基于加密和隐写技术的双层图像安全系统(IJCNIS-V8-N3-4)

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

I.J.ComputerNetworkandInformationSecurity,2016,3,27-33PublishedOnlineMarch2016inMECS()DOI:10.5815/ijcnis.2016.03.04Copyright©2016MECSI.J.ComputerNetworkandInformationSecurity,2016,3,27-33DoubleLayerImageSecuritySystemusingEncryptionandSteganographySamreenSekhonBrarRayat-BahraUniversity,Mohali,140301,IndiaEmail:samreensekhon14@gmail.comAjitpalBrarXNSGLOBAL,Mohali,160062,IndiaEmail:brarajit18@gmail.comAbstract—Theimagesecurityoninternettransfersistheconcernofthehourasthebreachingattacksintotheimagedatabasesarerisingeveryyear.Thehackerstakeadvantageofthestolenpersonalandimportantimagestofulfilltheirdangerousandunethicalintentions.Theimagedatatheftcanbeusedtodefameapersonontheinternetbypostingtheillegalandunacceptableimagesofthatperson(internetuser).Hencetheimagestransfershavetobesecuretoensuretheprivacyoftheuser’simagedata.Inthisresearch,anumberofimagesecuritysystemshavebeenstudiedtoevaluatetheresearchgap.Majorityoftheexistingimagesecuritysystemsarenotuptodatetoprotectagainstthelatestbreachingattacks.So,wehaveproposedaneffectiveandrobustimagesecurityframeworkparticularlydesignedfortheimages.TheproposedhasbeendesignedandimplementedusingMATLAB.Inthisresearch,ahybridimagesecurityframeworkhasbeenproposedtoovercometheproblemstatedearlier,whichwillbeimplementedbycombiningvarioustechniquestogethertoachievetheimagesecuritygoal.Thetechniquesincludedinthecombinationwouldbeimagecompression,cryptographyandsteganography.DWTcompressionhasbeenused,becauseitisastrongercompressionalgorithm.Thesteganographedimagewouldbecompressedtoreduceitssize.Blowfishencryptionalgorithmwouldbeusedfortheencryptionpurposes.Itoffersmaximumthroughput(faster)andalsoenergyefficient.Compressedimagewouldbeencryptedtoenhancetheimagesecurity.Realimagewillbehiddenintoanotherimage.Aclusterbasedsteganographictechniquewillbeused.Realimageandfaceimagewouldbeanalyzed,andtherealimagewouldbeembeddedinthoseareasoffaceimage,wherecolorschemesoftherealimageandfaceimagewouldbemostsimilar.KmeansorHierarchicalclusteringwouldbeusedasaclusteringtechnique.Anallnewcomparativeanalysistechniquewouldbeappliedtomakethecomparisonbetweenrealimageandbaseimageonthebasisofcolorpatterns.IndexTerms—ImageSecurity,Imagecompression,Imagesteganography,Imageencryption,imagetransfers.I.INTRODUCTIONDigitalmultimediaisdatacanbedeliveredoverthecomputernetworks,whichispronetothesecuritybreaches.Thecountrieslaunchthespacemissionstogettheinformationabouttheexistingelementsinthespace.[5]Thecountriesdon’twanttheinformationtogetleaked.[11]Sotheremustbesecuritymechanismwhichcanensurethesecurityofinter-spacetransmissions.[3,7]Underthisresearchweareproposingsecuremechanismtosecuretheimagesintheinter-spacecommunications.Asweknowthat,digitaldatacanbecopiedwithoutanylossinqualityandcontent.[14]Thisposesabigproblemfortheprotectionofintellectualpropertyrightsofthecountriesandspaceagenciesownthatdata.Hybridimagesecurityisasolutiontotheproblem.Itincludesacombinationofsteganography,cryptographyandcompression.[1]Steganographyreliesonhidingcovertmessageinunsuspectedmultimediadataandisgenerallyusedinsecretcommunicationbetweenacknowledgedparties.[13]Steganographyisamethodofencryptionthathidesdataamongthebitsofacoverfile,suchasagraphicoranaudiofile.Thetechniquereplacesunusedorinsignificantbitswiththesecretdata.[12]Steganographyisnotasrobusttoattackssincetheembeddeddataisvulnerabletodestruction.Cryptographyistheartofprotectinginformationbytransformingit(encryptingit)intoanunreadableformat,calledciphertext.[11,15]Onlythosewhopossessasecretkeycandecipher(ordecrypt)themessageintoplaintext.[2,4]Encryptedmessagescansometimesbebrokenbycryptanalysis,alsocalledcode-breaking,althoughmoderncryptographytechniquesarevirtuallyunbreakable.[6]Incomputerscienceandinformationtheory,datacompression,sourcecoding,orbit-ratereductioninvolvesencodinginformationusingfewerbitsthantheoriginalrepresentation.[8]Compressioncanbeeitherlossyorlossless.Losslesscompressionreducesbitsbyidentifyingandeliminatingstatisticalredundancy.Noinformationislostinlosslesscompression.Lossycompressionreducesbitsbyidentifyingunnecessaryinformationandremovingit.[10]Theprocessofreducingthesizeofadatafileispopularlyreferredtoasdatacompression,althoughits28DoubleLayerImageSecuritySystemusingEncryptionandSteganographyCopyright©2016MECSI.J.ComputerNetworkandInformationSecurity,2016,3,27-33formalnameissourcecoding(codingdoneatthesourceofthedatabeforeitisstoredortransmitted).[9]Withthefastgrowingnetwork,manypeopleutilizethevariousapplicationstotransferdigitalimagedata.Mostofpeoplesharetheirpersonalimageswithotherusersusingthesocialapplication.Hackingattacksontheseapplicationscancausegreatlossestotheusersecuritywhichcanlowerthenumberofactiveusersandsothebusinesspopularity.[11]Now-a-daysusersaccesstheseapplicationsfromtheirportabledevices(smartphone,tablet,etc.).Topreventthehackingattacksonthosewebormobileapplicationarchitectures,thereisvariousdatasecuritymechanismforimage,videoortextdata.[14]Theseexistingsecuritymechanismsareeitherusingencryp

1 / 7
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功