CFP last date
20 May 2024
Reseach Article

A Hybrid Cryptographic and Digital Watermarking Technique for Securing Digital Images based on a Generated Symmetric Key

by Quist-aphetsi Kester, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo M. Eghan, Nii Narku Quaynor
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 94 - Number 19
Year of Publication: 2014
Authors: Quist-aphetsi Kester, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo M. Eghan, Nii Narku Quaynor
10.5120/16499-5722

Quist-aphetsi Kester, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo M. Eghan, Nii Narku Quaynor . A Hybrid Cryptographic and Digital Watermarking Technique for Securing Digital Images based on a Generated Symmetric Key. International Journal of Computer Applications. 94, 19 ( May 2014), 19-27. DOI=10.5120/16499-5722

@article{ 10.5120/16499-5722,
author = { Quist-aphetsi Kester, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo M. Eghan, Nii Narku Quaynor },
title = { A Hybrid Cryptographic and Digital Watermarking Technique for Securing Digital Images based on a Generated Symmetric Key },
journal = { International Journal of Computer Applications },
issue_date = { May 2014 },
volume = { 94 },
number = { 19 },
month = { May },
year = { 2014 },
issn = { 0975-8887 },
pages = { 19-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume94/number19/16499-5722/ },
doi = { 10.5120/16499-5722 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:18:04.609807+05:30
%A Quist-aphetsi Kester
%A Laurent Nana
%A Anca Christine Pascu
%A Sophie Gire
%A Jojo M. Eghan
%A Nii Narku Quaynor
%T A Hybrid Cryptographic and Digital Watermarking Technique for Securing Digital Images based on a Generated Symmetric Key
%J International Journal of Computer Applications
%@ 0975-8887
%V 94
%N 19
%P 19-27
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The high increase in the transmission of digital data over secured and unsecured communications channels poses a lot of security and privacy concerns to both the transmitter and the receiver. Many operations engaged today in urban and warfare, be they for construction, monitory of plants, high voltage lines, military, police, fire service, intelligence etc. engages the use of surveillance systems that transmit sensitive data to and fro the command centre to the remote areas and this data in transmission needs to be secured. In this paper, we proposed a hybrid cryptographic and digital watermarking technique for securing digital images based on a Generated Symmetric Key. The cryptographic encryption technique made use of both pixel displacement and pixel encryption in securing the images that are to be stored or transmitted across secured and unsecured communications. The digital watermarking technique was used to authenticate the image. The programming and implementation was done using MATLAB.

