This paper presents a method combining encryption and watermarking for secure images transfer. The proposed solution gives access to the outcomes of the image integrity and of its origins as its attachment to one user even if the image is stored encrypted. This method is based on the combination of encryption algorithms public-private keys and secret keys, and watermarking. The algorithm for image encryption uses a secret key. We encrypt the secret key with an asymmetric algorithm. This encrypted secret key is then inserted into the encrypted image using watermark algorithm.
This is a project dealing with securing images over a network.
Image is a delicate piece of information shared between clients across the world.Cryptography plays a huge role during secure connections.Applying simple Gaussian elimination to achieve highly secured image encryption decryption technique is a interesting challenge.
Color Image Encryption and Decryption Using Multiple Chaotic MapsIJTET Journal
Owing to advances in communication technology, a bulk of visual digital data is being stored and transmitted over the internet now-a-days. Particularly millions and millions of images transfer through the network per day as per the statistics and a result, the security of image data is an important requirement. Image encryption algorithm is used to provide this security. In this paper, an image encryption algorithm based on confusion diffusion architecture that uses dynamic key space is proposed. An internal key generator is used to generate the initial seeds for the overall encryption scheme is proposed. With these initial seeds logistic map generates pseudo random numbers then these numbers are converted into permutation order for permutation. The diffusion bits are generated in parallel using the logistic map and manipulated with pixels confused. The image pixels are iteratively confused and diffused using permutation order and diffusion bits respectively to produce cipher image in minimum number of rounds. This paper proposes a new kind of initial seed generation that utilizes the combo of logistic and tent maps. Even all external seeds are same. The internal seeds will be totally different. This ensures the key sensitivity. The simulation results and analysis confirm that the satisfactory level of security is achieved in three rounds and overall encryption time is saved.
This is a project dealing with securing images over a network.
Image is a delicate piece of information shared between clients across the world.Cryptography plays a huge role during secure connections.Applying simple Gaussian elimination to achieve highly secured image encryption decryption technique is a interesting challenge.
Color Image Encryption and Decryption Using Multiple Chaotic MapsIJTET Journal
Owing to advances in communication technology, a bulk of visual digital data is being stored and transmitted over the internet now-a-days. Particularly millions and millions of images transfer through the network per day as per the statistics and a result, the security of image data is an important requirement. Image encryption algorithm is used to provide this security. In this paper, an image encryption algorithm based on confusion diffusion architecture that uses dynamic key space is proposed. An internal key generator is used to generate the initial seeds for the overall encryption scheme is proposed. With these initial seeds logistic map generates pseudo random numbers then these numbers are converted into permutation order for permutation. The diffusion bits are generated in parallel using the logistic map and manipulated with pixels confused. The image pixels are iteratively confused and diffused using permutation order and diffusion bits respectively to produce cipher image in minimum number of rounds. This paper proposes a new kind of initial seed generation that utilizes the combo of logistic and tent maps. Even all external seeds are same. The internal seeds will be totally different. This ensures the key sensitivity. The simulation results and analysis confirm that the satisfactory level of security is achieved in three rounds and overall encryption time is saved.
Using this software any 50 sec audio message can be decrypted into image file and then original message can again be recovered from image file. This project is coded in Matlab and gui is also built in Matlab.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Cryptography is a process used for sending information in secret way. Goal of this process is to provide protection for information but in different way. In this paper our motive to represent a new method for protection that is generated by combination of RSA and 2 bit rotation mechanism of cryptography. There are many algorithms exist for this process. For cryptography there are algorithms like RSA, IDEA, AES, and DES but here we are using only one algorithm from these that is RSA which is enough to implement combined process using 2 bit rotation. The encrypted image is used as input for network for further implementation.RSA encrypt image with 1 bit rotation. In 1 bit rotation only 1 bit is shifted and at decrypt side shifted bit are reversed. But to make it more secure we are going to perform 2 bit rotation due to which it is more secure as compared to existing algorithm. After applying the 2 bit rotation we perform the permutation of that image that will give us encrypted image. Shivam Kumar | Dr. Ganesh D "Image Cryptography using RSA Algorithm" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd42408.pdf Paper URL: https://www.ijtsrd.comcomputer-science/computer-security/42408/image-cryptography-using-rsa-algorithm/shivam-kumar
An Image Encryption using Chaotic Based Cryptosystemxlyle
NAME: MUHAMAD LUQMAN NULHAKIM BIN MANSOR
NO MATRIC: BTBL16043975
COURSE: ISM (SK) KESELAMATAN RANGKAIAN KOMPUTER
SUPERVISOR: PROF. MADYA DR AFENDEE BIN MOHAMED
UNIVERSITI SULTAN ZAINAL ABIDIN
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
Image and text Encryption using RSA algorithm in java PiyushPatil73
About RSA
RSA is an encryption algorithm.
Developed in: 1977.
Developed by: Ron Rivest, Adi Shamir, and Leonard Adleman.
The RSA algorithm is the most commonly used public key encryption algorithm.
Two keys are used: Public Key and Private Key.
Public Key: For encryption.
Private Key: For decryption, also known as a secret key.
Public Key: Shared with the public that wants to send us data.
Private Key: Kept secret so that when someone sends us data encrypted by our
Public Key, we can decrypt the data using the Private Key.
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...IJCNCJournal
In this paper a detailed analysis of Data Encryption Standard (DES), Triple DES (3DES) and Advanced
Encryption Standard (AES) symmetric encryption algorithms in MANET was done using the Network
Simulator 2 (NS-2) in terms of energy consumption, data transfer time, End-to-End delay time and
throughput with varying data sizes. Two simulation models were adopted: the first simulates the network
performance assuming the availability of the common key, and the second simulates the network
performance including the use of the Diffie-Hellman Key Exchange (DHKE) protocol in the key
management phase. The obtained simulation results showed the superiority of AES over DES by 65%, 70%
and 83% in term of the energy consumption, data transfer time, and network throughput respectively. On
the other hand, the results showed that AES is better than 3DES by approximately 90% for all of the
performance metrics. Based on these results the AES was the recommended encryption scheme.
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
The need for keeping safe secrecy of secret and sensitive data has been ever increasing with the new
developments in digital system. In this paper, we present an increased way for getting embedding encrypted
secret facts in gray scale images to give high level safety of facts for news over unsecured narrow channels
Cryptography and Steganography are two closely related techniques are used in proposed system. Cryptography
gets into making one of religion the secret note into a non-recognizable chipper. Steganography is then sent in
name for using Double-Stegging to fix this encrypted data into a cover thing by which something is done and
keeps secret its existence.
