Key Modulation Technique for Secure Data Transfer Using Image Encryption

Authors

  • Kavya M N*1  Student, Department of information science and engineering, GSSSIETW, Mysuru, Karnataka, India
  • Sudha M *2  Student, Department of information science and engineering, GSSSIETW, Mysuru, Karnataka, India
  • Vaishnavi S*3  Student, Department of information science and engineering, GSSSIETW, Mysuru, Karnataka, India
  • Chaya P #4  Assistant professor, Department of information science and engineering,GSSSIETW, Mysuru, Karnataka, India

Keywords:

Reversible image data hiding (RIDH), Support Vector Machine(SVM) and Least Significant Bit (LSB).

Abstract

This work proposes a reversible image data hiding (RIDH) scheme over the encrypted domain. The confidential or important information, which sent in non-encrypted form, there might be a chance of misuse cases. To avoid this, secret data has to be encrypted while sending over network and hiding secret data into carrier so that the existence of encrypted data has to be invisible in order to convey secret message confidentially. The data embedding is achieved through a public key modulation mechanism. At the decoder side, a powerful two-class SVM classifier is designed to distinguish encrypted and non-encrypted image blocks, allowing us to jointly decode the embedded message and the original image signal. Compared with the state-of-the-art, the proposed approach provides higher embedding capacity and is able to perfectly reconstruct the original image as well as the embedded message.

References

  1. “Separable Reversible Data Hiding in Encrypted Images Based on Two-Dimensional Histogram Modification”, Dawn Xu, Kai Chen, Ranging Wang, and Shubing Su.
  2. “Techniques for Secure Data Transfer”, Jeffery Gardner, Jr.
  3. “Efficient LSB Substitution for Interpolation based Reversible Data Hiding Scheme”, Md. Abdul Waheed,HussainNyeem.
  4. “Improved Reversible Data Hiding in Encrypted Images using Histogram Modification”, Shuang Yi, Yicong Zhou.
  5. “A New Method of Reversible on Compressed Gray-Level Histogram Shifting”, TanwiBiswas, Md. Mehdi Hasan, TanoyDebnath.
  6. “Image Steganography on Color Image using SVD and RSA with 2-1-4-LSB Technique”, Sanjay Yadav, Prof.Anand. K.Tripathi, Pradeep Yadav.
  7. “Comparative Study of Different Reversible Image Data Hiding Techniques”, Anisha Jose, Mary Mareena, Saritha K.
  8. “Substitution Steganography with Security Improved By Chaotic Image Encryption”, Jakub Oravec and Jan Turan.
  9. “An Imperceptible LSB Image Hiding on Edge Region Using DES Encryption”, JakubEdi Jaya Kusuma, Oktaviana Rena Indriani, Christy Atika Sari, EkoHariRachmawan.
  10. “Improvisation of security in image Steganography using DWT, Huffman Encoding & RC4 based LSB Embedding”, PalakMahajanand Heena Gupta.
  11. “High-Security Data Hiding Using Image Cropping and LSB Least Significant Bit Steganography”, Khalid A. Al-Afandy, El-Sayed M. EL-Rabaie, Osama S. Faragallah, Ahmed ELmhalawy, Gh. M. El-Banby.
  12. “An Advanced Diffie-Hellman Approach to image steganography”, Shreyank N Gowda.
  13. “Secure Reversible Data Hiding with Image Encryption”, KB BiniAnd R. Sreejith.
  14. “Advancement In Reversible Data Hiding Techniques: Review”, NamitaTiwariAnd Abha Singh Sardar.
  15. “Automatic attendance management system using face detection”, TanwiBiswas, Md. Mehdi Hasan, TanoyDebnath.
  16. “Secure Reversible Data Hiding Over Encrypted Domain via Key Modulation", Jiantao Zhou, Xiaoming Liu, Li Dong and Oscar C. Au.
  17. “Reversible Data Hiding for Security Applications”, BaijFirdous and S Bhavani.
  18. “Data Security Using Image Steganography and Weighing its Techniques", Pritam Kumar, Chetna Kumar, Prieeyanshi and Jaya Bhushan.
  19. “A Novel Compressed Domain Technique of Reversible Steganography”, Mahmud Hasan, Kamuruddin Md. Nour, Tanzeem Bin Noor, and Monotosh Roy.
  20. “Reversible Data Hiding In Encrypted Image”, Xinpeng Zhang.

Downloads

Published

2018-05-08

Issue

Section

Research Articles

How to Cite

[1]
Kavya M N*1,Sudha M *2,Vaishnavi S*3,Chaya P #4, " Key Modulation Technique for Secure Data Transfer Using Image Encryption, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 6, pp.469-474, May-June-2018.