Skip to main content
Top

09-03-2023 | Focus

A hybrid multimedia image encryption technique using singular value decomposition-linear sparsity regularization (SVD-LSR)

Authors: M. Hema, S. Prayla Shyry

Published in: Soft Computing

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The benefits and drawbacks of the SVD-based multimedia image watermarking system are discussed in this paper. To get a suitable video frame for embedding a watermark in this study, key frame selection is initially affected to the video sequence. Prior to embedding, the grayscale watermark image is distorted using the Fibonacci–Lucas image transformation. Instead of using Singular Value Matrixes (SVM), the suggested approach embeds the key elements of the watermark picture into host image. This work is an effective hybrid watermarking technique for protecting the copyright of multimedia images. Singular Value Decomposition, Discrete Cosine Transform, and Discrete Wavelet Transform are combined in this method (SVD). The processed multimedia image needs to be secured. The method suggested in this paper provides more security than most of the methods suggested in the survey. Experimental inferences have verified that the avalanche effect of the suggested architecture is effective.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
go back to reference Abas N, Dilshad S, Khalid A, Saleem MS, Khan N (2020) Power quality improvement using dynamic voltage restorer. IEEE Access 8:164325–164339 CrossRef Abas N, Dilshad S, Khalid A, Saleem MS, Khan N (2020) Power quality improvement using dynamic voltage restorer. IEEE Access 8:164325–164339 CrossRef
go back to reference Abu EM, Ramírez-González G, Elnasr OM, Shawkat SA, Arunkumar N, Farouk A (2018) Secure medical data transmission model for IoT-based healthcare systems. IEEE Access 6(1):1 Abu EM, Ramírez-González G, Elnasr OM, Shawkat SA, Arunkumar N, Farouk A (2018) Secure medical data transmission model for IoT-based healthcare systems. IEEE Access 6(1):1
go back to reference Aliakhmet K, Jame AP (2019) Temporal G-neighbor filtering for Analog domain noise reduction in astronomical videos. IEEE Trans Circuits Syst II Express Briefs 66(5):868–872 Aliakhmet K, Jame AP (2019) Temporal G-neighbor filtering for Analog domain noise reduction in astronomical videos. IEEE Trans Circuits Syst II Express Briefs 66(5):868–872
go back to reference Alzahrani A, Memon NA (2021) Blind and robust watermarking scheme in hybrid domain for copyright protection of medical images. IEEE Access 9:113714–113734CrossRef Alzahrani A, Memon NA (2021) Blind and robust watermarking scheme in hybrid domain for copyright protection of medical images. IEEE Access 9:113714–113734CrossRef
go back to reference Azaria A, Richardson A, Kraus S, Subrahmanian VS (2014) Behavioral analysis of insider threat: a survey and bootstrapped prediction in imbalanced data. IEEE Trans Comput Soc Syst 1(2):135–155CrossRef Azaria A, Richardson A, Kraus S, Subrahmanian VS (2014) Behavioral analysis of insider threat: a survey and bootstrapped prediction in imbalanced data. IEEE Trans Comput Soc Syst 1(2):135–155CrossRef
go back to reference Feng J, Yang LT, Dai G, Chen J, Yan Z (2018) An improved secure high-order-Lanczos based orthogonal tensor SVD for outsourced cyber-physical-social big data reduction. IEEE Trans Big Data 7(4):808–818 Feng J, Yang LT, Dai G, Chen J, Yan Z (2018) An improved secure high-order-Lanczos based orthogonal tensor SVD for outsourced cyber-physical-social big data reduction. IEEE Trans Big Data 7(4):808–818
go back to reference Gonge SS, Ghatol AA (2016) An integration of SVD digital image watermarking with AES technique for copyright protection and security of bank cheque image. In: 2016 2nd international conference on contemporary computing and informatics (IC3I). IEEE, pp 769–778 Gonge SS, Ghatol AA (2016) An integration of SVD digital image watermarking with AES technique for copyright protection and security of bank cheque image. In: 2016 2nd international conference on contemporary computing and informatics (IC3I). IEEE, pp 769–778
go back to reference Kaushik H, Singh D, Kaur M, Alshazly H, Zaguia A, Hamam H (2021) Diabetic retinopathy diagnosis from fundus images using stacked generalization of deep models. IEEE Access 9:108276–108292CrossRef Kaushik H, Singh D, Kaur M, Alshazly H, Zaguia A, Hamam H (2021) Diabetic retinopathy diagnosis from fundus images using stacked generalization of deep models. IEEE Access 9:108276–108292CrossRef
go back to reference Kumari A, Sahoo SK, Chinnaiah MC (2021) Fast and efficient visibility restoration technique for single image dehazing and defogging. IEEE Access 9:48131–48146CrossRef Kumari A, Sahoo SK, Chinnaiah MC (2021) Fast and efficient visibility restoration technique for single image dehazing and defogging. IEEE Access 9:48131–48146CrossRef
go back to reference Lin S, Kong Y, Nie S, Xie W, Du J (2021) Research on cross-chain technology of blockchain. In: 2021 6th International conference on smart grid and electrical automation (ICSGEA). IEEE, pp 405–408 Lin S, Kong Y, Nie S, Xie W, Du J (2021) Research on cross-chain technology of blockchain. In: 2021 6th International conference on smart grid and electrical automation (ICSGEA). IEEE, pp 405–408
go back to reference Liu P, Hong Y, Liu Y (2019) Deep differential convolutional network for single image super-resolution. IEEE Access 7:37555–37564CrossRef Liu P, Hong Y, Liu Y (2019) Deep differential convolutional network for single image super-resolution. IEEE Access 7:37555–37564CrossRef
go back to reference Liu X-Y, Qin X-Z, Li R-L, Li Q-H, Gao S, Zhao H, Hao Z-P, Xiao-Ling Wu (2020) A self-adaptive selection of subset size method in digital image correlation based on Shannon entropy. IEEE Access 8:184822–184833CrossRef Liu X-Y, Qin X-Z, Li R-L, Li Q-H, Gao S, Zhao H, Hao Z-P, Xiao-Ling Wu (2020) A self-adaptive selection of subset size method in digital image correlation based on Shannon entropy. IEEE Access 8:184822–184833CrossRef
go back to reference More S, Singla J, Verma S, Ghosh U, Rodrigues JJPC, Sanwar Hosen ASM, Ra I-H (2020) Security assured CNN-based model for reconstruction of medical images on the internet of healthcare things. IEEE Access 8:126333–126346CrossRef More S, Singla J, Verma S, Ghosh U, Rodrigues JJPC, Sanwar Hosen ASM, Ra I-H (2020) Security assured CNN-based model for reconstruction of medical images on the internet of healthcare things. IEEE Access 8:126333–126346CrossRef
go back to reference Murad M, Bilal M, Jalil A, Ali A, Mehmood K, Khan B (2020) Efficient reconstruction technique for multi-slice CS-MRI using novel interpolation and 2D sampling scheme. IEEE Access 8:117452–117466CrossRef Murad M, Bilal M, Jalil A, Ali A, Mehmood K, Khan B (2020) Efficient reconstruction technique for multi-slice CS-MRI using novel interpolation and 2D sampling scheme. IEEE Access 8:117452–117466CrossRef
go back to reference Na T, Kim M (2013) A novel no-reference PSNR estimation method with regard to deblocking filtering effect in H. 264/AVC bitstreams. IEEE Trans Circuits Syst Video Technol 24(2):320–330 Na T, Kim M (2013) A novel no-reference PSNR estimation method with regard to deblocking filtering effect in H. 264/AVC bitstreams. IEEE Trans Circuits Syst Video Technol 24(2):320–330
go back to reference Nagarajan G, Thyagharajan KK (2014) Rule-based semantic content extraction in image using fuzzy ontology. Int Rev Comput Softw 9(2):266–277 Nagarajan G, Thyagharajan KK (2014) Rule-based semantic content extraction in image using fuzzy ontology. Int Rev Comput Softw 9(2):266–277
go back to reference Nirmalraj S, Nagarajan G (2021) Fusion of visible and infrared image via compressive sensing using convolutional sparse representation. ICT Express 7(3):350–354CrossRef Nirmalraj S, Nagarajan G (2021) Fusion of visible and infrared image via compressive sensing using convolutional sparse representation. ICT Express 7(3):350–354CrossRef
go back to reference Pei J, Dang J, Wang Y (2021) Encryption method of privacy information in student archives based on blockchain technology. In: 2021 6th International conference on smart grid and electrical automation (ICSGEA). IEEE, pp 208–211 Pei J, Dang J, Wang Y (2021) Encryption method of privacy information in student archives based on blockchain technology. In: 2021 6th International conference on smart grid and electrical automation (ICSGEA). IEEE, pp 208–211