File transfer with multiple security mechanismShubham Patil
The system enhances the security and the data confidentiality between the users and receiver by the two-layer encryption mechanism and the QR code for verification. The system consists of three main components which are very important to providing the security between sender and receiver while transmitting the data
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Using this software any 50 sec audio message can be decrypted into image file and then original message can again be recovered from image file. This project is coded in Matlab and gui is also built in Matlab.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Cryptography is a process used for sending information in secret way. Goal of this process is to provide protection for information but in different way. In this paper our motive to represent a new method for protection that is generated by combination of RSA and 2 bit rotation mechanism of cryptography. There are many algorithms exist for this process. For cryptography there are algorithms like RSA, IDEA, AES, and DES but here we are using only one algorithm from these that is RSA which is enough to implement combined process using 2 bit rotation. The encrypted image is used as input for network for further implementation.RSA encrypt image with 1 bit rotation. In 1 bit rotation only 1 bit is shifted and at decrypt side shifted bit are reversed. But to make it more secure we are going to perform 2 bit rotation due to which it is more secure as compared to existing algorithm. After applying the 2 bit rotation we perform the permutation of that image that will give us encrypted image. Shivam Kumar | Dr. Ganesh D "Image Cryptography using RSA Algorithm" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd42408.pdf Paper URL: https://www.ijtsrd.comcomputer-science/computer-security/42408/image-cryptography-using-rsa-algorithm/shivam-kumar
An Image Encryption using Chaotic Based Cryptosystemxlyle
NAME: MUHAMAD LUQMAN NULHAKIM BIN MANSOR
NO MATRIC: BTBL16043975
COURSE: ISM (SK) KESELAMATAN RANGKAIAN KOMPUTER
SUPERVISOR: PROF. MADYA DR AFENDEE BIN MOHAMED
UNIVERSITI SULTAN ZAINAL ABIDIN
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
Image and text Encryption using RSA algorithm in java PiyushPatil73
About RSA
RSA is an encryption algorithm.
Developed in: 1977.
Developed by: Ron Rivest, Adi Shamir, and Leonard Adleman.
The RSA algorithm is the most commonly used public key encryption algorithm.
Two keys are used: Public Key and Private Key.
Public Key: For encryption.
Private Key: For decryption, also known as a secret key.
Public Key: Shared with the public that wants to send us data.
Private Key: Kept secret so that when someone sends us data encrypted by our
Public Key, we can decrypt the data using the Private Key.
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...IJCNCJournal
In this paper a detailed analysis of Data Encryption Standard (DES), Triple DES (3DES) and Advanced
Encryption Standard (AES) symmetric encryption algorithms in MANET was done using the Network
Simulator 2 (NS-2) in terms of energy consumption, data transfer time, End-to-End delay time and
throughput with varying data sizes. Two simulation models were adopted: the first simulates the network
performance assuming the availability of the common key, and the second simulates the network
performance including the use of the Diffie-Hellman Key Exchange (DHKE) protocol in the key
management phase. The obtained simulation results showed the superiority of AES over DES by 65%, 70%
and 83% in term of the energy consumption, data transfer time, and network throughput respectively. On
the other hand, the results showed that AES is better than 3DES by approximately 90% for all of the
performance metrics. Based on these results the AES was the recommended encryption scheme.
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
The need for keeping safe secrecy of secret and sensitive data has been ever increasing with the new
developments in digital system. In this paper, we present an increased way for getting embedding encrypted
secret facts in gray scale images to give high level safety of facts for news over unsecured narrow channels
Cryptography and Steganography are two closely related techniques are used in proposed system. Cryptography
gets into making one of religion the secret note into a non-recognizable chipper. Steganography is then sent in
name for using Double-Stegging to fix this encrypted data into a cover thing by which something is done and
keeps secret its existence.
File transfer with multiple security mechanismShubham Patil
The system enhances the security and the data confidentiality between the users and receiver by the two-layer encryption mechanism and the QR code for verification. The system consists of three main components which are very important to providing the security between sender and receiver while transmitting the data
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERINGIJNSA Journal
Healthcare is an essential application of e-services, where for diagnostic testing, medical imaging acquiring, processing, analysis, storage, and protection are used. Image ciphering during storage and transmission over the networks used has seen implemented using many types of ciphering algorithms for security purpose. Current cyphering algorithms are classified into two types: traditional classical cryptography using standard algorithms (DES, AES, IDEA, RC5, RSA, ...) and chaos cryptography using continuous (Chau, Rossler, Lorenz, ...) or discreet (Logistics, Henon, ...) algorithms. The traditional algorithms have struggled to combat image data as compared to regular textual data. Whereas, the chaotic algorithms are more efficient for image ciphering. The Significancecharacteristics of chaos are its extreme sensitivity to initial conditions and algorithm parameters.
In this paper, medical image security based on hybrid/mixed chaotic algorithms is proposed. The proposed method is implemented using MATLAB. Where the image of the Retina of the Eye to detect Blood Vessels is ciphered. The Pseudo-Random Numbers Generators (PRNGs) from the different chaotic algorithms are implemented, and their statistical properties are evaluated using the National Institute of Standards and Technology NIST and other statistical test-suits. Then, these algorithms are used to secure the data, where the statistical properties of the cipher-text are also tested. We propose two PRNGs to increase the complexity of the PRNGs and to allow many of the NIST statistical tests to be passed: one based on twohybrid mixed chaotic logistic maps and one based on two-hybrid mixed chaotic Henon maps, where each chaotic algorithm runs side-by-side andstarts with random initial conditions and parameters (encryption keys). The resulting hybrid PRNGs passed many of the NIST statistical test suits.
Efficient two-stage cryptography scheme for secure distributed data storage i...IJECEIAES
Cloud computing environment requires secure access for data from the cloud server, small execution time, and low time complexity. Existing traditional cryptography algorithms are not suitable for cloud storage. In this paper, an efficient two-stage cryptography scheme is proposed to access and store data into cloud safely. It comprises both user authentication and encryption processes. First, a two-factor authentication scheme one-time password is proposed. It overcomes the weaknesses in the existing authentication schemes. The proposed authentication method does not require specific extra hardware or additional processing time to identity the user. Second, the plaintext is divided into two parts which are encrypted separately using a unique key for each. This division increases the security of the proposed scheme and in addition decreases the encryption time. The keys are generated using logistic chaos model theory. Chaos equation generates different values of keys which are very sensitive to initial condition and control parameter values entered by the user. This scheme achieves high-security level by introducing different security processes with different stages. The simulation results demonstrate that the proposed scheme reduces the size of the ciphertext and both encryption and decryption times than competing schemes without adding any complexity.
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY IJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
REAL-TIME MODE HOPPING OF BLOCK CIPHER ALGORITHMS FOR MOBILE STREAMINGijwmn
It has been shown that the encrypted information or ciphertext produced by symmetric-key block ciphers
with Electronic codebook mode is vulnerable to ciphertext searching, replay, insertion and deletion
because it encrypts each block independently. To compensate for this, each block of the encrypted
information should be encrypted dependently. The encrypted information should be operated with a
special mode. The operation mode should be changed. This paper analysis what an operational mode of
block ciphers needs to feedback exactly and proposes a simple real-time changing operation mode
technique that extends the existing mode changing opportunity. The new change operation mode
technique considers the sign differences between the intra-feedback information and the public-feedback
information, and then adaptively determines the corresponding change operation mode factor for each
data block. This mode hopping technique for mobile streaming security is highly suitable for recent block
computing in future various environments.
