Steganography: Survey and analysis of current methods" Science Direct Signal Processing 90 (2010) 727–752.
  4. R. J. Anderson and F. A. P. Petitcolas, "On the Limits of Steganography," J. Selected Areas in Comm. , vol. 16, no. 4, 1998, pp. 474–481.
  5. F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Information Hiding—A Survey," Proc. IEEE, vol. 87, no. 7, 1999, pp. 1062–1078.
  6. Kawaguchi E. , and Eason R. , "Principle and Applications of BPCS-Steganography," Proceedings of SPIE (3528), Multimedia satellite networks: issues and challenges, pp. 464-473, 1999.
  7. C. Rey, J. L. Dugelay, A survey of watermarking algorithms for image authentication, EURASIP Journal on Applied Signal Processing (JASP) 2002, pp. 613-621.
  8. E. Kougianos, S. P. Mohanty, R. N. Mahapatra, Hardware assisted watermarking for multimedia, Computers and Electrical Engineering, Vol. 35, No. 2, March 2009, pp. 339-358.
  9. S. Liu, H. Yao, W. Gao, Y. Liu, An image fragile watermark scheme based on chaotic image pattern and pixel-pairs, Applied Mathematics and Computation, 2007, pp. 869-882.
  10. Ming-Shi Wang, Wei-Che Chen, A majority-voting based water-marking scheme for colour image tamper detection and recovery, Computer Standards & Interfaces, Vol. 29, Issue 5, July 2007, pp. 561-570
  11. Tseng Y. , Chen Y. , and Pan H. , "A Secure Data Hiding Scheme for Binary Images," IEEE Transactions On Communications, vol. 50, no. 8, pp. 1227-1231, 2002.
Index Terms

Computer Science
Information Sciences

Keywords

Cipher text Cover image Decryption Encryption Encryption Algorithm Fragile watermarking LSB Plain text Stego image.