Abstract
With the advancements in multimedia communications, it has become apparent that there is a bad need to perform image communication with a confidence guarantee. We need to have a guarantee of image integrity at the receiver. Towards this objective, a proposed framework is presented in this paper. This framework comprises self-signature embedding in the transmitted images. The signatures are extracted from image blocks in the Discrete Cosine Transform (DCT) domain and embedded in other blocks in the same domain with a certain weight to avoid deteriorating the resulting image quality. A verification process is performed at the receiver to check whether the content has been modified or not. In addition, image watermarking is also used with DCT and Discrete Wavelet Transform (DWT) algorithms for authentication or verification. Moreover, Double Random Phase Encoding (DRPE) algorithm is used to secure the content of transmitted images. Then, to get a higher level of security for transmitted images, a hybrid technique depending on DCT-based signature embedding and the DRPE algorithm is presented.
Similar content being viewed by others
Data availability
All data are available upon request from the corresponding author.
References
Abdelwahab AA, Hassaan LA (2008) A discrete wavelet transform based technique for image data hiding. In 2008 National Radio Science Conference (pp 1-9). IEEE.
AbdelWahab OF et al (2019) Hiding data in images using steganography techniques with compression algorithms. TELKOMNIKA (Telecommunication Computing Electronics and Control) 17.3:1168–1175
Carnicer A, Montes-Usategui M, Arcos S, Juvells I (2005) Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys. Opt Lett 30(13):1644–1646
Chen J, Zhang Y, Li J, Zhang LB (2018) Security enhancement of double random phase encoding using rear-mounted phase masking. Opt Lasers Eng 101:51–59
Elshamy AM, Rashed AN, Mohamed AENA, Faragalla OS, Mu Y, Alshebeili SA, Abd El-Samie FE (2013) Optical image encryption based on chaotic baker map and double random phase encoding. J Lightwave Technol 31(15):2533–2539
Frauel Y, Castro A, Naughton TJ, Javidi B (2007) Resistance of the double random phase encryption against various attacks. Opt Express 15(16):10253–10265
Hsu CS, Tu SF (2019) Digital watermarking scheme for copyright protection and tampering detection. Int J Inform Technol Sec 11(1)
Hsu CT, Wu JL (1999) Hidden digital watermarks in images. IEEE Trans Image Process 8(1):58–68
Kaur M, Kumar V (2020) A comprehensive review on image encryption techniques. Arch Comput Methods Eng 27(1):15–43
Kaur B, Kaur A, Singh J (2011) Steganographic approach for hiding image in DCT domain. Int J Advan Eng Technol 1(3):72
Kesavan KK, Kumar MR (2011) Optical color image encryption based on Hartley transform and double random phase encoding system. In 2011 3rd international congress on ultra modern telecommunications and control systems and workshops (ICUMT) (pp 1-3). IEEE
Li Q, Wang X, Wang X, Ma B, Wang C, Shi Y (2021) An encrypted coverless information hiding method based on generative models. Inf Sci 553:19–30
Liao X, Qin Z, Ding L (2017) Data embedding in digital images using critical functions. Signal Process Image Commun 58:146–156
Liao X, Guo S, Yin J, Wang H, Li X, Sangaiah AK (2018) New cubic reference table based image steganography. Multimed Tools Appl 77(8):10033–10050
Liu S, Yao H, Gao W (2004) Steganalysis of data hiding techniques in wavelet domain. In international conference on information technology: coding and computing, 2004. Proceedings. ITCC 2004. (Vol. 1, pp 751-754). IEEE.