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...CSCJournals
In this article, the security performance and quality for image encryption and decryption based on filter bank and the combination between XOR and addition modulo 28 have been studied and assessed. The most common security parameters for image encryption and decryption have been employed. The parameters have been used to examine the proposed image encryption scheme with one and two rounds. The parameters include histogram, correlation coefficient, global entropy, block entropy, avalanche effect, number of pixel change rate (NPCR), unified average change intensity (UACI), exhaustive key analysis, and key sensitivity test. The simulation results proved that, the image encryption process passes all these tests. Moreover, it reaches or excels the current state of the arts. So the encrypted image becomes random-like from the statistical point of views after encryption.
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...IJERA Editor
The astonishing developments have been occurring in the field of network communications for a long time and
these advancement lead to a genuine and conspicuous need of image transfer and getting safely through the web.
The web is not secure for the exchange of dependable data, for example, content, picture and video.
Cryptographic procedures are vital to be improved to exchange data through web safely. Routine cryptography,
for example, AES, DES, IDEA and RSA includes simply rearranging of pixels and henceforth will prompt
decreased security for information protection. With a specific end goal to enhance the security, it is important to
expand the intricacy in encryption. As an answer for this it is proposed to utilize confused maps in encryption
methods which expand the multifaceted nature. As intricacy builds, data security increments. Thus, chaos-based
encryption has its own significance in providing security for secret information i.e. data confidentiality than
conventional.
Data security and protection is one of the most common technologies used in the field of computer science. This is because of its great importance in all fields related to daily life, whether political, economic, and other aspects change. In this research paper, a new intelligent system that concentrates on image and text encryption and decryption is proposed. Furthermore, the image recognition rate is increased. In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. The proposed technique relies on using square root of public key as private key. XOR operation for colored images encryption and decryption is performed. By calculating signal to noise ratio (PSNR), mean square error (MSE), and bit error rate (BER), the most important things that we address how to provide data security for large data based on encryption techniques and increase the security of multimedia data and texture date and address the problem of time and accuracy in image matching. the results show that the quality of images after decryption is good.
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERSIJNSA Journal
Modern Internet protocols support several modes of operation in encryption tasks for data confidentiality to keep up with varied environments and provide the various choices, such as multi-mode IPSec support. To begin with we will provide a brief background on the modes of operation for symmetric-key block ciphers. Different block cipher modes of operation have distinct characteristics. For example, the cipher block chaining (CBC) mode is suitable for operating environments that require self-synchronizing capabilities, and the output feedback (OFB) mode requires encryption modules only. When using symmetric-key block cipher algorithms such as the Advanced Encryption Standard (AES), users performing information encryption often encounter difficulties selecting a suitable mode of operation. This paper describes a structure for analyzing the block operation mode combination. This unified operation structure (UOS) combines existing common and popular block modes of operation. UOS does multi-mode of operation with most existing popular symmetric-key block ciphers and do not only consist of encryption mode such as electronic codebook (ECB) mode, cipher block chaining (CBC) mode, cipher feedback (CFB) mode and output feedback (OFB) mode, that provides confidentiality but also message authentication mode such as the cipher block chaining message authentication code (CBC-MAC) in cryptography. In Cloud Computing, information exchange frequently via the Internet and on-demand. This research provides an overview and information useful for approaching low-resource hardware implementation, which is proper to ubiquitous computing devices such as a sensor mote or an RFID tag. The use of the method is discussed and an example is given. This provides a common solution for multimode and this is very suitable for ubiquitous computing with several resources and environments. This study indicates a more effectively organized structure for symmetric-key block ciphers to improve their application scenarios. We can get that it is flexible in modern communication applications.
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEIJNSA Journal
In this paper, a new image encryption scheme using a secret key of 144-bits is proposed. In the substitution process of the scheme, image is divided into blocks and subsequently into color components. Each color component is modified by performing bitwise operation which depends on secret key as well as a few most significant bits of its previous and next color component. Three rounds are taken to complete substitution process. To make cipher more robust, a feedback mechanism is also applied by modifying used secret key after encrypting each block. Further, resultant image is partitioned into several key based dynamic sub-images. Each sub-image passes through the scrambling process where pixels of sub-image are reshuffled within itself by using a generated magic square matrix. Five rounds are taken for scrambling process. The propose scheme is simple, fast and sensitive to the secret key. Due to high order of substitution and permutation, common attacks like linear and differential cryptanalysis are infeasible. The experimental results show that the proposed encryption technique is efficient and has high security features.
Comparative Study on Watermarking & Image Encryption for Secure CommunicationIJTET Journal
Over the past decades, research in security has concentrated on the development of algorithms and protocols for authentication, encryption and integrity of data. Despite tremendous advances, several security problems still afflict system’s. In this android app watermarking and encryption is being applied on images and data. Because of the human visual system’s low sensitivity to small changes and the high flexibility of digital media, anyone can easily make small changes in digital data with low perceptibility. Here watermarking and encryption are being performed in wavelet domain. Here in watermarking, the coefficients of watermarks are being embedded with the coefficients of the original image. Encryption is being done in wavelet domain so that the probability of an intruder trying to access the contents is very much minimized. Thus, this model provides a high level of security.
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
Rapid growth of digital communication and multimedia application increases the need of security and it becomes an important issue of communication and storage of multimedia. Image Encryption is one of the techniques that are used to ensure high security. Various fields such as medical science military in which image encryption can be used. Recent cryptography provides necessary techniques for securing information and protective multimedia data. In last some years, encryption technology has been developed quickly and many image encryption methods have been used to protect confidential image data from illegal way in. Within this paper survey of different image encryption techniques have been discussed from which researchers can get an idea for efficient techniques to be used.
Unified Approach With Neural Network for Authentication, Security and Compres...CSCJournals
The Present demands of scientific and social life forced image processing based applications to have a tremendous growth. This growth at the same time has given numbers of challenges to researcher to meet the desired objectives of either users or from solution perspectives. Among the various challenges, the most dominating areas are: reduction in required memory spaces for storage or taken transmission time from one location to other, protection of image contents to maintain the privacy and to facilitate the mechanism to identify the malicious modification if there is any either in storage or in transmission channel. Even though there are number of methods proposed by various researchers and are existed as solutions, questions are remain open in terms of quality, cost and complexity. In this paper we have proposed the concept based on neural network to achieve the quality of compression, protection and authentication all together using the ability of universal approximation by learning, one way property and one to one mapping characteristics correspondingly. With the proposed methods not only we can authenticate the image but also positions of malicious activity given in the image can be located with high precision. Proposed methods are very efficient in performance as well as carry the features of simplicity and cost effectiveness.
DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...cscpconf
In this paper, a new robust watermarking technique for copyright protection based on Discrete
Wavelet Transform and Singular Value Decomposition is proposed. The high frequency subband
of the wavelet decomposed cover image is modified by modifying its singular values. A secret key
is generated from the original watermark with the help of visual cryptography to claim the
ownership of the image. The ownership of the image can be claimed by superimposing this secret
key on the extracted watermark from the watermarked image. The robustness of the technique is
tested by applying different attacks and the visual quality of the extracted watermark after
applying these attacks is good. Also, the visual quality of the watermarked image is undistinguishable from the original image.
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block CiphersIJNSA Journal
Modern Internet protocols support several modes of operation in encryption tasks for data confidentiality
to keep up with varied environments and provide the various choices, such as multi-mode IPSec support.