go back to reference Prasetyo H, Hsia C-H, Liu C-H (2020) Vulnerability attacks of SVD-based video watermarking scheme in an IoT environment. IEEE Access 8:69919–69936CrossRef Prasetyo H, Hsia C-H, Liu C-H (2020) Vulnerability attacks of SVD-based video watermarking scheme in an IoT environment. IEEE Access 8:69919–69936CrossRef
go back to reference Salunke S, Venkatadri M, Hashmi MF, Ahuja B (2021) An implicit approach for visual data: compression encryption via singular value decomposition, multiple chaos and beta function. In: 2021 9th International conference on reliability, infocom technologies and optimization (trends and future directions) (ICRITO). IEEE, pp 1–5 Salunke S, Venkatadri M, Hashmi MF, Ahuja B (2021) An implicit approach for visual data: compression encryption via singular value decomposition, multiple chaos and beta function. In: 2021 9th International conference on reliability, infocom technologies and optimization (trends and future directions) (ICRITO). IEEE, pp 1–5
go back to reference Shehab A, Elhoseny M, Muhammad K, Sangaiah AK, Yang P, Huang H, Hou G (2018) Secure and robust fragile watermarking scheme for medical images. IEEE Access 6:10269–10278CrossRef Shehab A, Elhoseny M, Muhammad K, Sangaiah AK, Yang P, Huang H, Hou G (2018) Secure and robust fragile watermarking scheme for medical images. IEEE Access 6:10269–10278CrossRef
go back to reference Siddiqui GF, Iqbal MZ, Saleem K, Saeed Z, Ahmed A, Hameed IA, Khan MF (2020) A dynamic three-bit image steganography algorithm for medical and e-healthcare systems. IEEE Access 8:181893–181903CrossRef Siddiqui GF, Iqbal MZ, Saleem K, Saeed Z, Ahmed A, Hameed IA, Khan MF (2020) A dynamic three-bit image steganography algorithm for medical and e-healthcare systems. IEEE Access 8:181893–181903CrossRef
go back to reference Srihi S, Balti A, Fnaiech F, Hamam H (2018) Banking security system based on SVD fingerprints and cryptography passwords. In: 2018 International conference on control, automation and diagnosis (ICCAD). IEEE, pp 1–5 Srihi S, Balti A, Fnaiech F, Hamam H (2018) Banking security system based on SVD fingerprints and cryptography passwords. In: 2018 International conference on control, automation and diagnosis (ICCAD). IEEE, pp 1–5
go back to reference Sun N, Li H (2019) Super resolution reconstruction of images based on interpolation and full convolutional neural network and application in medical fields. IEEE Access 7:186470–186479CrossRef Sun N, Li H (2019) Super resolution reconstruction of images based on interpolation and full convolutional neural network and application in medical fields. IEEE Access 7:186470–186479CrossRef
go back to reference Wahab OFA, Khalaf AAM, Hussein AI, Hamed HFA (2021) Hiding data using efficient combination of RSA cryptography, and compression steganography techniques. IEEE Access 9:31805–31815CrossRef Wahab OFA, Khalaf AAM, Hussein AI, Hamed HFA (2021) Hiding data using efficient combination of RSA cryptography, and compression steganography techniques. IEEE Access 9:31805–31815CrossRef
go back to reference Zainol Z, Teh JS, Alawida M, Alabdulatif A (2021) Hybrid SVD-based image watermarking schemes: a review. IEEE Access 9:32931–32968CrossRef Zainol Z, Teh JS, Alawida M, Alabdulatif A (2021) Hybrid SVD-based image watermarking schemes: a review. IEEE Access 9:32931–32968CrossRef
go back to reference Zhang Z, Liu D, Wang X (2016) Real-time uncompressed video transmission over wireless channels using unequal power allocation. IEEE Syst J 12(1):691–701CrossRef Zhang Z, Liu D, Wang X (2016) Real-time uncompressed video transmission over wireless channels using unequal power allocation. IEEE Syst J 12(1):691–701CrossRef
Metadata
Title
A hybrid multimedia image encryption technique using singular value decomposition-linear sparsity regularization (SVD-LSR)
Authors
M. Hema
S. Prayla Shyry
Publication date
09-03-2023
Publisher
Springer Berlin Heidelberg
Published in
Soft Computing
Print ISSN: 1432-7643
Electronic ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-023-07937-z

Premium Partner