Secured Communication and Image Authentication: Embedding Encrypted Text Files Into Color Digital Images

Year : 2024 | Volume :02 | Issue : 01 | Page : 10-15
By

Mahimn Pandya

Ashish Jani

  1. Assistant Professor Department of Computer Science, Smt. K. B. Parekh College of Computer Science, Mahuva Gujrat India
  2. Head Department of Computer Science and Engineering, Navrachna University, Vadodara Gujrat India

Abstract

In today’s digital landscape, protecting digital assets, particularly images, is paramount. Researchers have developed various techniques to safeguard these assets, emphasizing their protection and integrity. Simultaneously, steganography plays a crucial role in securely communicating confidential messages. This paper focuses on a dual-purpose technique: watermarking color digital images for protection and embedding secret messages through steganography. This fusion of functionalities represents a significant step in comprehensive asset protection and confidential communication in the digital sphere. Employing invisible watermarking and steganography concealment, this novel approach enhances image security. Cryptography further fortifies both processes, ensuring robust image protection and concealed messaging. The method embeds ASCII-formatted encrypted text into the image file’s binary structure and undergoes rigorous validation to maintain image integrity post-embedding. Rigorous validation using related and contemporary image data underscores the method’s efficacy, affirming its ability to maintain the original image appearance and pixel values post-embedding.

Keywords: Secure communication, digital watermarking, steganography, cryptography, hybrid approach

[This article belongs to International Journal of Information Security Engineering(ijise)]

How to cite this article: Mahimn Pandya, Ashish Jani. Secured Communication and Image Authentication: Embedding Encrypted Text Files Into Color Digital Images. International Journal of Information Security Engineering. 2024; 02(01):10-15.
How to cite this URL: Mahimn Pandya, Ashish Jani. Secured Communication and Image Authentication: Embedding Encrypted Text Files Into Color Digital Images. International Journal of Information Security Engineering. 2024; 02(01):10-15. Available from: https://journals.stmjournals.com/ijise/article=2024/view=140308

References

  1. Pandya M, Joshi H, Jani A. Text files embedment to digital grayscale images as digital watermarks and secret messages for steganography. Natl J Sci-Tech Res. 2013; IV(I): 29–34.
  2. Pandya M, Joshi H, Jani A. A novel digital watermarking algorithm using random matrix image. Int J Computer Appl. 2013; 61 (2): 18–21.
  3. Pandya M, Joshi H, Jani A. A bespoke technique for secret messaging. Int J Computer Netw Inform Security. 2013; 5: 40–46.
  4. Pandya M, Jani A. RMI based digital watermarking and ASCII value based steganography: an analysis. J Emerging Technol Innov Res. 2018; 5 (7): 1731–1737.
  5. Pandya M, Jani A. A novel algorithm for information hiding. Int J Adv Res Computer Sci. 2019; 9 (2): 7–10.
  6. Pandya M, Jani A. A hybrid approach for secure message communication and color image watermarking. Elixir Digital Process. 2018; 114: 49488–49491.
  7. Shen Y, Tang C, Fan Z, Wu T, Lei Z. Blind watermarking scheme for medical and non-medical images copyright protection using the QZ algorithm. Expert Syst Appl. 2024; 241: 122547.
  8. Palani A, Loganathan A. Semi-blind watermarking using convolutional attention-based turtle shell matrix for tamper detection and recovery of medical images. Expert Syst Appl. 2024; 238 (Part D): 121903.
  9. Devi KJ, Singh P, Bilal M, Nayyar A. Enabling secure image transmission in unmanned aerial vehicle using digital image watermarking with H-Grey optimization. Expert Syst Appl. 2024; 236: 121190.
  10. Nawaz SA, Li J, Bhatti UA, Shoukat MU, Li D, Raza MA. Hybrid watermarking algorithm for medical images based on digital transformation and MobileNetV2. Inform Sci. 2024; 653: 119810.
  11. Li L, Bai Y, Chang CC, Fan Y, Gu W, Emam M. Anti-pruning multi-watermarking for ownership proof of steganographic autoencoders. J Inform Security Appl. 2023; 76: 103548.
  12. Meng L, Jiang X, Sun T. A review of coverless steganography. Neurocomputing. 2023; 566: 126945.
  13. Singh R, Saraswat M, Ashok A, Mittal H, Tripathi A, Pandey AC, Pal R. From classical to soft computing based watermarking techniques: a comprehensive review. Future Generation Computer Syst. 2023; 141: 738–754.
  14. Awasthi D, Tiwari A, Khare P, Srivastava VK. A comprehensive review on optimization-based image watermarking techniques for copyright protection. Expert Syst Appl. 2023; 242: 122830.
  15. Eltoukhy MM, Khedr AE, Abdel-Aziz MM, Hosny KM. Robust watermarking method for securing color medical images using Slant-SVD-QFT transforms and OTP encryption. Alexandria Eng J. 2023; 78: 517–529.
  16. Gong LH, Luo HX. Dual color images watermarking scheme with geometric correction based on quaternion FrOOFMMs and LS-SVR. Optics Laser Technol. 2023; 167: 109665.
  17. Zhang Z, Cao Y, Jahanshahi H, Mou J. Chaotic color multi-image compression-encryption/LSB data type steganography scheme for NFT transaction security. J King Saud Univ Computer Inform Sci. 2023; 35 (10): 101839.
  18. Beuve N, Hamidouche W, Déforges O. Waterlo: protect images from deepfakes using localized semi-fragile watermark. In: Proceedings of the IEEE/CVF International Conference on Computer Vision, Paris, France, October 2023. pp. 393–402.
  19. Duan S, Qian Y, Liu J, Wang H, Zhou X. Reversible robust fragile  multi-watermarking  scheme  for color images. Multimedia Tools Appl. 2023; 82: 38613–38637.
  20. Lin CC, Lee TL, Chang YF, Shiu PF, Zhang B. Fragile watermarking for tamper localization and self-recovery based on AMBTC and VQ. Electronics. 2023; 12 (2): 415.

Regular Issue Subscription Review Article
Volume 02
Issue 01
Received January 17, 2024
Accepted February 5, 2024
Published April 5, 2024