To begin with we will provide a brief background on the modes of operation for symmetric-key block
ciphers. Different block cipher modes of operation have distinct characteristics. For example, the cipher
block chaining (CBC) mode is suitable for operating environments that require self-synchronizing
capabilities, and the output feedback (OFB) mode requires encryption modules only. When using
symmetric-key block cipher algorithms such as the Advanced Encryption Standard (AES), users
performing information encryption often encounter difficulties selecting a suitable mode of operation.
This paper describes a structure for analyzing the block operation mode combination. This unified
operation structure (UOS) combines existing common and popular block modes of operation. UOS does
multi-mode of operation with most existing popular symmetric-key block ciphers and do not only consist
of encryption mode such as electronic codebook (ECB) mode, cipher block chaining (CBC) mode, cipher
feedback (CFB) mode and output feedback (OFB) mode, that provides confidentiality but also message
authentication mode such as the cipher block chaining message authentication code (CBC-MAC) in
cryptography. In Cloud Computing, information exchange frequently via the Internet and on-demand.
This research provides an overview and information useful for approaching low-resource hardware
implementation, which is proper to ubiquitous computing devices such as a sensor mote or an RFID tag.
The use of the method is discussed and an example is given. This provides a common solution for multimode and this is very suitable for ubiquitous computing with several resources and environments. This
study indicates a more effectively organized structure for symmetric-key block ciphers to improve their
application scenarios. We can get that it is flexible in modern communication applications.
Different date block size using to evaluate the performance between different...IJCNCJournal
The different computer networks whether wired or wireless are becoming more popular with its high
security aspect. Different security algorithms and technique are using to avoid any aforementioned attacks.
One of these technique is a cryptography technique that makes the data as unreadable during the transfer
hence; there is no chance to reclaim the information. Presently, most of the users are using various media
types and internet to transfer the data but, it has the chance to retrieve the data by using these media types.
The perfect solution for this problem is to provide security on time-to-time basis; this stage is always
significant to the security related community discussions. This paper explains the comparison between the
run time of three different encryption algorithms which are DES, AES and Blowfish The compression
includes using different modes, data block size and different operation modes. As a result, Blowfish
algorithm followed by AES take less time for running compared to DES.
Designing Financial Information System Using Structured System Analysis and D...ijcnac
In the following research, the financial information system for the studied company
which had various sub-systems of accounting, payment, storage, properties, salary and
wages systems were analyzed properties system is developed as one of the sub-systems
subsequent to sub-systems problems identification. In both stages of analysis and
designing, Structured System Analysis and Design Method methodology, which has a
Top-Down approach, is used. Based on the studied methodology in analysis stage, system
requirements including needs (determined through studying present system problems)
and obligations (determined by the designer and according to experiences obtained from
similar systems) were identified and considering such requirements, the proper
information system concept model was designed. Some suggestions are represented for
organizations use and information systems development fans, in the final part to the
article.
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGESijcnac
This project presents a new image compression technique for the coding of retinal and
fingerprint images. Retinal images are used to detect diseases like diabetes or
hypertension. Fingerprint images are used for the security purpose. In this work, the
contourlet transform of the retinal and fingerprint image is taken first. The coefficients of
the contourlet transform are quantized using adaptive multistage vector quantization
scheme. The number of code vectors in the adaptive vector quantization scheme depends
on the dynamic range of the input image.
A Comparative Analysis of the Performance of VoIP Traffic with Different Type...ijcnac
The key QoS parameters for VoIP are delay, jitter and loss. In the Internet, VoIP requires
the underlying packet switched network to minimize the impact of these parameters. A
major contributing factor in this regard is traffic engineering carried out by scheduling
algorithms. This paper studies the behavior of different types of scheduling algorithms on
the delay, jitter and loss QoS parameters. The performance evaluation involves
identifying the scheduling algorithms which are most suitable for VoIP communications.
The result from the analysis also shows the impact of the QoS parameters on VoIP over
the Internet.
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...ijcnac
The wideband code division multiple access (WCDMA) based 3G cellular mobile
wireless networks are expected to provide a diverse range of multimedia services to
mobile users with guaranteed quality of service (QoS). To serve diverse quality of service
requirements of these networks it necessitates new radio resource management strategies
for effective utilization of network resources with coding schemes. In this paper coverage
area for voice traffic and with different modulation techniques, coding schemes and
decision decoder are discussed. These discussions are to improve the coverage area in
the mobile communication system. This paper is mainly focuses on coverage area of
WCDMA system using link budget calculation with different modulation, coding schemes
and decision decoder. Simulation results demonstrate coverage extension for voice
service with different modulation,coding scheme, soft and hard decision decoder using
appropriate Bit error rate (BER) to maintain QoS of the voice.
The Escalating Nigeria National Security Challenge: Smart Objects and Interne...ijcnac
Since October 1st 2011, when Nigeria Federal Govenrment marked Nigerian�s 51st National Indepedence celebration at Eagles Square Abuja that witnessed the first bomb blast in the country, there have been a catalogue of avalanche of security challenges throughout the country ranging from bomb blasts, suicide bombings, terrorist attacks, kidnapping for ransoms, ritual killings, political assassinations and political brigande, crude oil bunkering and pipeline vandalism, armed robbery but to mention a few. The Federal and State governments have made much effort through the engagement of the law enforcement agencies and security forces such as Police, Joint Military Task Force (JTF), State Security Service (SSS), Nigeria Security and Civil Defnce Corps (NSCDC) but their combined effort have not yielded much positive result towards arresting these security menace.This paper attempts to proffer a security solution framework using newly emerging security technological solutions known as �smart objects� and �internet-of-things�, combining the cooperative efforts of security technologies such as Wireless Sensor and Actuator Networks(WSANs), Global Positioning System (GPS), IP surveillance using specialized cameras and Close Circuit Television Cameras (CCTV) and fusing their cooperative outputs into the Internet using novelty telecommunication networks such as Wi-Fi, 3G, ZigBee, Internet Protocol (IP) to aid security agents to track, trace, apprehend and prosecute the culprits who perpetuate these security challenges.Since October 1st 2011, when Nigeria Federal Govenrment marked Nigerian�s 51st National Indepedence celebration at Eagles Square Abuja that witnessed the first bomb blast in the country, there have been a catalogue of avalanche of security challenges throughout the country ranging from bomb blasts, suicide bombings, terrorist attacks, kidnapping for ransoms, ritual killings, political assassinations and political brigande, crude oil bunkering and pipeline vandalism, armed robbery but to mention a few. The Federal and State governments have made much effort through the engagement of the law enforcement agencies and security forces such as Police, Joint Military Task Force (JTF), State Security Service (SSS), Nigeria Security and Civil Defnce Corps (NSCDC) but their combined effort have not yielded much positive result towards arresting these security menace.This paper attempts to proffer a security solution framework using newly emerging security technological solutions known as �smart objects� and �internet-of-things�, combining the cooperative efforts of security technologies such as Wireless Sensor and Actuator Networks(WSANs), Global Positioning System (GPS), IP surveillance using specialized cameras and Close Circuit Television Cameras (CCTV) and fusing their cooperative outputs into the Internet using novelty telecommunication networks such as Wi-Fi, 3G, ZigBee, Internet Protocol (IP) to aid security agents to track, trace, apprehend and pr
Performance Analysis and Simulation of OLSR Routing Protocol in MANET ijcnac
Mobile ad hoc network is a collection of wireless nodes that are communicate other
nodes (router) without using access point, infrastructure . Mobile ad-hoc network is an
autonomous system that means no need for depaentd other nodes it have own capability
to handle and controlling all funcitionlity, to sending and receiving all information form
one device to other device. MANET has power full feature that controlling itself by
dynamic nature, multihop,low power and configuration of the system. In this paper we
analyzing, simulation and implements the TC messages and HELLO Message by MPR of
OLSR routing performance checked at 200 nodes on Qualnet 5.0.2 simulator. In Qualnet
simulator to simulate and implement the performance of OLSR routing protocols takes
various performance metrics like hello message sent (HMS) , hello message received
(HMR), TC message generated (TCMG), TC message replied (TCMR), TC messages
received on Constant Bit Rate (CBR) using random waypoint model. In this paper check
the performance OLSR routing protocol gives effective performance for lage networks.
BookyScholia: A Methodology for the Investigation of Expert Systemsijcnac
Mathematicians agree that encrypted modalities are an interesting new topic in the field
of software engineering, and systems engineers concur. In our research, we proved the
deployment of consistent hashing, which embodies the intuitive principles of algorithms.
Our focus in our research is not on whether the World Wide Web and SMPs are largely
incompatible, but rather on presenting an analysis of interrupts (BookyScholia).
Experiences with such solution and active networks disconfirm that access points and
cache coherence can synchronize to realize this mission. W woulde show that
performance in BookyScholia is not an obstacle. The characteristics of BookyScholia, in
relation to those of more seminal systems, are famously more natural. Finally,we would
focus our efforts on validating that the UNIVAC computer can be made probabilistic,
cooperative, and scalable.
Intersymbol interference caused by multipath in band limited frequency selective time dispersive channels distorts the transmitted signal, causing bit error at receiver. ISI is the major obstacle to high speed data transmission over wireless channels. Channel estimation is a technique used to combat the intersymbol interference. The objective of this paper is to improve channel estimation accuracy in MIMO-OFDM system by using modified variable step size leaky Least Mean Square (MVSSLLMS) algorithm proposed for MIMO OFDM System. So we are going to analyze Bit Error Rate for different signal to noise ratio, also compare the proposed scheme with standard LMS channel estimation method.
Study of Polarization Mode Dispersion in the Optical Digital Connection to Hi...ijcnac
Polarization Mode Dispersion (PMD) is a factor which limits the bit rate of the optical transmissions. The PMD is such an effect which is time broadening due to the dependence of the group velocity to the signal polarization. The deformation effects of the impulses become considerable from 40 Gb/s. This paper, we reviews the degrade PMD effect in the telecommunications optical connections to high bit rate, due to the evolution of quality factor (Q) according to the fiber length, bit rate and PMD coefficient , well as the impact PMD on the degree of polarization and electrical power, we discuss also the representation of the polarization state and PMD vector on the Poincare sphere.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
A Joint Encryption/Watermarking Algorithm for Secure Image Transfer
1. International journal of Computer Networking and Communication (IJCNAC)Vol. 1, No. 1(August 2013) 25
www.arpublication.org
A Joint Encryption/Watermarking Algorithm for
Secure Image Transfer
Youssra LAKRISSI, Mohammed ERRITALI, Mohammed FAKIR
Information Processing and Telecommunication Teams, University Sultan Moulay Slimane,
Benimallal, Morocco
lakrissi.youssra@gmail.com
m.erritali@usms.ma
fakfad@yahoo.fr
Abstract
This paper presents a method combining encryption and watermarking for secure
images transfer. The proposed solution gives access to the outcomes of the image
integrity and of its origins as its attachment to one user even if the image is stored
encrypted. This method is based on the combination of encryption algorithms public-
private keys and secret keys, and watermarking. The algorithm for image encryption uses
a secret key. We encrypt the secret key with an asymmetric algorithm. This encrypted
secret key is then inserted into the encrypted image using watermark algorithm.
Keywords: Encryption, symmetric encryption, asymmetric encryption, hybrid
encryption, stream cipher, bloc cipher, watermarking, discrete wavelet transform.
1. INTRODUCTION
Rapid growth of Internet has contributed a lot in the increase of multimedia contents over
internet including digital images and videos. Due to exponential rise in multimedia contents, it
has become a trend to share information using digital images and video and at the same time it
has become a challenging issue to protect these contents from tempering in order to avoid a
misuse and retain confidentiality of data [1].
The security of data is pursued by assuring, among others authentication, to verify the identity
claimed by or for any system entity, data confidentiality to protect data against unauthorized
disclosure, data integrity to verify that data have been changed, destroyed or lost in an accidental
manner [1].
Actually, encrypted data need an additional level of protection in order to keep control on
them after the decryption phase. In fact, when the ciphered data is deciphered by the authorized
user, it is unprotected and it can be easily modified, tampered, or stolen. The scientific community
started focusing on the possibility of providing both security services simultaneously and
therefore to have the chance of watermarking encrypted data and detecting the watermark before
and after decryption. This allows to work in the encrypted domain, operating on ciphered data
without giving access to the plain one and increasing the operation efficiency.
Lian et al [2] draw a detailed scenario concerning video encryption and video watermarking
and proposes a new combined approach. Bas et al [3] give an overview on the possible scenarios
where the combination of both level of protection can be exploited, while Merhav [4] presents a
theoretic analysis of this problem. In literature a commutative scheme is presented by Lian et al
[5]: the image is wavelet transformed and some sub bands are ciphered while some others are
both ciphered (with sign encryption) and watermarked.
2. 26
www.arpublication.org
In fact several methods have been developed to solve the problems of security and authenticity
in image transfer. In this paper, we present a hybrid coding approach where we propose to use
several types of encryption with the watermarking in order to secure the image transmission.
Samir Kumar [6] proposed a technique for invisible Digital Watermarking through Encryption
where the image is encoded within another image (cover image). Firstly, the cover image and the
target image can be adjusted by resize function. Secondly, only the final encrypted image i.e.
cover image and target image is sent over the network. This image is finally decoded at the
receiver end.
Puech and Rodrigues [1] present a method of partial or selective encryption for JPEG images.
It is based on encoding of some Huffman bit stream with AES cipher.
We propose a method combining symmetric encryption and watermarking which is robust to
noise and ensure the integrity (perceptual) and the Authenticity of image beside of hiding
associated data (high capacity) in image. This approach can access in different resolution levels
of image due to the wavelet watermarking and can process in real time.
Before embedding the secret key in the image, we are going to crypt it with an asymmetric
algorithm. At the reception, only public-private key will be needed to extract and decrypt the
secret key to get our image legible.
To encrypt the image, we have chosen to work with a symmetric stream cipher and symmetric
bloc cipher so we can make a comparison between them. To embed the secret key, we selected a
watermarking method based on discrete wavelet transform DWT [7].
The remainder of this paper is organized as follow. In Section II, we explain the encryption a
watermarking algorithms and in section III we detail the proposed method, before concluding, we
illustrate the results and discuss the performances of our approach in Sections 3 and 4
respectively.