Morkel T, Eloff JH, Olivier MS (2005) An overview of image steganography. ISSA. 1(2)
Naman H, Hussien N, Al-dabag M, Alrikabi H (2021) Encryption System for Hiding Information Based on Internet of Things. iJIM 15(02). https://doi.org/10.3991/ijim.v15i02.19869
Nassar SS, Ayad NM, Kelash HM, El-Sayed HS, El-Bendary MA, El-Samie A, Faragallah OS (2016) Efficient audio integrity verification algorithm using discrete cosine transform. Int J Speech Technol 19(1):1–8
Nassar SS, Ayad NM, Kelash HM, El-Sayed HS, El-Bendary MA, Abd El-Samie FE, Faragallah OS (2016) Secure wireless image communication using LSB steganography and chaotic baker ciphering. Wirel Pers Commun 91(3):1023–1049
Peng X, Zhang P, Wei H, Yu B (2006) Known-plaintext attack on optical encryption based on double random phase keys. Optics Lett 31(8):1044–1046
Priya S, Santhi B (2019) A novel visual medical image encryption for secure transmission of authenticated watermarked medical images. Mobile networks and applications, 1–8.
Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography. IEEE Sec Privacy 1(3):32–44
Qi X, Wong K (2005) An adaptive DCT-based mod-4 steganographic method. IEEE international conference on image processing 2005 (Vol. 2, pp II-297). IEEE.
Raval K, Bhoomarker R (2013) Unified approach to secure and robust digital watermarking scheme for image communication. Int J Recent Technol Eng (IJRTE) 2(1)
Refregier P, Javidi B (1995) Optical image encryption based on input plane and Fourier plane random encoding. Opt Lett 20(7):767–769
Shaabany A, Jamshidi F (2011) Wavelet domain quantization based video watermarking. Int J Multidiscip Sci Eng 2(4):7–12
Shanthakumari R, Malliga S (2020) Dual layer security of data using LSB inversion image steganography with elliptic curve cryptography encryption algorithm. Multimed Tools Appl 79(5):3975–3991
Situ G, Zhang J (2004) Double random-phase encoding in the Fresnel domain. Opt Lett 29(14):1584–1586
Sravanthi J, Prasad DMK (2011) Robust and secure digital signature for image authentication over wireless channels. Int J Comput Trends Technol 1(3):245–250
Swanson MD, Kobayashi M, Tewfik AH (1998) Multimedia data-embedding and watermarking technologies. Proc IEEE 86(6):1064–1087
Thakur S, Singh AK, Ghrera SP, Elhoseny M (2019) Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimed Tools Appl 78(3):3457–3470
Unnikrishnan G, Singh K (2000) Double random fractional Fourier domain encoding for optical security. Opt Eng 39(11):2853–2859
Unnikrishnan G, Joseph J, Singh K (2000) Optical encryption by double-random phase encoding in the fractional Fourier domain. Opt Lett 25(12):887–889
Wang X, Zhang M (2021) An image encryption algorithm based on new chaos and diffusion values of a truth table. Inf Sci 579:128–149
Wang FH, Pan JS, Jain LC (2009) Digital watermarking techniques, In innovations in digital watermarking techniques (pp 11–26). Springer, Berlin, Heidelberg
Wang X, Feng L, Zhao H (2019) Fast image encryption algorithm based on parallel computing system. Inf Sci 486:340–358
Yang XP, Zhai HC (2005) Optimization of kinoform in double-random-phase encryption. Acta Phys Sin 54(4):1578–1582
Acknowledgements
The authors extend their appreciation to the Deputyship for Research & Innovation, Ministry of Education in Saudi Arabia for funding this research work through the project number ISP23-56.
Funding
The authors extend their appreciation to the Deputyship for Research & Innovation, Ministry of Education in Saudi Arabia for funding this research work through the project number ISP23-56.
Author information
Authors and Affiliations
Contributions
All authors equally contributed.
Corresponding author
Ethics declarations
Ethics approval
All authors contributed and accepted to submit the current work.
Consent for Participate
All authors contributed and accepted to submit the current work.
Consent for publication
All authors accept to submit and publish the submitted work.
Conflict of interest
The authors have neither relevant financial nor non-financial interests to disclose.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Abd El-Hameed, H.A., El-Shafai, W., Hassan, E.S. et al. Utilization of the double random phase encoding algorithm for secure image communication. Multimed Tools Appl 83, 60319–60342 (2024). https://doi.org/10.1007/s11042-023-15036-2
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-15036-2