Secured Communication and Image Authentication: Embedding Encrypted Text Files into Color Digital Images

[{“box”:0,”content”:”[if 992 equals=”Open Access”]

n

Open Access

n

[/if 992]n

n

Year : April 5, 2024 at 5:58 pm | [if 1553 equals=””] Volume :02 [else] Volume :02[/if 1553] | [if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] : 01 | Page : –

n

n

n

n

n

n

By

n

    n t

    [foreach 286]n

    n

    Mahimn Pandya, Ashish Jani

  1. [/foreach]

    n

n

n[if 2099 not_equal=”Yes”]n

    [foreach 286] [if 1175 not_equal=””]n t

  1. Assistant Professor,, HOD, Department of Computer Science, Smt. K. B. Parekh College of Computer Science, Mahuva, Department of computer science and engineering, Navrachna University, Vadodara, Gujrat, Gujrat, India, India
  2. n[/if 1175][/foreach]

[/if 2099][if 2099 equals=”Yes”][/if 2099]nn

n

Abstract

nIn today’s digital landscape, protecting digital assets, particularly images, is paramount. Researchers have developed various techniques to safeguard these assets, emphasizing their protection and integrity. Simultaneously, steganography plays a crucial role in securely communicating confidential messages. This paper focuses on a dual-purpose technique: watermarking color digital images for protection and embedding secret messages through steganography. This fusion of functionalities represents a significant step in comprehensive asset protection and confidential communication in the digital sphere. Employing invisible watermarking and steganography concealment, this novel approach enhances image security. Cryptography further fortifies both processes, ensuring robust image protection and concealed messaging. The method embeds ASCII- formatted encrypted text into the image file’s binary structure and undergoes rigorous validation to maintain image integrity post-embedding. Rigorous validation using related and contemporary image data underscores the method’s efficacy, affirming its ability to maintain the original image appearance and pixel values post-embedding.

n

n

n

Keywords: Secure Communication, Digital Watermarking, Steganography, Cryptography, Hybrid Approach.

n[if 424 equals=”Regular Issue”][This article belongs to International Journal of Information Security Engineering(ijise)]

n

[/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in International Journal of Information Security Engineering(ijise)][/if 424][if 424 equals=”Conference”]This article belongs to Conference [/if 424]

n

n

n

How to cite this article: Mahimn Pandya, Ashish Jani Secured Communication and Image Authentication: Embedding Encrypted Text Files into Color Digital Images ijise April 5, 2024; 02:-

n

How to cite this URL: Mahimn Pandya, Ashish Jani Secured Communication and Image Authentication: Embedding Encrypted Text Files into Color Digital Images ijise April 5, 2024 {cited April 5, 2024};02:-. Available from: https://journals.stmjournals.com/ijise/article=April 5, 2024/view=0

n


n[if 992 equals=”Open Access”] Full Text PDF Download[else] nvar fieldValue = “[user_role]”;nif (fieldValue == ‘indexingbodies’) {n document.write(‘Full Text PDF‘);n }nelse if (fieldValue == ‘administrator’) { document.write(‘Full Text PDF‘); }nelse if (fieldValue == ‘ijise’) { document.write(‘Full Text PDF‘); }n else { document.write(‘ ‘); }n [/if 992] [if 379 not_equal=””]n