2. RELATED WORK
2.1 Commutative Watermarking-Encryption (CWE)
One approach to commutative watermarking is provided by deploying homomorphic
encryption techniques so that some basic algebraic operations such as addition and multiplication
on the plaintexts can be transferred onto the corresponding cipher texts, i.e., they are transparent
to encryption [8]. Especially, if both the encryption and the watermarking process consist of the
same homomorphic operation, one gets a commutative watermarking-encryption scheme.
Examples of homomorphic operations are exponentiation modulo n, multiplication modulo n,
addition modulo n and the XOR operation. One major drawback of this approach is the influence
of encryption on robustness of the watermarking algorithm because after encryption there is no
visual information available for the watermark embedder to adapt itself to increase robustness
while at the same time minimizing visual quality degradation [2].
In partial encryption schemes, the plaintext multimedia data is partitioned into two disjoint
parts, where one part is encrypted and the other part is watermarked. Since the encryption part is
independent of the watermarking part, they are naturally commutative. Because there is some
information leakage through the unencrypted parts, in order to get a high level of perceptual
security, the data parts which are significant for perception are encrypted, while only the
perceptually unimportant parts are watermarked, leaving the door open for an attacker trying to
remove the watermark. This lack of robustness against malicious attacks seems to be a general
problem with CWE.
3. International journal of Computer Networking and Communication (IJCNAC)Vol. 1, No. 1(August 2013) 27
www.arpublication.org
2.2 Hybrid DCT-DWT Watermarking and IDEA Encryption of Internet
Contents
M.A. Mohamed [9] proposed a hybrid image protection scheme to establish a relation between
the data encryption key and the watermark. Prepositioned secret sharing allows the reconstruction
of different encryption keys by communicating different activating shares for the same
prepositioned information. Each activating share is used by the receivers to generate a fresh
content decryption key. In the proposed scheme, the activating share is used to carry copyright or
usage rights data. The bit stream that represents this data is also embedded in the content as a
visual watermark. When the encryption key needs to change, the data source generates a new
activating share, and encrypts the corresponding data with the key constructed from the new
activating share. Before transmission, the encrypted data is embedded in a multimedia stream.
Each receiver can extract the encrypted data from the host image, and decrypt this data after
reconstructing the same key.
3. ENCRYPTION AND WATERMARKING ALGORITHMS USED
3.1 Encryption Algorithm
a) Symmetric Stream Cipher
In cryptography, a stream cipher is a symmetric key cipher where plaintext digits are
combined with a pseudorandom cipher digit stream (key stream). In a stream cipher
each plaintext digit is encrypted one at a time with the corresponding digit of the key stream, to
give a digit of the ciphertext stream [10]. An alternative name is a state cipher, as the
encryption of each digit is dependent on the current state. In practice, a digit is typically
a bit and the combining operation an exclusive-or (XOR).
A stream cipher generates successive elements of the key stream based on an internal state
[10]. This state is updated in essentially two ways: if the state changes independently of the
plaintext or ciphertext messages, the cipher are classified as a synchronous stream cipher as
shown in figure 1. By contrast, self-synchronising stream ciphers update their state based on
previous cipher text digits as shown in figure 2.
Fig.1 Principle of synchronous stream cipher
Fig.2 Principle of auto-synchronous stream cipher
b) Symmetric Bloc Cipher (AES)
AES is based on a design principle known as a substitution-permutation network, and is fast in
both software and hardware [11]. AES is a variant of Rijndael [12] which has a fixed block
4. 28
www.arpublication.org
size of 128 bits, and a key size of 128, 192, or 256 bits. By contrast, the Rijndael specification per
se is specified with block and key sizes that may be any multiple of 32 bits, both with a minimum
of 128 and a maximum of 256 bits [13].
AES operates on a 4×4 column-major order matrix of bytes, termed the state, although some
versions of Rijndael have a larger block size and have additional columns in the state. Most AES
calculations are done in a special finite field.
The key size used for an AES cipher specifies the number of repetitions of transformation
rounds that convert the input, called the plaintext, into the final output, called the ciphertext. The
number of cycles of repetition are as follow:
• 10 cycles of repetition for 128-bit keys [13].
• 12 cycles of repetition for 192-bit keys [14].
• 14 cycles of repetition for 256-bit keys [15].
Each round consists of several processing steps, each containing five similar but different
stages, including one that depends on the encryption key itself. A set of reverse rounds are
applied to transform ciphertext back into the original plaintext using the same encryption key.
Figure 3 shows the principle of AES encryption
Fig.3 AES encryption [1]
c) Asymmetric Encryption (RSA):
RSA is an algorithm for public-key cryptography that is based on the presumed difficulty
of factoring large integers, the factoring problem [16]. The RSA algorithm involves three
steps: key generation, encryption and decryption.
A user of RSA creates and then publishes the product of two large prime numbers, along with
an auxiliary value, as their public key. The prime factors must be kept secret. Anyone can use
the public key to encrypt a message, but with currently published methods, if the public key is
large enough, only someone with knowledge of the prime factors can feasibly decode the
message [16]. Whether breaking RSA encryption is as hard as factoring is an open question
known as the RSA problem.
Figure 4 shows the principle of asymmetric cryptography
Fig.4 Asymmetric encryption
5. International journal of Computer Networking and Communication (IJCNAC)Vol. 1, No. 1(August 2013) 29
www.arpublication.org
3.2 Watermarking Method
The concept of Image watermarking mainly came into existence in 1990s because of the
widespread of the Internet [17]. At that time an invisible watermark message was inserted into
an image which is to be transferred such that the invisible message will survive intended or
unintended attacks.
The process of watermarking begins when the encoder inserts watermark into image,
producing watermarked image. The decoder extracts and validates the presence of watermarked
input or unmarked input [18].
The transform domain watermarking systems are based on Fourier and Cosine transform
which are the invertible transform applied to the image where the coefficients are modified by
the watermark data. The Discrete Cosine transform watermarking [19] divides the image into
different frequency band and choose the middle frequency band for watermarking. The method
that we are going to use on our approach is wavelet watermarking.
The Wavelet domain watermarking system is the multi-band watermarking scheme. The
attacker may not be able to detect the embedded watermark without knowing the parameter. The
original image is decomposed into wavelet coefficients and then multi-energy watermarking
scheme based on the qualified significant wavelet tree.
a) Embedding Watermark
The host image is taken as the input is decomposed with the fingerprint image using wavelet
transform. The fingerprint image of is taken as the copyright image is embedded in the
approximate and detailed coefficient diagonally of the host image. Then the inverse wavelet
transform is applied on these coefficients. The embedding process is performed by using the
following steps:
a. The image is decomposed using wavelet gives approximate coefficient (LL) and detailed
coefficient of horizontal (HL), vertical (LH) and diagonal (HH) shown in figure 5 of the input
image are estimated by using the equation (3).
