Secured Communication and Image Authentication: Embedding Encrypted Text Files into Color Digital Images

Year : 2024 | Volume :02 | Issue : 01 | Page : 10-15
By

    Mahimn Pandya

  1. Ashish Jani

  1. Assistant Professor,, Department of Computer Science, Smt. K. B. Parekh College of Computer Science, Mahuva, Gujrat, India
  2. HOD, Department of computer science and engineering, Navrachna University, Vadodara, Gujrat, India

Abstract

In today’s digital landscape, protecting digital assets, particularly images, is paramount. Researchers have developed various techniques to safeguard these assets, emphasizing their protection and integrity. Simultaneously, steganography plays a crucial role in securely communicating confidential messages. This paper focuses on a dual-purpose technique: watermarking color digital images for protection and embedding secret messages through steganography. This fusion of functionalities represents a significant step in comprehensive asset protection and confidential communication in the digital sphere. Employing invisible watermarking and steganography concealment, this novel approach enhances image security. Cryptography further fortifies both processes, ensuring robust image protection and concealed messaging. The method embeds ASCII- formatted encrypted text into the image file’s binary structure and undergoes rigorous validation to maintain image integrity post-embedding. Rigorous validation using related and contemporary image data underscores the method’s efficacy, affirming its ability to maintain the original image appearance and pixel values post-embedding.

Keywords: Secure Communication, Digital Watermarking, Steganography, Cryptography, Hybrid Approach.

[This article belongs to International Journal of Information Security Engineering(ijise)]

How to cite this article: Mahimn Pandya, Ashish Jani.Secured Communication and Image Authentication: Embedding Encrypted Text Files into Color Digital Images.International Journal of Information Security Engineering.2024; 02(01):10-15.
How to cite this URL: Mahimn Pandya, Ashish Jani , Secured Communication and Image Authentication: Embedding Encrypted Text Files into Color Digital Images ijise 2024 {cited 2024 Apr 05};02:10-15. Available from: https://journals.stmjournals.com/ijise/article=2024/view=140308


References

  1. Mahimn Pandya, Hiren Joshi and Ashish Jani “Text Files Embedment to Digital Grayscale Images as Digital Watermarks and Secret Messages for Steganography”, National Journal of SCI-TECH Research (JSTR) 29-34 Jan 2013
  2. Mahimn Pandya, Hiren Joshi and Ashish Jani “A Novel Digital Watermarking Algorithm using Random Matrix Image.” International Journal of Computer Applications, New York, 18-21, Vol. 61 No 2, Jan 2013
  3. Mahimn Pandya, Hiren Joshi and Ashish Jani “A Bespoke Technique for Secret Messaging”, International Journal of Computer Network and Information Security(IJCNIS) p40-46, Hong Kong, Vol. 5, April-2013
  4. Mahimn Pandya and Ashish Jani “RMI Based Digital Watermarking and ASCII Value Based Steganography : An Analysis” Journal of Emerging Technologies and Innovative Research, An International Open Access Journal, Peer-reviewed, Refereed Journals, Indexed By CiteSeer, Google Scholar, arXiv Vol. 5 Issue7 (2018)
  5. Mahimn Pandya and Ashish Jani “A Novel Algorithm for Information Hiding” International Journal of Advanced Research in Computer Science. p7-10, Vol. 9 Issue 2, (2018)
  6. Mahimn Pandya and Ashish Jani “A Hybrid Approach for Secure Message Communication and Color Image Watermarking” Elixir International Journal Elixir Digital Processing, Index Copernicus, Vol.1 Issue.114 (2018) p49488- 49491
  7. Shen, Yuxin, Chen Tang, Zirui Fan, Tianbo Wu, and Zhenkun Lei. “Blind watermarking scheme for medical and non-medical images copyright protection using the QZ algorithm.” Expert Systems with Applications 241 (2024): 122547.
  8. Palani, Aberna, and Agilandeeswari Loganathan. “Semi-Blind watermarking using convolutional attention-based turtle shell matrix for tamper detection and recovery of medical images.” Expert Systems with Applications 238 (2024)
  9. Devi, K. Jyothsna, Priyanka Singh, Muhammad Bilal, and Anand Nayyar. “Enabling secure image transmission in unmanned aerial vehicle using digital image watermarking with H-Grey optimization.” Expert Systems with Applications 236 (2024)
  10. Nawaz, Saqib Ali, Jingbing Li, Uzair Aslam Bhatti, Muhammad Usman Shoukat, Dekai Li, and Muhammad Ahmad Raza. “Hybrid watermarking algorithm for medical images based on digital transformation and MobileNetV2.” Information Sciences 653 (2024)
  11. Li, Li, Yu Bai, Ching-Chun Chang, Yunyuan Fan, Wei Gu, and Mahmoud “Anti-pruning multi-watermarking for ownership proof of steganographic autoencoders.” Journal of Information Security and Applications 76 (2023)
  12. Meng, Laijin, Xinghao Jiang, and Tanfeng Sun. “A review of coverless steganography.” Neurocomputing (2023)
  13. Singh, Roop, Mukesh Saraswat, Alaknanda Ashok, Himanshu Mittal, Ashish Tripathi, Avinash Chandra Pandey, and Raju “From classical to soft computing based watermarking techniques: A comprehensive review.” Future Generation Computer Systems” 141 (2023): 738-754.
  14. Awasthi, Divyanshu, Anurag Tiwari, Priyank Khare, and Vinay Kumar Srivastava. “A comprehensive review on optimization-based image watermarking techniques for copyright protection.” Expert Systems with Applications (2023)
  15. Eltoukhy, Mohamed Meselhy, Ayman E. Khedr, Mostafa M. Abdel-Aziz, and Khalid M. Hosny. “Robust watermarking method for securing color medical images using Slant-SVD-QFT transforms and OTP encryption.” Alexandria Engineering Journal 78 (2023): 517-529.
  16. Gong, Li-Hua, and Hui-Xin Luo. “Dual color images watermarking scheme with geometric correction based on quaternion FrOOFMMs and LS-SVR.” Optics & Laser Technology 167 (2023)
  17. Zhang, Zheyi, Yinghong Cao, Hadi Jahanshahi, and Jun Mou. “Chaotic color multi-image compression-encryption/LSB data type steganography scheme for NFT transaction security.” Journal of King Saud University-Computer and Information Sciences 35, no. 10 (2023)
  18. Beuve, Nicolas, Wassim Hamidouche, and Olivier Déforges. “Waterlo: Protect images from deepfakes using localized semi-fragile watermark.” In Proceedings of the IEEE/CVF International Conference on Computer Vision, pp. 393-402.
  19. Duan, Shaohua, Yuhan Qian, Junjie Liu, Hanwen Wang, and Xiaoyi Zhou. “Reversible robust  fragile  multi-watermarking  scheme  for  color images.” Multimedia Tools and Applications (2023): 1-25.
  20. Lin, Chia-Chen, Ting-Lin Lee, Ya-Fen Chang, Pei-Feng Shiu, and Bohan Zhang. “Fragile Watermarking for Tamper Localization and Self-Recovery Based on AMBTC and VQ.” Electronics 12, no. 2 (2023)

Regular Issue Subscription Review Article
Volume 02
Issue 01
Received January 17, 2024
Accepted February 5, 2024
Published April 5, 2024