A Hybrid Cryptographic and Digital Watermarking Technique for Securing Digital Images based on a Generated Symmetric Key

high increase in the transmission of digital data over secured and unsecured communications channels poses a lot of security and privacy concerns to both the transmitter and the receiver. Many operations engaged today in urban and warfare, be they for construction, monitory of plants, high voltage lines, military, police, fire service, intelligence etc. engages the use of surveillance systems that transmit sensitive data to and fro the command centre to the remote areas and this data in transmission needs to be secured. In this paper, we proposed a hybrid cryptographic and digital watermarking technique for securing digital images based on a Generated Symmetric Key. The cryptographic encryption technique made use of both pixel displacement and pixel encryption in securing the images that are to be stored or transmitted across secured and unsecured communications. The digital watermarking technique was used to authenticate the image. The programming and implementation was done using MATLAB.

[1]  Manoj Kumar,et al.  Robust Digital Video Watermarking using Reversible Data Hiding and Visual Cryptography , 2013, 24th IET Irish Signals and Systems Conference (ISSC 2013).

[2]  R. Latif,et al.  Secure transmission of medical images by watermarking technique , 2012, 2012 IEEE International Conference on Complex Systems (ICCS).

[3]  Saadeh Sweidan,et al.  Hardware Design and Implementation of ElGamal Public-Key Cryptography Algorithm , 2010, Inf. Secur. J. A Glob. Perspect..

[4]  Bin Wang,et al.  On the fast algebraic immunity of even-variable rotation symmetric Boolean functions , 2012, 2012 14th International Conference on Advanced Communication Technology (ICACT).

[5]  Chip Elliott,et al.  Quantum cryptography in practice , 2003, SIGCOMM '03.

[6]  Song Y. Yan Computational Number Theory and Modern Cryptography , 2012 .

[7]  Rajendra K. Sharma,et al.  Identity-Based Cryptography Techniques and Applications (A Review) , 2013, 2013 5th International Conference on Computational Intelligence and Communication Networks.

[8]  Abolfazl Falahati,et al.  A secure variant of the Hill Cipher , 2009, 2009 IEEE Symposium on Computers and Communications.

[9]  Xinxin Niu,et al.  A Robust Digital Watermarking Scheme and Its Application in Certificate Verification , 2009, 2009 International Conference on Measuring Technology and Mechatronics Automation.

[10]  Pei-Yu Lin,et al.  Analyze the Digital Watermarking Security Demands for the Facebook Website , 2012, 2012 Sixth International Conference on Genetic and Evolutionary Computing.

[11]  Bo Zhang,et al.  DWTC: A Dual Watermarking Scheme Based on Threshold Cryptography for Web Document , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).

[12]  H. Nyeem,et al.  On the robustness and security of digital image watermarking , 2012, 2012 International Conference on Informatics, Electronics & Vision (ICIEV).

[13]  B. Padhmavathi,et al.  An effective blind watermarking scheme for protecting rightful ownership of digital images , 2009, TENCON 2009 - 2009 IEEE Region 10 Conference.

[14]  Jonathan Bishop,et al.  Representations of 'trolls' in mass media communication: a review of media-texts and moral panics relating to 'internet trolling' , 2014, Int. J. Web Based Communities.

[15]  Mehdi Semsarzadeh,et al.  Tampering Detection in Compressed Digital Video Using Watermarking , 2014, IEEE Transactions on Instrumentation and Measurement.

[16]  Laurent Nana,et al.  A novel cryptographic encryption technique of video images using quantum cryptography for satellite communications , 2013, 2013 International Conference on Adaptive Science and Technology.

[17]  Musheer Ahmad,et al.  Securing multimedia colour imagery using multiple high dimensional chaos-based hybrid keys , 2014, Int. J. Commun. Networks Distributed Syst..

[18]  Ibrahim Kamel,et al.  Distortion-Free Watermarking Scheme for Wireless Sensor Networks , 2009, 2009 International Conference on Intelligent Networking and Collaborative Systems.

[19]  Huiping Guo,et al.  Digital image watermarking for ownership verification , 2003 .

[20]  Chi-Man Pun,et al.  Digital Image Watermarking with Blind Detection for Copyright Verification , 2008, 2008 Congress on Image and Signal Processing.

[21]  Laurent Nana,et al.  A Hybrid Cryptographic and Digital Watermarking Technique for Securing Digital Images , 2014, ICONS 2014.

[22]  Sajal K. Das,et al.  Handbook on Securing Cyber-Physical Critical Infrastructure , 2012 .

[23]  N. Bhargava,et al.  Digital image authentication system based on digital watermarking , 2012, 2012 International Conference on Radar, Communication and Computing (ICRCC).

[24]  Emmanuel Bresson,et al.  Provably secure authenticated group Diffie-Hellman key exchange , 2007, TSEC.

[25]  S. Roy,et al.  Robust video watermarking scheme based on visual cryptography , 2012, 2012 World Congress on Information and Communication Technologies.

[26]  Burton S. Kaliski IEEE P1363: A Standard for RSA, Diffie-Hellman, and Elliptic-Curve Cryptography (Abstract) , 1996, Security Protocols Workshop.

[27]  Q. Saeed,et al.  Mathematical Hard Problems in Modern Public-Key Cryptosystem , 2006, 2006 International Conference on Emerging Technologies.

[28]  Junaid Gilani,et al.  Using Digital Signature Standard Algorithm to Incorporate Non-invertibility in Private Digital Watermarking Techniques , 2009, 2009 10th ACIS International Conference on Software Engineering, Artificial Intelligences, Networking and Parallel/Distributed Computing.

[29]  Stelvio Cimato,et al.  Visual Cryptography Based Watermarking: Definition and Meaning , 2012, IWDW.

[30]  Abdulmotaleb El Saddik,et al.  Combining cryptography and watermarking to secure revocable iris templates , 2011, 2011 IEEE International Instrumentation and Measurement Technology Conference.

[31]  Shing-Chi Cheung,et al.  The Use of Digital Watermarking for Intelligence Multimedia Document Distribution , 2008, J. Theor. Appl. Electron. Commer. Res..