A Hybrid Cryptographic and Steganographic Security Approach for Identity Management and Security of Digital Images

Privacy and security of image data are of paramount importance in our ever growing internet ecosystem of multimedia applications. Identity and security of image content play a major role in forensics and protection against media property theft. Copyright issues and ownership management as well as source identification within today’s cyberspace are very crucial. In our work, we proposed a hybrid technique of ensuring security of digital images as well as owner Identification by combining cryptographic and steganographic approaches. The steganography was used to embed a secret identification tag into the image which was engaged using a secret key. This was applied directly on the pixel values of the image used. The cryptographic technique was used to encrypt the image to conceal its visual contents. The implementation was done successfully and analysis of the output results was done using MATLAB.

[1]  Chien-Yeh Hsu,et al.  Implementing globally unique identifier architecture in date collection for a health management study in taiwan aboriginal tribe , 2015 .

[2]  Theodore Y. Ts'o,et al.  Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.

[3]  Haitham Badi,et al.  Artificial neural network for steganography , 2014, Neural Computing and Applications.

[4]  Mohammad Sabzinejad Farash,et al.  Cryptanalysis and improvement of ‘an improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks’ , 2015, Int. J. Netw. Manag..

[5]  Theodosis Mourouzis,et al.  Optimizations in algebraic and differential cryptanalysis , 2015 .

[6]  Yuguang Fang,et al.  An ID-based Framework Achieving Privacy and Non-Repudiation in Vehicular Ad Hoc Networks , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[7]  Bruce Schneier,et al.  Surreptitiously Weakening Cryptographic Systems , 2015, IACR Cryptol. ePrint Arch..

[8]  Chang-qing Zhu,et al.  GIS Spatial Data Updating Algorithm Based on Digital Watermarking Technology , 2014, GRMSE.

[9]  Amor Lazzez,et al.  Forensics Investigation of Web Application Security Attacks , 2015 .

[10]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[11]  Hsinchun Chen,et al.  Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace , 2008, TOIS.

[12]  Mamta Juneja,et al.  A Novel Approach for Data Hiding in Color Images Using LSB Based Steganography with Improved Capacity and Resistance to Statistical Attacks , 2015 .

[13]  Haibin Duan,et al.  New progresses in swarm intelligence-based computation , 2015, Int. J. Bio Inspired Comput..

[14]  Hossein Bidgoli,et al.  Handbook of Information Security, Information Warfare, Social, Legal, and International Issues and Security Foundations (Handbook of Information Security) , 2006 .

[15]  Chet Hosmer,et al.  Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols , 2012 .