Skip to main content

Secure Communication Using Digital Watermarking with Encrypted Text Hidden in an Image

  • Conference paper
  • First Online:
Security in Computing and Communications (SSCC 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 536))

Included in the following conference series:

Abstract

Increased data transmission through the network has led to the need for greater security in order to protect against different attacks. To transfer data safely, there are many techniques in use, such as digital watermarking, fingerprinting, cryptography, digital signature and steganography. The aim of this paper is to propose a method to send text data securely over the network using digital watermarking, steganography and cryptography techniques together in combination, to provide greater security. First, the cover image will be compressed using JPEG Compression Algorithm. The message to be sent is then encrypted using the improved RSA algorithm. Then the encrypted message bits and the bits of watermark image are embedded into the compressed cover image.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Rosaline, S.I., Rengarajaswamy, C.: A Steganographic substitution technique using APPM for encrypted pixels. In: International Conference on Information Communication and Embedded Systems (ICES), 21–22 February 2013. IEEE Explore (2013)

    Google Scholar 

  2. Bhalla, J.S., Nagrath, P.: Nested digital image watermarking technique using blowfish encryption algorithm. Int. J. Sci. Res. Publ. 3(4), 1–6 (2013)

    Google Scholar 

  3. Singh, A., Malik, S.: Securing data by using cryptography with steganography. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(5), 404–409 (2013). http://www.ijarcsse.com

    Google Scholar 

  4. Tyagi, V., kumar, A., Patel, R., Tyagi, S., Gangwar, S.S.: Image steganography using least significant bit with cryptography. J. Glob. Res. Comput. Sci. 3(3), 53–55 (2012). http://www.jgrcs.info

    Google Scholar 

  5. Abikoye Oluwakemi, C., Adewole Kayode, S., Oladipupo Ayotunde, J.: Efficient data hiding system using cryptography and steganography. Int. J. Appl. Inf. Syst. 4(11), 6–11 (2012). http://www.ijais.org

    Google Scholar 

  6. Bandyopadhyay, S.K., Paul, T.U., Raychoudhury, A.: Invisible digital watermarking through encryption. Int. J. Comput. Appl. 4(8), 18–20 (2010)

    Google Scholar 

  7. Jaseena, K.U., John, A.: Text watermarking using combined image and text for authentication and protection. Int. J. Comput. Appl. 20(4), 8–13 (2011)

    Google Scholar 

  8. Agrawal, D., Gupta, V., Mehta, G.: Digital watermarking technique using discrete cosine transform. Int. J. Eng. Innov. Res. 2(1), 9–14 (2013)

    Google Scholar 

  9. Thapa, M., Sandeep Kumar Sood, Meenakshi Sharma, A.P.: Digital image watermarking technique based on different attacks. International Journal of Advanced Computer Science and Applications, Vol. 2, No. 4, pp. 14–19 (2011)

    Google Scholar 

  10. Ghazy, R.A., Amoon, M., Abdallah, H.A., El-Fishawy, N.A., Hadhoud, M.M., Dessouky, M.I., Alshebeili, S.A., Abd El-Samie, F.E.: Block based embedding of encrypted watermarks using singular value decomposition. Optik 125(20), 6299–6304 (2014)

    Article  Google Scholar 

  11. Singh, A., Gahlawat, M.: Secure data transmission using watermarking and image compression. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 2(5), 1705–1724 (2013)

    Google Scholar 

  12. Lin, S.D., Shie, S.-C., Guo, J.Y.: Improving the robustness of DCT-based image watermarking against JPEG compression. Comput. Stan. Interfaces 32(1–2), 54–60 (2010)

    Article  Google Scholar 

  13. Choudhary, V., Praveen, N.: Enhanced Rsa Cryptosystem Based On Three Prime Numbers. Int. J. Innovative Sci. Eng. Technol 1(10), pp. 753–757 (2014). ISSN 2348 – 7968

    Google Scholar 

  14. Swaminathan, A., Agarwal, G.: A Comparative Study Of Image Compression Methods, Digital Image Processing

    Google Scholar 

  15. Nizar, F., Latheef, F., Jamal, A.: RSA based encrypted data embedding using APPM. Int. J. Eng. Trends Technol. 9(15), 777–782 (2014)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to M. Sundari , P. B. Revathi or S. Sumesh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Sundari, M., Revathi, P.B., Sumesh, S. (2015). Secure Communication Using Digital Watermarking with Encrypted Text Hidden in an Image. In: Abawajy, J., Mukherjea, S., Thampi, S., Ruiz-Martínez, A. (eds) Security in Computing and Communications. SSCC 2015. Communications in Computer and Information Science, vol 536. Springer, Cham. https://doi.org/10.1007/978-3-319-22915-7_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-22915-7_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-22914-0

  • Online ISBN: 978-3-319-22915-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics