Comparative Study on Watermarking & Image Encryption for Secure Communication

Page 1

INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 5 ISSUE 1 – MAY 2015 - ISSN: 2349 - 9303

Comparative Study on Watermarking & Image Encryption for Secure Communication Dr. 2S. Poornachandra2

Ajna Madanan1

Anna University, ECE dean.iqac.snsce@gmail.com

1

AnnaUniversity, ECE, ajna.madanan@gmail.com

Abstract—Over the past decades, research in security has concentrated on the development of algorithms and protocols for authentication, encryption and integrity of data. Despite tremendous advances, several security problems still afflict system’s. In this android app watermarking and encryption is being applied on images and data. Because of the human visual system’s low sensitivity to small changes and the high flexibility of digital media, anyone can easily make small changes in digital data with low perceptibility. Here watermarking and encryption are being performed in wavelet domain. Here in watermarking, the coefficients of watermarks are being embedded with the coefficients of the original image. Encryption is being done in wavelet domain so that the probability of an intruder trying to access the contents is very much minimized. Thus, this model provides a high level of security. Index Terms— Security, wavelets, watermarking, encryption, intruder.

——————————  ——————————

1 INTRODUCTION

E

xplosive growth in multimedia technology and its applications has escalated the necessity to build secure methods for legal distribution of the digital content. Presently need for protection against unauthorized copying and distribution has increased. Thus, there aroused apprehensions over copyright protection of digital contents. The solution to this problem is digital watermarking, which is the most common and possibly the strongest technique for protecting digital data. Cryptography ensures that the messages are secure from possible ―attacks‖, which are impersonation, eavesdropping etc.

In image watermarking, information is embedded into cover media for proving ownership identification. Various watermarking techniques have been proposed by many authors in the last several years, which include spatial domain and transform domain watermarking. To provide security of the images in the multimedia environment, encryption plays an important role. Image encryption ensures confidential transmission and storage of image over internet. Image encryption has applications in multimedia systems, internet communication, telemedicine, medical imaging, and military communication to name a few.

Watermarking is a method of data embedding and information hiding. In digital watermarking, patterns of bits are inserted into a digital image, video or audio file that helps in identifying the copyright information, i.e. author, rights etc. It is a concept closely related to steganography. Watermarking is considered as a special technique of steganography where one message is embedded in another and the two messages are related to each other in some way.

Steganography and cryptographic methods are used together with wavelets to increase the security of the data while transmitting through networks. A combination of both encryption with steganography allows better private communication. The goal of steganography is to avoid drawing suspicion to the transmission of the secret message.

In digital watermarking a low energy signal is imperceptibly embedded into another signal. The low-energy signal is known as watermark. The main signal in which the watermark is embedded is referred to as cover signal since it covers the watermark. The entity known as watermark key is used for embedding and detecting

In this paper RSA algorithm is being used for encryption. The RSA encryption technique is being named after the inventors Ron Rivest, Adi Shamir, and Len Adleman in 1977. RSA is a public-key cryptography system. This algorithm is based on the difficulty of factorizing large numbers that have two and only two factors (prime numbers). It works on a public key system. Everyone would know the public key. Using public key a user can encrypt data, but cannot decrypt it. The person who possesses the private key can only decrypt it. Theoretically, it may be possible, but it is extremely difficult to generate the private key from the public key; this makes the RSA algorithm a very popular choice in data encryption.

————————————————

 Ajna Madanan is currently pursuing masters degree program in electronics and communication engineering in Anna University, India, PH8220829679. E-mail: ajna.madanan@gmail.com  V.J. Subashini is currently Associate Professor in Computer Applications in AnnaUniversity, India, PH-9444057965. E-mail: vjsubashini@yahoo.com  Dr.S. Poornachandra is currently the dean /IQAC in electronics and communication engineering in Anna University, India, PH-8643844943. Email: dean.iqac.snsce@gmail.com

watermark signal.

1


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.