A Novel Scheme for Image Authentication and Secret Data Sharing

Full Text (PDF, 1038KB), PP.10-18

Views: 0 Downloads: 0

Author(s)

Auqib Hamid Lone 1,* Ab Waheed Lone 1 Moin Uddin 1

1. Department of Computer Science & Engineering, Jamia Hamdard, New Delhi

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2016.09.02

Received: 11 Feb. 2016 / Revised: 15 May 2016 / Accepted: 1 Jul. 2016 / Published: 8 Sep. 2016

Index Terms

Authentication, Data Hiding, LSB method, Image encryption, Generalized RSA

Abstract

Privacy protection is of extreme importance especially in security sensitive environments. Neither cryptography nor steganography comes up with ultimate solution for privacy preservation in open systems. However, combination of steganography and cryptography can greatly increase the security of communication and is usually considered a good practice for securing security driven communication environments. In this paper we propose a novel scheme for image authentication and secret data sharing based on three level security model viz: Compression, steganography and cryptography. Compression optimizes the resource usage, steganography conceals the existence of message and cryptography is used to achieve confidentiality and authentication.

Cite This Paper

Auqib Hamid Lone, Ab Waheed Lone, Moin Uddin, "A Novel Scheme for Image Authentication and Secret Data Sharing", International Journal of Computer Network and Information Security(IJCNIS), Vol.8, No.9, pp.10-18, 2016. DOI:10.5815/ijcnis.2016.09.02

Reference

[1]A. Lone, "Generalized RSA Using 2k Prime Numbers with Secure Key Generation", M. Tech, Jamia Hamdard (Hamdard University), 2016.
[2]B. Kitchenham, O. Pearl Brereton, D. Budgen, M. Turner, J. Bailey and S. Linkman, "Systematic literature reviews in software engineering – A systematic literature review", Information and Software Technology, vol. 51, no. 1, pp. 7-15, 2009.
[3]K. Arya and A. Bandil, "An improved image authentication technique using random-sequence based secret-sharing scheme", 2014 9th International Conference on Industrial and Information Systems (ICIIS), 2014.
[4]Che-Wei Lee and Wen-Hsiang Tsai, "A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image With a Data Repair Capability", IEEE Transactions on Image Processing, vol. 21, no. 1, pp. 207-218, 2012.
[5]T. Ahmad, H. Studiawan, H. Ahmad, R. Ijtihadie and W. Wibisono, "Shared secret-based steganography for protecting medical data", 2014 International Conference on Computer, Control, Informatics and Its Applications (IC3INA), 2014.
[6]T. Tuncer and E. Avci, "A reversible data hiding algorithm based on probabilistic DNA-XOR secret sharing scheme for color images", Displays, vol. 41, pp. 1-8, 2016.
[7]G. Ulutas, M. Ulutas and V. Nabiyev, "Secret image sharing scheme with adaptive authentication strength", Pattern Recognition Letters, vol. 34, no. 3, pp. 283-291, 2013.
[8]T. Nguyen, C. Chang and N. Huynh, "A novel reversible data hiding scheme based on difference-histogram modification and optimal EMD algorithm", Journal of Visual Communication and Image Representation, vol. 33, pp. 389-397, 2015.
[9]Y. Tsai, D. Tsai and C. Liu, "Reversible data hiding scheme based on neighboring pixel differences", Digital Signal Processing, vol. 23, no. 3, pp. 919-927, 2013.
[10]T. Nguyen and C. Chang, "A reversible data hiding scheme based on the Sudoku technique", Displays, vol. 39, pp. 109-116, 2015.
[11]H. Sun, C. Weng, S. Wang and C. Yang, "Data embedding in image-media using weight-function on modulo operations", TECS, vol. 12, no. 2, pp. 1-12, 2013.
[12]M. Deng, T. Bianchi, A. Piva and B. Preneel, "An efficient buyer-seller watermarking protocol based on composite signal representation", Proceedings of the 11th ACM workshop on Multimedia and security - MM&Sec '09, 2009.
[13]W. Hu, M. Li, C. Guo and Y. Ren, "Reversible secret image sharing with steganography and dynamic embedding", Security and Communication Networks, 2012.
[14]P. S., B. S. and P. R., "A Novel Security Scheme for Secret Data using Cryptography and Steganography", International Journal of Computer Network and Information Security, vol. 4, no. 2, pp. 36-42, 2012.