INFORMATION CHANGE THE WORLD

International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)

Published By: MECS Press

IJCNIS Vol.8, No.3, Mar. 2016

Double Layer Image Security System using Encryption and Steganography

Full Text (PDF, 506KB), PP.27-33


Views:160   Downloads:3

Author(s)

Samreen Sekhon Brar, Ajitpal Brar

Index Terms

Image Security;Image compression;Image steganography;Image encryption;image transfers

Abstract

The image security on internet transfers is the concern of the hour as the breaching attacks into the image databases are rising every year. The hackers take advantage of the stolen personal and important images to fulfill their dangerous and unethical intentions. The image data theft can be used to defame a person on the internet by posting the illegal and unacceptable images of that person (internet user). Hence the images transfers have to be secure to ensure the privacy of the user's image data. In this research, a number of image security systems have been studied to evaluate the research gap. Majority of the existing image security systems are not up to date to protect against the latest breaching attacks. So, we have proposed an effective and robust image security framework particularly designed for the images. The proposed has been designed and implemented using MATLAB. In this research, a hybrid image security framework has been proposed to overcome the problem stated earlier, which will be implemented by combining various techniques together to achieve the image security goal. The techniques included in the combination would beimage compression, cryptography andsteganography. DWT compression has been used, because it is a stronger compression algorithm. The steganographed image would be compressed to reduce its size. Blowfish encryption algorithm would be used for the encryption purposes. It offers maximum throughput (faster) and also energy efficient. Compressed image would be encrypted to enhance the image security. Real image will be hidden into another image. A cluster based steganographic technique will be used. Real image and face image would be analyzed, and the real image would be embedded in those areas of face image, where color schemes of the real image and face image would be most similar. Kmeans or Hierarchical clustering would be used as a clustering technique. An all new comparative analysis technique would be applied to make the comparison between real image and base image on the basis of color patterns.

Cite This Paper

Samreen Sekhon Brar, Ajitpal Brar,"Double Layer Image Security System using Encryption and Steganography", International Journal of Computer Network and Information Security(IJCNIS), Vol.8, No.3, pp.27-33, 2016.DOI: 10.5815/ijcnis.2016.03.04

Reference

[1]NavitaAgarwal, Himanshu Sharma "An Efficient Pixel-shuffling Based Approach to Simultaneously Perform Image Compression, Encryption and Steganography", IJCSMC, vol. 2 issue 5, pp. 376-385, May 2013.

[2]Mohammadi S., Abbasimehr H., "A high level security mechanism for internet polls", ICSPS, vol. 3, pp. 101-105, IEEE, 2010.

[3]Gary C.Kessler, "An Overview of Cryptography: Cryptographic", HLAN, ver. 1, 1999-2014.

[4]Milind Mathur, Ayush Kesarwani, "Comparison between DES, 3DES, RC2, RC6, BLOWFISH and AES", NCNHIT vol. 1 143-148, 2013.

[5]Ashwin S., "Novel and secure encoding and hiding techniques using image steganography: A survey", ICETEEEM, vol. 1, pp. 171-177, IEEE, 2012.

[6]Chanu Y. J, "A short survey on image steganography and steganalysis techniques", NCETAS, vol. 1, pp. 52-55, IEEE, 2012.

[7]Chamkour Singh, Gauravdeep, "Cluster based Image Steganography using Pattern Matching", IJAIR, vol. 2, issue 5, 2013.

[8]Verma O.P., Agarwal R., Dafouti D., "Performance analysis of data encryption algorithms", ICECT, vol. 5, pp. 399-403, IEEE, 2011.

[9]Gary C.Kessler, "An overview of steganography for the computer forensics examinier", vol. 6, no. 3, Forensic science communications, 2011.

[10]Xiangui Kang, Jiwu Huang, "A DWT-DFT Composite Watermarking Scheme Robust to Both Affine Transform and JPEG Compression", ITCSVT, vol. 13, issue 8, pp. 776-786, IEEE, 2003. 

[11]Sonja Grgic, Mislav Grgic, "Performance Analysis of Image Compression Using Wavelets", ITIE, vol. 48, issue 3, pp. 682-695, IEEE, 2001.

[12]Domenico Bloisi and Luca Iocchi, "IMAGE BASED STEGANOGRAPHY AND CRYPTOGRAPHY", Sapienza University of Rome, Italy, 2002.

[13]Morkel, Tayana, Jan HP Eloff, and Martin S. Olivier. "An overview of image steganography." ISSA. 2005.

[14]Jalal Karam, "A New Approach in Wavelet Based Speech Compression", Mathematical Methods, Computational Techniques, Non-Linear Systems, Intelligent Systems, pp. 228-233, 2008.

[15]IngYannSoon, FengZhou, ZhenLi, HaijunLei, Baiying Lei, A robust audio watermarking scheme based on lifting wavelet transform and singular value decomposition, Signal Processing, vol. 92, pp. 1985-2001, Science Direct, 2012.