Digital Image Security: Fusion of Encryption, Steganography and Watermarking
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 5
Abstract
Digital images are widely communicated over the internet. The security of digital images is an essential and challenging task on shared communication channel. Various techniques are used to secure the digital image, such as encryption, steganography and watermarking. These are the methods for the security of digital images to achieve security goals, i.e. confidentiality, integrity and availability (CIA). Individually, these procedures are not quite sufficient for the security of digital images. This paper presents a blended security technique using encryption, steganography and watermarking. It comprises of three key components: (1) the original image has been encrypted using large secret key by rotating pixel bits to right through XOR operation, (2) for steganography, encrypted image has been altered by least significant bits (LSBs) of the cover image and obtained stego image, then (3) stego image has been watermarked in the time domain and frequency domain to ensure the ownership. The proposed approach is efficient, simpler and secured; it provides significant security against threats and attacks.
Authors and Affiliations
Mirza Abdur Razzaq, Riaz Ahmed Shaikh, Mirza Adnan Baig, Ashfaque Ahmed Memon
Hybrid Approach for Detection of Hard Exudates
Diabetic Retinopathy is a severe and widely spread eye disease which can lead to blindness. Hence, early detection of Diabetic Retinopathy is a must. Hard Exudates are the primary sign of Diabetic Retinopathy. Early trea...
An Analysis of Information Technology on Data Processing by using Cobit Framework
Information technology and processes is inter connected, directing and controlling the company in achieving corporate goals through value-added and balancing the risks and benefits of information technology. This study i...
Research on Energy Saving Method for IDC CRAC System based on Prediction of Temperature
Amid the information era, energy consumption of IDC Computer Room Air Conditioning (CRAC) system is becoming increasingly serious. Thus there is growing concern over energy saving and consumption reduction. Based on the...
D-MFCLMin: A New Algorithm for Extracting Frequent Conceptual Links from Social Networks
Massive amounts of data in social networks have made researchers look for ways to display a summary of the information provided and extract knowledge from them. One of the new approaches to describe knowledge of the soci...
Design of Mobile Application for Travelers to Transport Baggage and Handle Check-in Process
In this paper, an Android based application called ‘Baggage Check-in Handling System’ is developed for helping travelers/passengers transport their baggage to the airport and handle the check-in process. It is merging th...