A Cryptographic and Watermarking Encryption Technique for Securing and Authentication of Digital Images

Identity management is crucial in cyberspace where infringement of one’s privacy, copy right disputes, theft and other malicious activities are very rampant. There exists a need of ownership identification and authentication of digital images. In solving and contributing to this field, we proposed a cryptographic and watermarking encryption technique for securing and authentication of digital images for identity management. In our approach, we encrypt the data to be embedded into the image before embedding it to the image. We make sure we select a random position in the image based on an embedding key. We make sure the message to be embedded was converted into values that falls in between 0255. This is to avoid it being detected using forensic or steganalytic software. General Terms Security, Cryptography, watermarking, image processing

[1]  Veysel Aslantas,et al.  A new SVD based fragile image watermarking by using genetic algorithm , 2015, International Conference on Graphic and Image Processing.

[2]  S. P. Bansod,et al.  Modified BPCS steganography using Hybrid cryptography for improving data embedding capacity , 2012, 2012 International Conference on Communication, Information & Computing Technology (ICCICT).

[3]  Xinpeng Zhang,et al.  JPEG encryption for image rescaling in the encrypted domain , 2015, J. Vis. Commun. Image Represent..

[4]  Laurent Nana,et al.  A Hybrid Encryption Technique for Securing Biometric Image Data Based on Feistel Network and RGB Pixel Displacement , 2014, SNDS.

[5]  Millie Pant,et al.  An image watermarking scheme in wavelet domain with optimized compensation of singular value decomposition via artificial bee colony , 2015, Inf. Sci..

[6]  Wu-Chih Hu,et al.  Effective image forgery detection of tampered foreground or background image based on image watermarking and alpha mattes , 2015, Multimedia Tools and Applications.

[7]  Amrtha Anand.K,et al.  Lossless and Reversible Data Hiding in Encrypted Images with Public Key Cryptography , 2016 .

[8]  G. Prema,et al.  An enhanced security algorithm for wireless application using RSA and genetic approach , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).

[9]  John T. Sheridan,et al.  Robustness of Double Random Phase Encoding spread-space spread-spectrum watermarking technique , 2015, Signal Process..

[10]  Kalyan Biswas,et al.  A New DWT-SVD Based Image Watermarking Technique By Utilizing The Features Of Human Visual System , 2015 .

[11]  K. Prem Kumar,et al.  Random Grid and Deterministic Visual Cryptography with Enhanced color patterns , 2015, ICARCSET '15.

[12]  Sarbani Palit,et al.  A Selective Bitplane Based Encryption of Grayscale Images with Tamper Detection, Localization and Recovery Based on Watermark , 2015 .

[13]  De Li,et al.  A Spread Spectrum Zero Video Watermarking Scheme based on Dual Transform Domains and Log-Polar Transformation , 2015, MUE 2015.

[14]  Quist-Aphetsi Kester Image Encryption based on the RGB PIXEL Transposition and Shuffling , 2013 .

[15]  Dongming Chen A Feasible Chaotic Encryption Scheme for Image , 2009, 2009 International Workshop on Chaos-Fractals Theories and Applications.

[16]  Rajendra Bharti,et al.  Lossless and Reversible Data Hiding in Encrypted Images With Public Key Cryptography , 2017, RICE.