Digital Image Security: Fusion of Encryption, Steganography and Watermarking
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 5
Abstract
Digital images are widely communicated over the internet. The security of digital images is an essential and challenging task on shared communication channel. Various techniques are used to secure the digital image, such as encryption, steganography and watermarking. These are the methods for the security of digital images to achieve security goals, i.e. confidentiality, integrity and availability (CIA). Individually, these procedures are not quite sufficient for the security of digital images. This paper presents a blended security technique using encryption, steganography and watermarking. It comprises of three key components: (1) the original image has been encrypted using large secret key by rotating pixel bits to right through XOR operation, (2) for steganography, encrypted image has been altered by least significant bits (LSBs) of the cover image and obtained stego image, then (3) stego image has been watermarked in the time domain and frequency domain to ensure the ownership. The proposed approach is efficient, simpler and secured; it provides significant security against threats and attacks.
Authors and Affiliations
Mirza Abdur Razzaq, Riaz Ahmed Shaikh, Mirza Adnan Baig, Ashfaque Ahmed Memon
Process Improvements for Crowdsourced Software Testing
Crowdsourced software testing has been a common practice lately. It refers to the use of crowdsourcing in software testing activities. Although the crowd testing is a collaborative process by nature, there is no availabl...
Model-based Pedestrian Trajectory Prediction using Environmental Sensor for Mobile Robots Navigation
Safety is the most important to the mobile robots that coexist with human. There are many studies that investigate obstacle detection and collision avoidance by predicting obstacles’ trajectories several seconds into the...
Cloud Computing: Pricing Model
Cloud computing is the elemental aspect for online security of computing resources. It helps on-demand dividing of resources and cost between a major number of end users. It provides end users to process, manage, and sto...
XCS with an internal action table for non-Markov environments
To cope with sequential decision problems in non- Markov environments, learning classifier systems using the internal register have been proposed. Since, by utilizing the action part of classifiers, these systems control...
Effective Methods to Improve the Educational Process of Medicine in Bulgaria
The introduction of modern technologies into the educational process of medical students is a challenge of the new era in education, which can increase the success of students and give them confidence in their capabiliti...