Digital Image Watermarking and Encryption Using DWT and RSA


(*) Corresponding author


Authors' affiliations


DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)

Abstract


In DWT based watermarking technique the cover image is decomposed to its frequency bands, the coefficients in these bands are modified to hide secret messages. The main characteristics of DWT Watermarking are the imperceptibility, capacity and low complexity. However, this technique has some limitations if it is used alone; it will not be efficient in terms of data security. In this paper the aim is to incorporate the DWT technique with the RSA public-key algorithm, to accomplish a high capacity and secure communication system. The difficulty of factoring in the RSA algorithm has made it one of the most powerful cryptosystems. The proposed technique aims to transfer high capacity secure data by embedding it inside the cover image without affecting or degrading the imperceptibility of the cover image. The security, capacity and imperceptibility are the main criteria according to which the performance of the system is judged. Many scenarios with different cover images and secret messages, different sizes and different image types, these scenarios are used to evaluate the performance of the proposed system by computing the PSNR and the corresponding payload sizes. For the system to not show any suspension of secret data that is being transferred, the value of the PSNR should be around 40dB, so a trade off must be made between security, capacity and imperceptibility to find to what extent this system can reach
Copyright © 2013 Praise Worthy Prize - All rights reserved.

Keywords


DWT Watermarking; RSA; Public-Key Cryptograph

Full Text:

PDF


References


E. Cole, Hiding in Plain Sight Steganography and the Art of Covert Communication ( Wiley Composition, 2003).

S.M. Mohidul, R. Debnath, S. K. Alamgir Hossain, DWT Based Digital Watermarking Technique and its Robustness on Image Rotation, Scaling, JPEG compression, Cropping and Multiple Watermarking, in ICICT , pp.246-249, 2007.

A. Al-Haj, Combined DWT-DCT Digital Image Watermarking, Journal of Computer Science, Vol. 3, n. 9, pp. 740-746, 2007.

P. M. Sonsare, S. Sapkal, Stegano-Crypto System for Enhancing Biometric-Feature Security with RSA, in International Conference on Information and Network Technology, Vol. 4, pp.196-200, 2011.

W. Stalling, Cryptography and network security (Pearson education, Prentice Hall, 2011).

B. Furht, E. Muharemagic, D. Socek, Multimedia Encryption And Watermarking ( Springer science, 2005).

Milan S. Shet, Minal Patel, K. Manikantan, S. Ramachandran, DWT Based Feature Extraction Using Normalized Magnitude Based Thresholding and Multilevel Illumination Normalization for Enhanced Face Recognition, (2012) International Review on Computers and Software (IRECOS), 7 (5), pp. 1969-1985.

A. Ouled Zaid, A. Makhloufi, A. Bouallegue, C. Olivier, A. Nait-Ali, Blind Watermarking Integrated to Wavelet Image Coding Scheme, (2008) International Review on Computers and Software (IRECOS) 3 (1), pp. 53-61.

S. Mallat, W. L. Hwang, Singularity Detection and Processing, IEEE Transaction on Information Theory, Vol. 38, n.2, pp.617-643, 1992.

Y. Zhang, Digital Watermarking Technology: A Review, in Future Computer and Communication, International Conference, pp.250-252, 2009.

Z. Bojkovic, D. Milovanovic, Multimedia Contents Security: Watermarking Diversity and Secure Protocols, in Modern Satellite, Cable and Broadcasting Service, 6th International Conference, Vol. 1, pp.377-383, 2003.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2022 Praise Worthy Prize