CFP last date
20 May 2024
Reseach Article

A New Approach for Information Security using Asymmetric Encryption and Watermarking Technique

by Manish Gupta, Darpan Anand, Girish Parmar, Rajeev Gupta
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 57 - Number 14
Year of Publication: 2012
Authors: Manish Gupta, Darpan Anand, Girish Parmar, Rajeev Gupta
10.5120/9179-3596

Manish Gupta, Darpan Anand, Girish Parmar, Rajeev Gupta . A New Approach for Information Security using Asymmetric Encryption and Watermarking Technique. International Journal of Computer Applications. 57, 14 ( November 2012), 1-5. DOI=10.5120/9179-3596

@article{ 10.5120/9179-3596,
author = { Manish Gupta, Darpan Anand, Girish Parmar, Rajeev Gupta },
title = { A New Approach for Information Security using Asymmetric Encryption and Watermarking Technique },
journal = { International Journal of Computer Applications },
issue_date = { November 2012 },
volume = { 57 },
number = { 14 },
month = { November },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume57/number14/9179-3596/ },
doi = { 10.5120/9179-3596 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:00:23.937202+05:30
%A Manish Gupta
%A Darpan Anand
%A Girish Parmar
%A Rajeev Gupta
%T A New Approach for Information Security using Asymmetric Encryption and Watermarking Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 57
%N 14
%P 1-5
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Rapid growth of internet and networked information systems has contributed a lot in the increase of multimedia contents. As digital contents are increasing day by day on internet it has raised requirement for the effective protection of multimedia assets (images, audios, videos). This paper proposes a new approach to protect the multimedia contents using image watermarking, asymmetric encryption and dictionary based compression. Approach presented in this paper hides target image in the host image using image watermarking and then apply RSA algorithm for protecting watermarked image from tempering and subsequently applies dictionary based compression approach to reduce size of encrypted watermarked image.

References
  1. Bender, W. , Gruhl, D. , Morimoto, N. , and Lu, A. ,"Techniques for data hiding," IBM Systems Journal, vol. 35, pp. 313-336 (1996).
  2. Kim, H. J. and Choi, Y. H. and Seok, JW and Hong, JW, Audio watermarking techniques, Intelligent Watermarking Techniques, 185—218 (2004)
  3. Borko Furht and Darko Kirovski Auerbach, Multimedia Watermarking Techniques and Applications Pages 425–439 Print ISBN: 978-0-8493-7213-1 eBook ISBN: 978-1-4200-1346-7 DOI: 10. 1201/9781420013467. ch14 (2006).
  4. Wu et al. Robust and efficient digital audio watermarking using audio content analysis. Proceedings of IS & T/SPIE 12th International Symposium on Electronic Imaging, (2000).
  5. Fridrich J, Goljan M & Du R Distortion-free data embedding. Lecture Notes in Computer Science 2173: p 27–41 (2001).
  6. Lee Y & Chen L High capacity image steganographic model. IEE Proceedings Vision Image Signal Processing 147(3): p 288–294 (2000).
  7. Fridrich J, Goljan M & Du R Lossless data embedding - new paradigm in digital watermarking. Applied Signal Processing 2002(2): p 185–196 (2002).
  8. Yeh C & Kuo C Digital watermarking through quasi m-arrays. In: Proc. IEEE Workshop on Signal Processing Systems, Taipei, Taiwan, p 456–461 (1999).
  9. Cedric T, Adi R & Mcloughlin I Data concealment in audio using a nonlinear frequency distribution of prbs coded data and frequency-domain lsb insertion. In: Proc. IEEE Region 10 International Conference on Electrical and Electronic Technology, Kuala Lumpur, Malaysia, p 275–278 (2000).
  10. Younes, M. A. M. B. , An Approach To Enhance Image Encryption Using Block-Based Transformation Algorithm, University Sains Malaysia (2009).
  11. Jiun-In Guo, Jui-Cheng Yen, "A new mirror-like image Encryption algorithm and its VLSI architecture", Pattern Recognition and Image Analysis, vol. IO, no. 2, pp. 236-247, (2000).
  12. Aloha Sinha, Kehar Singh, "A technique for image encryption using digital signature", Optics Communications, Vol-2 I 8 229-234, (2003).
  13. S. S. Maniccam, N. G. Bourbakis, "Lossless image compression and encryption using SCAN", Pattern Recognition 34,1229- 1245 (2001).
  14. J. Daemen and V. Rijmen, AES Proposal: Rijndael , AES Algorithm Submission, (1999)
  15. R. L. Rivest, M. J. B. Robshaw, R. Sidney, and Y. L. Yin, The RC6TM Block Cipher , M. I. T laboratory for Computer Science, 545 Technology Square, Cambridge, MA 02139, USA, (1998).
  16. R. F. Sewell, Bulk Encryption Algorithm for Use with RSA , Electronics Letters ,Vol. 29, No. 25, pp. 2183-2185, (1993).
  17. Popat, K. and Picard, R. W. and Massachusetts Institute of Technology. Media Laboratory. Vision and Modeling Group, Novel cluster-based probability model for texture synthesis, classification, and compression, Citeseer, (1993).
  18. Taneja, N. and Bhatnagar, G. and Raman, B. and Gupta, I. , Joint watermarking and encryption for still visual data, Multimedia Tools and Applications, Springer, ,1—14 (2012).
Index Terms

Computer Science
Information Sciences

Keywords

Image Watermarking Cryptography Encryption Decryption Image encryption RSA Dictionary Compression