References
  1. Musheer Ahmad and Tanvir Ahmad. 2014. Securing multimedia colour imagery using multiple high dimensional chaos-based hybrid keys. Int. J. Commun. Netw. Distrib. Syst. 12, 1 (November 2014), 113-128. DOI=10. 1504/IJCNDS. 2014. 057991http://dx. doi. org/ 10. 15 04/I J CNDS. 2014. 057991
  2. Jonathan Bishop. 2014. Representations of 'trolls' in mass media communication: a review of media-texts and moral panics relating to 'internet trolling'. Int. J. Web Based Communities 10, 1 (December 2014), 7-24. DOI=10. 1504/IJWBC. 2014. 058384 http://dx. doi. org/ 10. 1504/IJWBC. 2014. 058384
  3. Sajal K. Das, Krishna Kant, and Nan Zhang. 2012. Handbook on Securing Cyber-Physical Critical Infrastructure (1st ed. ). Morgan Kaufmann Publishers Inc. , San Francisco, CA, USA.
  4. Kumar, M. ; Hensman, A. , "Robust digital video watermarking using reversible data hiding and visual cryptography," Signals and Systems Conference (ISSC 2013), 24th IET Irish , vol. , no. , pp. 1,6, 20-21 June 2013 doi: 10. 1049/ic. 2013. 0051
  5. Fouad, M. ; El Saddik, A. ; Jiying Zhao; Petriu, E. , "Combining cryptography and watermarking to secure revocable iris templates," Instrumentation and Measurement Technology Conference (I2MTC), 2011 IEEE , vol. , no. , pp. 1,4, 10-12 May 2011doi: 10. 1109/IMTC. 2011. 5944015
  6. Song Y. Yan. 2013. Computational Number Theory and Modern Cryptography (1st ed. ). Wiley Publishing.
  7. Toorani, M. ; Falahati, A. , "A secure variant of the Hill Cipher," Computers and Communications, 2009. ISCC 2009. IEEE Symposium on , vol. , no. , pp. 313,316, 5-8 July 2009doi: 10. 1109/ISCC. 2009. 5202241
  8. Minglei Zha; Bin Wang, "On the fast algebraic immunity of even-variable rotation symmetric Boolean functions," Advanced Communication Technology (ICACT), 2012 14th International Conference on , vol. , no. , pp. 221,224, 19-22 Feb. 2012
  9. Saeed, Q. ; Basir, T. ; Ul Haq, S. ; Zia, N. ; Paracha, M. A. , "Mathematical Hard Problems in Modern Public-Key Cryptosystem," Emerging Technologies, 2006. ICET '06. International Conference on , vol. , no. , pp. 456,460, 13-14 Nov. 2006 doi: 10. 1109/ICET. 2006 . 335986
  10. Anand, D. ; Khemchandani, V. ; Sharma, R. K. , "Identity-Based Cryptography Techniques and Applications (A Review)," Computational Intelligence and Communication Networks (CICN), 2013 5th International Conference on , vol. , no. , pp. 343,348, 27-29 Sept. 2013 doi: 10. 1109/CICN. 2013. 78
  11. Burton S. Kaliski, Jr. . 1996. IEEE P1363: A Standard for RSA, Diffie-Hellman, and Elliptic-Curve Cryptography (Abstract). In Proceedings of the International Workshop on Security Protocols, T. Mark A. Lomas (Ed. ). Springer-Verlag, London, UK, UK, 117-118.
  12. Lo'ai A. Tawalbeh and Saadeh Sweidan. 2010. Hardware Design and Implementation of ElGamal Public-Key Cryptography Algorithm. Inf. Sec. J. : A Global Perspective 19, 5 (January 2010), 243-252. DOI=10. 1080/19393555. 2010. 499799 http://dx. doi. org/10. 1080/19393555. 2010. 499799
  13. Emmanuel Bresson, Olivier Chevassut, and David Pointcheval. 2007. Provably secure authenticated group Diffie-Hellman key exchange. ACM Trans. Inf. Syst. Secur. 10, 3, Article 10 (July 2007). DOI=10. 1145/1266977. 1266979 http://doi. acm. org/10. 1145/1266977. 1266979
  14. Kester, Q. -A. ; Nana, L. ; Pascu, A. C. , "A novel cryptographic encryption technique of video images using quantum cryptography for satellite communications," Adaptive Science and Technology (ICAST), 2013 International Conference on , vol. , no. , pp. 1,6, 25-27 Nov. 2013 doi: 10. 1109/ICASTech. 2013. 6707496
  15. Chip Elliott, David Pearson, and Gregory Troxel. 2003. Quantum cryptography in practice. In Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications (SIGCOMM '03). ACM, New York, NY, USA, 227-238. DOI=10. 1145/863955. 863982 http://doi. acm. org/10. 1145/86395 5. 863982
  16. Wei-Fan Hsieh; Pei-Yu Lin, "Analyze the Digital Watermarking Security Demands for the Facebook Website," Genetic and Evolutionary Computing (ICGEC), 2012 Sixth International Conference on , vol. , no. , pp. 31,34, 25-28 Aug. 2012 doi: 10. 1109/ICGEC. 2012. 62
  17. Dorairangaswamy, M. A. ; Padhmavathi, B. , "An effective blind watermarking scheme for protecting rightful ownership of digital images," TENCON 2009 - 2009 IEEE Region 10 Conference , vol. , no. , pp. 1,6, 23-26 Jan. 2009doi: 10. 1109/TENCON. 2009. 5395812
