Closed Frequent Itemset Mining Approach to Image Security Enhancement

With the rapid development of multimedia applications which involves images, video and audio, security has become an important aspect of modern day digital communication. Various fields like multimedia systems, telemedicine, military communications, medical imaging internet communications etc, are widely based on image security. Our focus in this paper is to propose an algorithm which enhances image security. The algorithm proposed provides two-level security for the images that are transmitted over networks. We are using an existing and novel Data Mining technique, called Closed Frequent Itemset Mining to encode the image. Upon this, we are applying an image security technique called Steganography to hide the very existence of the image whilst being sent. With this higher security levels, an image can be sent securely over any network with the image's existence completely hidden. Two prominent quality metrics are tested: They are Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR). Mean Square Error has been reduced efficiently and Peak Signal to Noise Ratio showed much improvement, which proves that the algorithm not only provides multi-layer security but also preserves the quality of images. The effect of Minimum Support Count and message image size on PSNR has also been observed. Also, their effect on time taken by the algorithm has been observed and plotted.

[1]  T. Bedwal,et al.  An Enhanced and Secure Image Steganographic Technique Using RGB-Box Mapping , 2013 .

[2]  Mohammed J. Zaki,et al.  CHARM: An Efficient Algorithm for Closed Association Rule Mining , 2007 .

[3]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[4]  Mohamed Salim BOUHLEL,et al.  A new scheme of image Watermarking based on 5 / 3 Wavelet decomposition and turbo-code , 2007 .

[5]  Enhanced the security of image steganography through image encryption , 2015, 2015 Annual IEEE India Conference (INDICON).

[6]  Ja-Chen Lin,et al.  Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..

[7]  Jiadong Ren,et al.  Mining Closed Frequent Itemsets in Sliding Window over Data Streams , 2008, 2008 3rd International Conference on Innovative Computing Information and Control.

[8]  Muhammad Shoaib Arif,et al.  Enhancing security of images by Steganography and Cryptography techniques , 2016, 2016 Sixth International Conference on Innovative Computing Technology (INTECH).

[9]  Mohamed Ali Hajjaji,et al.  Cryptography of medical images based on a combination between chaotic and neural network , 2016, IET Image Process..

[10]  Rajendra Bharti,et al.  Lossless and Reversible Data Hiding in Encrypted Images With Public Key Cryptography , 2017, RICE.

[11]  Ganga Holi,et al.  An Overview of Image Security Techniques , 2016 .

[12]  Lee-Ming Cheng,et al.  Improved hiding data in images by optimal moderately-significant-bit replacement , 2001 .

[13]  A. Nag,et al.  An image steganography technique using X-box mapping , 2012, IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012).