Advertisement

Encryption Based Image Authentication Technique Using Random Circular Insertion and Adjustment (EIATRCIA)

  • Soumit Chowdhury
  • Dipankar Nag
  • Krishnendu Sadhu
  • Nabin Ghoshal
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 199)

Abstract

This paper demonstrates a dynamic encryption based image authentication technique in the spatial domain that hides one authenticating color image inside another carrier color image where the authenticated receiver can only extract this embedded secrete image using the secrete key(s). The EIATRCIA technique actually embeds the secrete image bits into the randomly generated bit positions of each carrier image pixel bytes using the encryption with dynamic secrete key(s). The embedding of four numbers of the secrete image bits into the sub-image blocks of size 2×2 can also be organized in a randomly generated circular list involving encryption associating secrete key(s) and stenographic key. Finally a delicate readjustment in the respective bits of the concerned bit-embedded pixel bytes can minimize the introduced distortion as well. This carrier image after embedding also avoids the visual distortion and the experimental result shows the robustness along with performance of this scheme while embedding.

Keywords

Steganography Image Authentication Digital Watermarking 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Ghoshal, N., Mandal, J.K.: A Novel Technique for Image Authentication in Frequency Domain using Discrete Fourier Transformation Technique (IAFDDFTT). Malaysian Journal of Computer Science 21(1), 24–32 (2008) ISSN 0127-9094Google Scholar
  2. 2.
    Ghoshal, N., Mandal, J.K.: A Bit Level Image Authentication/Secrete Message Transmission Technique (BLIA/SMTT), Association for the Advancement of Modelling & Simulation Technique in Enterprises (AMSE). AMSE Journal of Signal Processing and Pattern Recognition 51(4), 1–13 (2008)Google Scholar
  3. 3.
    Ghoshal, N., Mandal, J.K., et al.: Masking based Data Hiding and Image Authentication Technique (MDHIAT). In: Proceedings of 16th International Conference of IEEE on Advanced Computing and Communications, ADCOM 2008, December 14-17, pp. 119–122. Anna University, Chennai (2008) ISBN: 978-1-4244-2962-2Google Scholar
  4. 4.
    EL-Emam, N.N.: Hiding a large Amount of data with High Security Using Steganography Algorithm. Journal of Computer Science 3(4), 223–232 (2007) ISSN 1549-3636Google Scholar
  5. 5.
    Kutter, M., Petitcolas, F.A.P.: A fair benchmark for image watermarking systems. In: Electronic Imaging 1999, Security and Watermarking of Multimedia Contents, Sans Jose, CA, USA, vol. 3657 (1999)Google Scholar
  6. 6.
    Ahmidi, N., Safabkhsh, R.: A novel DCT-based approach for secure color image watermarking. In: Proc. Int. Conf. Information Technology: Coding and Computing, vol. 2, pp. 709–713 (2004)Google Scholar
  7. 7.
    Bas, P., Biham, N.L., Chassery, J.: Color watermarking using Quaternion Fourier Transformation. In: Proc. ICASSP, Hong Kong, China, pp. 521–524 (2003)Google Scholar
  8. 8.
    Tsui, T.T., Zhang, X.-P., Androutsos, D.: Color Image Watermarking Using Multidimensional Fourier Transformation. IEEE Trans. on Info. Forensics and Security 3(1), 16–28 (2008)CrossRefGoogle Scholar
  9. 9.
    Weber, A.G.: The usc-sipi image database. Signal and Image Processing Institute at the University of Southern California (October 1997), http://sipi.usc.edu/services/database/Database.html
  10. 10.
    Ghoshal, N., Mandal, J.K.: Discrete Fourier transform based Multimedia Color Image Authentication for Wireless Communication (DFTMCIAWC). In: 2nd International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology, Le Royal Meridian Chennai, India (2011) ISBN: 978-1-4577-0787-2/11Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Soumit Chowdhury
    • 1
  • Dipankar Nag
    • 1
  • Krishnendu Sadhu
    • 1
  • Nabin Ghoshal
    • 2
  1. 1.Dept. of Computer Sc. & Engg.Govt. College of Engg. & Ceramic TechnologyKolkataIndia
  2. 2.Dept. of Engg. & Technological StudiesUniversity of KalyaniKalyaniIndia

Personalised recommendations