Figure 5: Wavelet decomposition
ࢃ′ሺ, ሻ ൌ
√ࡹࡺ
∑ ∑ ࢌሺ࢞, ࢟ሻࢻሺ࢞, ࢟ሻ
√ࡹࡺ
ࡺି
ୀࢁ
ࡹି
ୀࢁ ∑ ∑ ࢌሺ࢞, ࢟ሻΩሺ࢞, ࢟ሻࡺି
ୀࢁ
ࡹି
ୀࢁ (3)
Where W (m, n) is the Wavelet Series of the host image.
b. The fingerprint image is embedded in the coefficient of LL and HH by using the equation (4) and (5)
LLi,j ݄ܶܮܮ ݄ܶ݁݊ ∑ ∑ ࡸࡸሺ, ሻ ɛ ∗ ࡸࡸሺ, ሻ ∗ ࢃሺ, ሻࡺି
ୀ
ࡹିࡺ
ୀ (4)
LL’i,j= LLi,j Else
HHi,j ݄ܶܪܪ ࢀࢎࢋ ∑ ∑ ࡸࡸሺ, ሻ ɛ ∗ ࡴࡴሺ, ሻ ∗ ࢃሺ, ሻࡺି
ୀ
ࡹିࡺ
ୀ (5)
HH’i,j= HHi,j ࡱ࢙ࢋ
6. 30
www.arpublication.org
Where m is height of original image, n is the width of original image. The threshold value of
the approximate coefficient LLi, j for embedding the watermarking is defined as ThLL of 15
with the embedding strength of is 0.06. Then the detailed coefficients HHi, j is embedded with
W using the threshold value of ThHH is 45 and embedding strength of is 3.5. The constant
values will be varied according to the visibility of the watermarked image.
c. The watermarked image is obtained by applying inverse discrete wavelet transform (IDWT)
on the coefficient obtained during step 2 using equation (6).
ࢌ′ሺ, ሻ ൌ
√ࡹࡺ
ሺ∑ ∑ ࢃሺ, , ሻࢻሺ࢞, ࢟ሻ ࡺି
ୀࢁ
ࡹି
ୀࢁ ∑ ∑ ࢃሺ, , ሻΩሺ࢞, ࢟ሻሻࡺି
ୀࢁ
ࡹି
ୀࢁ (6)
b) Extracting Watermark
In the extraction process, the watermarked image and the copyright image (fingerprint image)
are processed by the following steps
a. The watermarked image is decomposed using wavelets gives approximate coefficient (LL)
and detailed coefficient of horizontal (HL), vertical (LH) and diagonal (HH) of the input image
are estimated by using the equation (7)
ࢃᇱ
ሺ, ሻ ൌ
√ࡹࡺ
∑ ∑ ࢌᇱ
ሺ, ሻࢻሺ࢞, ࢟ሻ
√ࡹࡺ
ࡺି
ୀࢁ
ࡹି
ୀࢁ ∑ ∑ ࢌᇱ
ሺ, ሻΩሺ࢞, ࢟ሻࡺି
ୀࢁ
ࡹି
ୀࢁ (7)
b. The watermarked image is extracted using the equation (8) and (9).
LL’i,j ݄ܶܮܮ ݄ܶ݁݊ ∑ ∑ ࢆࡸሺ, ሻ ࡸࡸሺ, ሻ ∗ ࢃሺ, ሻࡺି
ୀ
ࡹିࡺ
ୀ (8)
LL’’i,j = LL’i,j Else
HH’i,j ݄ܶܪܪ ࢀࢎࢋ ∑ ∑ ࢆࡸሺ, ሻ ࡴࡴሺ, ሻ ∗ ࢃሺ, ሻࡺି
ୀ
ࡹିࡺ
ୀ (9)
HH’’i,j= HH’i,j ࡱ࢙ࢋ
Where ZL (i, j) is 0
c. The inverse DWT (IDWT) is applied on the coefficient obtained during step 2 using
equation (10). The fingerprint image (copyright image) is extracted.
ࢌሺ, ሻ ൌ
√ࡹࡺ
ሺ∑ ∑ ࢃ′ሺ, , ሻࢻሺ࢞, ࢟ሻ ࡺି
ୀࢁ
ࡹି
ୀࢁ ∑ ∑ ࢃ′ሺ, , ሻΩሺ࢞, ࢟ሻሻࡺି
ୀࢁ
ࡹି
ୀࢁ (10)
4. ENCRYPTION-WATERMARKING COMBINATION
Recall that the asymmetric methods are not suitable for encrypting images because they are
too long computation time. We should therefore use a conventional secret key encryption with
transmission channel for transferring the key.
We have developed a method that combines a symmetric encryption algorithm for image,
asymmetric encryption algorithm to encrypt the secret key and discrete wavelet transform for
watermarking.
We suppose that a person M wish to send an image securely to another person S. M will use a
symmetric algorithm to encrypt the image.
7. International journal of Computer Networking and Communication (IJCNAC)Vol. 1, No. 1(August 2013) 31
www.arpublication.org
In our approach, we have the choice to use a synchronous stream cipher or bloc cipher (AES)
to encrypt the image, while we will encrypt the secret key with an asymmetric algorithm such as
RSA.
Firstable, M generates his secret key to encrypt the image with it, then this secret key will be
encrypted too with a RSA public key ( RSApub-key) to obtain an encrypted secrete key k’ which
will be then inserted in the encrypted image using discrete wavelet transform (DWT) to get at the
end an encrypted watermarked image.
Finally, M send the image to S as shown in figure 6. S then receives the image, extracted the
mark (the encrypted secret key k’) and decrypted it using his RSA private key, So he can decrypt
the image that M send it to him and viewed it.
Fig.7 Encryption and watermarking combination
If M wants to send a new image to S, it will use a new secret key K1 for this new session. The
method will then be identical, but the public and private keys will not be used in the same order.
Although five keys are needed per session, most of them are transparent to users. In fact, the
private key can be associated with the software, and the two parties, it is not useful to know the
secret key that is inserted in the image. However, for each session, the value of the secret key K
must change. Indeed, if the secret key wasn’t changed every person has the software can encrypt
all images.
5. THE EXPERIMENTAL RESULTS
We applied our method to an image size of 64 * 64. First using the synchronous stream cipher
and secondly with the AES block cipher.
In following figures, we’ll show an example of our application with results.
Consider that Alice wants to send an image to Bob. First Bob should generate his public and
private key, and then send the public one to Alice. Figure 8 illustrates the generation of RSA
keys.
8. 32
www.arpublication.org
Fig.9 Generation of RSA keys
Once the keys are generated, click on the button ‘send the public key’ to send the public key
and display the main interface. Figure 10 shows the main interface of the application.
Fig.10 Main interface
In this interface, we choose which method we want to encrypt our image, giving the radio
button to select whether we wish to encrypt by synchronous stream cipher or by block cipher
(AES). The secret key is displayed in the listbox.
The button ‘Encrypt the key by RSA’ is activated to allow encryption for the secret key of the
stream cipher by RSA;The result is displayed in the listbox surrounded below on figure 11.
9. International journal of Computer Networking and Communication (IJCNAC)Vol. 1, No. 1(August 2013) 33
www.arpublication.org
Fig.11 Result of secret key encrypted by RSA
After that Alice will watermark the stream cipher encrypted image by the encrypted secret key
using DWT, so she can send securely the encrypted watermarked image to Bob.
Once Bob got the image, hi will extract the mark (means the encrypted secret key) and
decrypted it using his RSA private key. Figure 12 shows the mark extracted and decrypted.