Browse Figures

n

n

[foreach 379]n

n[/foreach]n

nn

n

n[/if 379]n

n

References

n[if 1104 equals=””]n

  1. Mahimn Pandya, Hiren Joshi and Ashish Jani “Text Files Embedment to Digital Grayscale Images as Digital Watermarks and Secret Messages for Steganography”, National Journal of SCI-TECH Research (JSTR) 29-34 Jan 2013
  2. Mahimn Pandya, Hiren Joshi and Ashish Jani “A Novel Digital Watermarking Algorithm using Random Matrix Image.” International Journal of Computer Applications, New York, 18-21, Vol. 61 No 2, Jan 2013
  3. Mahimn Pandya, Hiren Joshi and Ashish Jani “A Bespoke Technique for Secret Messaging”, International Journal of Computer Network and Information Security(IJCNIS) p40-46, Hong Kong, Vol. 5, April-2013
  4. Mahimn Pandya and Ashish Jani “RMI Based Digital Watermarking and ASCII Value Based Steganography : An Analysis” Journal of Emerging Technologies and Innovative Research, An International Open Access Journal, Peer-reviewed, Refereed Journals, Indexed By CiteSeer, Google Scholar, arXiv Vol. 5 Issue7 (2018)
  5. Mahimn Pandya and Ashish Jani “A Novel Algorithm for Information Hiding” International Journal of Advanced Research in Computer Science. p7-10, Vol. 9 Issue 2, (2018)
  6. Mahimn Pandya and Ashish Jani “A Hybrid Approach for Secure Message Communication and Color Image Watermarking” Elixir International Journal Elixir Digital Processing, Index Copernicus, Vol.1 Issue.114 (2018) p49488- 49491
  7. Shen, Yuxin, Chen Tang, Zirui Fan, Tianbo Wu, and Zhenkun Lei. “Blind watermarking scheme for medical and non-medical images copyright protection using the QZ algorithm.” Expert Systems with Applications 241 (2024): 122547.
  8. Palani, Aberna, and Agilandeeswari Loganathan. “Semi-Blind watermarking using convolutional attention-based turtle shell matrix for tamper detection and recovery of medical images.” Expert Systems with Applications 238 (2024)
  9. Devi, K. Jyothsna, Priyanka Singh, Muhammad Bilal, and Anand Nayyar. “Enabling secure image transmission in unmanned aerial vehicle using digital image watermarking with H-Grey optimization.” Expert Systems with Applications 236 (2024)
  10. Nawaz, Saqib Ali, Jingbing Li, Uzair Aslam Bhatti, Muhammad Usman Shoukat, Dekai Li, and Muhammad Ahmad Raza. “Hybrid watermarking algorithm for medical images based on digital transformation and MobileNetV2.” Information Sciences 653 (2024)
  11. Li, Li, Yu Bai, Ching-Chun Chang, Yunyuan Fan, Wei Gu, and Mahmoud “Anti-pruning multi-watermarking for ownership proof of steganographic autoencoders.” Journal of Information Security and Applications 76 (2023)
  12. Meng, Laijin, Xinghao Jiang, and Tanfeng Sun. “A review of coverless steganography.” Neurocomputing (2023)
  13. Singh, Roop, Mukesh Saraswat, Alaknanda Ashok, Himanshu Mittal, Ashish Tripathi, Avinash Chandra Pandey, and Raju “From classical to soft computing based watermarking techniques: A comprehensive review.” Future Generation Computer Systems” 141 (2023): 738-754.
  14. Awasthi, Divyanshu, Anurag Tiwari, Priyank Khare, and Vinay Kumar Srivastava. “A comprehensive review on optimization-based image watermarking techniques for copyright protection.” Expert Systems with Applications (2023)
  15. Eltoukhy, Mohamed Meselhy, Ayman E. Khedr, Mostafa M. Abdel-Aziz, and Khalid M. Hosny. “Robust watermarking method for securing color medical images using Slant-SVD-QFT transforms and OTP encryption.” Alexandria Engineering Journal 78 (2023): 517-529.
  16. Gong, Li-Hua, and Hui-Xin Luo. “Dual color images watermarking scheme with geometric correction based on quaternion FrOOFMMs and LS-SVR.” Optics & Laser Technology 167 (2023)
  17. Zhang, Zheyi, Yinghong Cao, Hadi Jahanshahi, and Jun Mou. “Chaotic color multi-image compression-encryption/LSB data type steganography scheme for NFT transaction security.” Journal of King Saud University-Computer and Information Sciences 35, no. 10 (2023)
  18. Beuve, Nicolas, Wassim Hamidouche, and Olivier Déforges. “Waterlo: Protect images from deepfakes using localized semi-fragile watermark.” In Proceedings of the IEEE/CVF International Conference on Computer Vision, pp. 393-402.
  19. Duan, Shaohua, Yuhan Qian, Junjie Liu, Hanwen Wang, and Xiaoyi Zhou. “Reversible robust  fragile  multi-watermarking  scheme  for  color images.” Multimedia Tools and Applications (2023): 1-25.
  20. Lin, Chia-Chen, Ting-Lin Lee, Ya-Fen Chang, Pei-Feng Shiu, and Bohan Zhang. “Fragile Watermarking for Tamper Localization and Self-Recovery Based on AMBTC and VQ.” Electronics 12, no. 2 (2023)

nn[/if 1104][if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
  2. n[/foreach]

n[/if 1104]

nn


nn[if 1114 equals=”Yes”]n

n[/if 1114]

n

n

[if 424 not_equal=””]Regular Issue[else]Published[/if 424] Subscription Review Article

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n[if 2146 equals=”Yes”]

[/if 2146][if 2146 not_equal=”Yes”]

[/if 2146]n

n

n

Volume 02
[if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] 01
Received January 17, 2024
Accepted February 5, 2024
Published April 5, 2024

n

n

n

n

n

n

nn function myFunction2() {n var x = document.getElementById(“browsefigure”);n if (x.style.display === “block”) {n x.style.display = “none”;n }n else { x.style.display = “Block”; }n }n document.querySelector(“.prevBtn”).addEventListener(“click”, () => {n changeSlides(-1);n });n document.querySelector(“.nextBtn”).addEventListener(“click”, () => {n changeSlides(1);n });n var slideIndex = 1;n showSlides(slideIndex);n function changeSlides(n) {n showSlides((slideIndex += n));n }n function currentSlide(n) {n showSlides((slideIndex = n));n }n function showSlides(n) {n var i;n var slides = document.getElementsByClassName(“Slide”);n var dots = document.getElementsByClassName(“Navdot”);n if (n > slides.length) { slideIndex = 1; }n if (n (item.style.display = “none”));n Array.from(dots).forEach(n item => (item.className = item.className.replace(” selected”, “”))n );n slides[slideIndex – 1].style.display = “block”;n dots[slideIndex – 1].className += ” selected”;n }n”}]