  18. Bhargava, N. ; Sharma, M. M. ; Garhwal, A. S. ; Mathuria, M. , "Digital image authentication system based on digital watermarking," Radar, Communication and Computing (ICRCC), 2012 International Conference on , vol. , no. , pp. 185,189, 21-22 Dec. 2012 doi: 10. 1109/ICRCC. 2012. 6450573
  19. Shing-Chi Cheung, Dickson K. W. Chiu, and Cedric Ho. 2008. The use of digital watermarking for intelligence multimedia document distribution. J. Theor. Appl. Electron. Commer. Res. 3, 3 (December 2008), 103-118.
  20. Stelvio Cimato, James Ching-Nung Yang, and Chih-Cheng Wu. 2012. Visual cryptography based watermarking: definition and meaning. In Proceedings of the 11th international conference on Digital Forensics and Watermaking (IWDW'12), Yun Q. Shi, Hyoung-Joong Kim, and Fernando Pérez-González (Eds. ). Springer-Verlag, Berlin, Heidelberg, 435-448. DOI=10. 1007/978-3-642-40099-5_36 http://dx. doi. org/10. 1007/978-3-642-40099-5_36
  21. I-Kuan Kong and Chi-Man Pun. 2008. Digital Image Watermarking with Blind Detection for Copyright Verification. In Proceedings of the 2008 Congress on Image and Signal Processing, Vol. 1 - Volume 01 (CISP '08), Vol. 1. IEEE Computer Society, Washington, DC, USA, 504-508. DOI=10. 1109/CISP. 2008. 546 http://dx. doi. org/ 10. 1109/CISP. 2008. 546
  22. Huiping Guo. 2003. Digital Image Watermarking for Ownership Verification. Ph. D. Dissertation. University of Ottawa, Ottawa, Ont. , Canada, Canada. Advisor(s) Nicolas Georganas. AAINQ85364.
  23. Huaqing Liang, Hongdong Yin, and Xinxin Niu. 2009. A Robust Digital Watermarking Scheme and Its Application in Certificate Verification. In Proceedings of the 2009 International Conference on Measuring Technology and Mechatronics Automation - Volume 01 (ICMTMA '09), Vol. 1. IEEE Computer Society, Washington, DC, USA, 410-413. DOI=10. 1109/ICMTMA. 2009. 295 http://dx. doi. org/10. 1109/ICMTMA. 2009. 295
  24. Singh, T. R. ; Singh, K. M. ; Roy, S. , "Robust video watermarking scheme based on visual cryptography," Information and Communication Technologies (WICT), 2012 World Congress on , vol. , no. , pp. 872,877, Oct. 30 2012-Nov. 2 2012 doi: 10. 1109/WICT. 2012. 6409198
  25. Fallahpour, M. ; Shirmohammadi, S. ; Semsarzadeh, M. ; Zhao, J. , "Tampering Detection in Compressed Digital Video Using Watermarking," Instrumentation and Measurement, IEEE Transactions on , vol. 63, no. 5, pp. 1057,1072, May 2014doi: 10. 1109/TIM. 2014. 2299371
  26. Nyeem, H. ; Boles, W. ; Boyd, C. , "On the robustness and security of digital image watermarking," Informatics, Electronics & Vision (ICIEV), 2012 International Conference on , vol. , no. , pp. 1136,1141, 18-19 May 2012 doi: 10. 1109/ICIEV. 2012. 6317496
  27. Gilani, J. ; Mir, A. A. , "Using Digital Signature Standard Algorithm to Incorporate Non-invertibility in Private Digital Watermarking Techniques," Software Engineering, Artificial Intelligences, Networking and Parallel/Distributed Computing, 2009. SNPD '09. 10th ACIS International Conference on , vol. , no. , pp. 399,404, 27-29 May 2009 doi: 10. 1109/SNPD. 2009. 89
  28. Kamel, I. ; Al Koky, O. ; Al Dakkak, A. , "Distortion-Free Watermarking Scheme for Wireless Sensor Networks," Intelligent Networking and Collaborative Systems, 2009. INCOS '09. International Conference on , vol. , no. , pp. 135,140, 4-6 Nov. 2009 doi: 10. 1109/INCOS. 2009. 67
  29. Nassiri, B. ; Latif, R. ; Toumanari, A. ; Maoulainine, F. M. R. , "Secure transmission of medical images by watermarking technique," Complex Systems (ICCS), 2012 International Conference on , vol. , no. , pp. 1,5, 5-6 Nov. 2012 doi: 10. 1109/ICoCS. 2012. 6458577
  30. Daojing Li; Bo Zhang, "DWTC: A Dual Watermarking Scheme Based on Threshold Cryptography for Web Document," Computer Application and System Modeling (ICCASM), 2010 International Conference on , vol. 8, no. , pp. V8-510,V8-514, 22-24 Oct. 2010 doi: 10. 1109/ICCASM. 2010. 5620633
  31. Quist-Aphetsi Kester, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo Moses Eghan, Nii Narku Quaynor. A Hybrid Cryptographic and Digital Watermarking Technique for Securing Digital Images. International Conference on Systems Informatics, Modelling and Simulation. pp. 1-6. IEEE. SIMS2014.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography simulation watermarking digital image RGB pixel shuffling