Fig.12 Extract and decrypt the mark from the watermarked image
After encrypting the image, we have watermarked it with the secret key using wavelet discrete
transform (figure 13.c) with a difference between the stream cipher encrypted image and the
encrypted watermarked image ( PSNR=32.32 db) appears on figure 13.e where we can see the
pixel used for watermarking. For the block cipher, the encrypted-watermarked image is shown on
figure 8.d with a difference (PSNR=41.29 db) illustrate in figure 13.f.
10. 34
www.arpublication.org
After decryption, we can see very well the difference between using synchronous stream
cipher in figure 13.g (PSNR=18.62 db) and the bloc cipher (AES) in figure 13.h with
PSNR=8.09db.
Even after applying a noise for the encrypted watermarked image, we note that the stream
cipher is more robust to noise than the AES encryption with a difference (PSNR = 16.41db) for
decryption stream in figure 13.i and (PSNR = 8.02 db) in figure 13.j for the AES decryption.
(a) (b) (c) (d)
(e)
(f) (g) (h)
(i) (j)
Fig. 13 a) Stream cipher encrypted image, b) Image (a) watermarked, c) Difference between (a) and (b),
d) Image (b) decrypted with synchronous stream cipher, e) AES encrypted image, f) Image (e)
watermarked, g) Difference between (e) and (f), h) Image (f) decrypted with AES, i) i) Difference entre
original image and stream cipher decrypted image, j) Difference between the original and decrypted
image with AES
6. CONCLUSION
In this paper, we present a method combined encryption and watermarking algorithms for
images secure transfer. We choose to encrypt the image with a symmetric algorithm (stream
cipher synchronous and bloc cipher ‘AES’) and encrypt the image with an asymmetric algorithm
(RSA). To embed the encrypted key we use a discrete wavelet transform DWT, we prefer to use
multi resolution field because it resists noising that may occur during the transfer.
From the experimental results, we find that the method of stream ciphers makes the most
optimal final image, while the block cipher does not give good results.
11. International journal of Computer Networking and Communication (IJCNAC)Vol. 1, No. 1(August 2013) 35
www.arpublication.org
7. REFERENCES
[1] W. Puech, J. M. Rodrigues and J.-E. Develay-Morice. “Safe Transfert of Medical Images by
Conjoined Coding: Selective Encryption by AES Using the Stream Cipher Mode OFB and JPEG
Compression.” traitement du signal 2006_volume 23_numéro 6.
[2] S. Lian, Multimedia Content Encryption. CRC Press, 2009.
[3] P. Bas and S. K. et al., “First summary report on hybrid systems,” European Project IST-2002-
07932, ECRYPT - Network of Excellence in Cryptology, Deliverable D.WVL.5, 2005.
[4] N. Merhav, “On joint coding for watermarking and encryption,” IEEE Transactions on
Information Theory 52, January 2006.
[5] S. Lian, Z. Liu, and H. Wang, “Commutative watermarking and encryption for media data,”
Optical Engineering Letters 45, August 2006.
[6] Samir Kumar Bandyopadhyay and Tuhin Utsab Paul and Avishek Raychoudhur. “Invisible Digital
Watermarking Through Encryption » International Journal of Computer Applications (0975 –
8887) Volume 4– No.8, August 2010.
[7] D. Kundur and D. Hatzinakos. A robust digital image watermarking scheme using the wavelet-
based fusion. In IEEE Signal Processing Society 1997 International Conference on Image
Processing (ICIP'97), Santa Barbara, California, October 1997.
[8] J. Herrera-Joancomarti, S. Katzenbeisser, D. Megias, J. Minguillion, A. Pommer, M. Steinebach,
and A. Uhl, .ECRYPT European Network of Excellence in Cryptology, First Summary Report on
Hybrid Systems,. 2005. [Online]. Available: http://www.ecrypt.eu.org/ecrypt1/
documents/D.WVL.5-1.0.pdf.
[9] M.A. Mohamed and A.M. El-Mohandes “Hybrid DCT-DWT Watermarking and IDEA Encryption
of Internet Contents”. IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No
2, January 2012.
[10] Matt J. B. Robshaw, Stream Ciphers Technical Report TR-701, version 2.0, RSA Laboratories,
1995.
[11] Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, Niels Ferguson,
Tadayoshi Kohno, Mike Stay (May 2000). "The Twofish Team's Final Comments on AES
Selection".
[12] J. Daemen and V. Rijmen. The Design of Rijndael. SpringerVerlag New York, Inc. Secaucus, NJ,
USA, 2002.
[13] Pascal Junod et Serge Vaudenay. Une nouvelle famille d'algorithmes de chiffrement par bloc.
Université J. Fourier, Grenoble 2003.
[14] James Nechvatal, Elaine Barker, Lawrence Bassham, William Burr, Morris Dworkin, James Foti,
Roback, « Report on the Development of the Advanced Encryption Standard (AES) » , 2 octobre
2000. Consulté le 8 juin 2009.
[15] R. Anderson, E. Biham and L. Knudsen “The Case for Serpent” 24th March 2000.
[16] Rivest, R.; A. Shamir; L. Adleman (1978). "A Method for Obtaining Digital Signatures and
Public-Key Cryptosystems". Communications of the ACM 21 (2): 120–126.
[17] R.G. van Schyndel, A.Z. Tirkel, and C.F. Osborne, "A digital watermark", ICIP'94, vol. 2, pp. 86-
90, Austin, USA, 1994.
[18] J.J.K.O Ruanaidh, W.J. Dowling, and F.M. Boland, "Watermarking digital images for copryright
protection", IEE Proc.-Vis. Image Signal Process., vol. 143, n° 4, pp. 250-256, 1996.
[19] Mei Jiansheng,, Li Sukang and Tan Xiaomei “A Digital Watermarking Algorithm Based On DCT
and DWT” ISBN 978-952-5726-00-8 (Print), 978-952-5726-01-5 (CD-ROM)Proceedings of the
2009 International Symposium on Web Information Systems and Applications
(WISA’09)Nanchang, P. R. China, May 22-24, 2009, pp. 104-107.
Authors
Youssra LAKRISSI Obtained a master's degree in business
intelligence from the faculty of science and technology, Beni Mellal at
Morocco in 2013. Her research concerns image processing and
cryptography.
12. 36
www.arpublication.org
Mohammed ERRITALI Obtained a master's degree in business
intelligence from the faculty of science and technology, Beni Mellal at
Morocco in 2010. His current interests include developing
specification and design techniques for use within Intelligent Network,
data mining, image processing and cryptography.
He is currently a professor at the Faculty of Science and
Technology, University Sultan Moulay Slimane , and also a member
of the LRI laboratory at the faculty of sciences, Mohamed V Agdal
University, Rabat.
Dr Mohamed FAKIR obtained a degree in Master of Electrical
Engineering from Nagaoka University of Technology in 1991 and a
Ph.D. degree in electrical engineering from the University of Cadi
Ayyad, Morocco. He was a team member in Hitachi Ltd., Japan
between 1991 and 1994. He is currently a professor at the Faculty of
Science and Technology, University Sultan Moulay Slimane,
Morocco.His research concerns the recognition and artificial
intelligence.