Advertisement

Image Security Using Triple Key Chaotic Encryption and SPIHT Compression Technique in Steganography

  • Ajay KhuntetaEmail author
  • Preeti Sharma
  • Sunil Pathak
  • Ajit Noonia
Conference paper
  • 43 Downloads
Part of the Algorithms for Intelligent Systems book series (AIS)

Abstract

In recent trend biometric authentication is been used extensively to authenticate the person remotely. So, it is necessary to secure the sensitive secret data by encryption, before transmitting over medium. This paper proposed a stout, highly secure authentication technique based on semantic segmentation, Triple key chaotic encryption and data hiding. If a user wants to be authenticated remotely, then firstly image is segmented to extract head and body parts through semantic segmentation. Second, take A’s fingerprint and encrypt it using Triple key chaotic encryption technique. Furthermore, qualified significant wavelet tree is used to place the encrypted signal in the most significant wavelet coefficient of image. Finally, Inverse Discrete Wavelet Transform is applied to obtain stego image. The output image is further compressed before transmission over wireless medium using Set Partition in Hierarchical Tree compression technique. This technique has good resistance against lossless transmission and compression. The performance measures are Peak signal to noise ratio, correlation index, information entropy and compression ratio.

Keywords

First SPIHT Data secutity Etc. 

References

  1. 1.
    Madero A (2013) Password secured systems and negative authentication. Ph.D. dissertation, Dept. Eng. Manage., Massachusetts Inst. Technol., Cambridge, MA, USA (Online). Available: http://hdl.handle.net/1721.1/90691
  2. 2.
    Pascual A, Miller S (2013) Identity fraud report: data breaches becoming a treasure trove for fraudsters. Javelin Strategy Res., Pleasanton, CA, USA, Tech. Rep. 1/2013Google Scholar
  3. 3.
    Yoon E-J, Yoo K-Y (2013) Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem. J Supercomput 63(1):235–255Google Scholar
  4. 4.
    Chuang M-C, Chen MC (2014) An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics. Expert Syst Appl 41(4):1411–1418Google Scholar
  5. 5.
    Lamport L (1981) Password authentication with insecure communication. Commun ACM 24(11)770–772Google Scholar
  6. 6.
    Stallings W (2010) Cryptography and network security: principles and practice, 5th edn. Prentice-Hall, Upper Saddle River, NJGoogle Scholar
  7. 7.
    Liao I-E, Lee C-C, Hwang M-S (2006) A password authentication scheme over insecure networks. J Comput Syst Sci 72(4):727–740Google Scholar
  8. 8.
    Jakobsson M, Dhiman M (2013) The benefits of understanding passwords. In: Mobile authentication (Springer Briefs in Computer Science). Springer, New York, NY, pp. 5–24Google Scholar
  9. 9.
    Weir M, Aggarwal S, Collins M, Stern H (2010) Testing metrics for password creation policies by attacking large sets of revealed passwords. In: Proceedings of the 17th ACM conference computer, communication and secure, pp 162–175Google Scholar
  10. 10.
    Wang Y-Y, Liu J-Y, Xiao F-X, Dan J (2009) A more efficient and secure dynamic ID-based remote user authentication scheme. Comput Commun 32(4):583–585Google Scholar
  11. 11.
    Khan MK, Kim S-K, Alghathbar K (2011) Cryptanalysis and security enhancement of a ‘more efficient & secure dynamic ID-based remote user authentication scheme’. Comput Commun 34(3):305–309Google Scholar
  12. 12.
    Yoon E-J, Kim S-H, Yoo K-Y (2012) A security enhanced remote user authentication scheme using smart cards. Int J Innov Comput Inf Control 8(5B):3661–3675Google Scholar
  13. 13.
    Madhusudhan R, Mittal RC (2012) Dynamic ID-based remote user password authentication schemes using smart cards: a review. Intell Algorithms Data-Centric Sens Netw 35(4):1235–1248Google Scholar
  14. 14.
    Das AK (2013) A secure and effective user authentication and privacy preserving protocol with smart cards for wireless communications. Netw Sci 2(1–2):12–27Google Scholar
  15. 15.
    Jain AK, Ross A, Prabhakar S (2004) An introduction to biometric recognition. IEEE Trans Circ Syst Video Technol 14(1):4–20Google Scholar
  16. 16.
    Chen P-Y, Lin H-J (2006) A DWT based approach for image steganography. Int J Appl Sci Eng 4(3):275–290Google Scholar
  17. 17.
    Areepongsa S, Syed YF, Kaewkamnerd N, Rao KR (2000) Steganography for a low bit-rate wavelet based image coder. In: Proc. IEEE international conference on image processing, vol 1, pp 597–600Google Scholar
  18. 18.
    Kundur D, Zhao Y, Campisi P (2004) A stenographic framework for dual authentication and compression of high resolution imagery. In: Proceedings of the IEEE international symposium on circuits and systems, vol 2, pp 1–4Google Scholar
  19. 19.
    Hemalatha S, Acharya UD, Renuka A, Kamath PR (2013) A secure color image steganography in transform domain. Int J Crypt Inf Secur 3(1):17–24Google Scholar
  20. 20.
    Rao NN, Thrimurthy P, Babu BR (2009) A novel scheme for digital rights management of images using biometrics. Int J Comput Sci Netw Secur 9(3):157–167Google Scholar
  21. 21.
    Wu CW, Rulkov NF (1993) Studying chaos via 1-0 maps-a tutorial. IEEE Trans Circuits Syst I: Fundam Theor Appl 40(10):707–721Google Scholar
  22. 22.
    Yen C, Guo I (1999) A chaotic neural network for signal encryption/decryption and its VLSI architecture. In: Proceedings of the 10th VLSI Design/CAD symposium, Nan-Tou, Taiwan, August 1999, pp 319–322Google Scholar
  23. 23.
    Doulamis N, Doulamis A, Ntalianis K, Kollias S (2003) An efficient fully unsupervised video object segmentation scheme using an adaptive neural network classifier architecture. IEEE Trans Neural Netw 14(3):616–630Google Scholar
  24. 24.
    Li S, Li W (2000) Shape-adaptive discrete wavelet transforms for arbitrarily shaped visual object coding. IEEE Trans Circuits Syst Video Technol 10(5):725–743Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Ajay Khunteta
    • 1
    Email author
  • Preeti Sharma
    • 1
  • Sunil Pathak
    • 1
  • Ajit Noonia
    • 1
  1. 1.Department of Computer EngineeringPoornima College of EngineeringJaipurIndia

Personalised recommendations