Skip to main content
Top
Published in: Wireless Personal Communications 3/2016

01-06-2016

Content Verification of Encrypted Images Transmitted Over Wireless AWGN Channels

Authors: Sabry S. Nassar, Nabil M. Ayad, Hamdy M. Kelash, Hala S. El-sayed, Mohsen A. M. El-Bendary, Fathi E. Abd El-Samie, Osama S. Faragallah

Published in: Wireless Personal Communications | Issue 3/2016

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this paper, a content-based image verification scheme is presented. This scheme is suitable for verifying the integrity of images transmitted over insecure networks. The Discrete Cosine Transform is used to embed a block-based mark for each block in another block according to a specific algorithm. To achieve higher protection, the marked image is then encrypted using 2-D chaotic Baker map before being transmitted over the communication channel. The encrypted marked image is transmitted over a wireless Additive White Gaussian Noise (AWGN) channel without error correction codes. At the receiver side, a decryption process is performed, and the marks embedded in each block are extracted to detect suspicious forgery activities. Simulation results show the suitability of the proposed scheme for applications with sensitive data types such as military and nuclear applications.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Lou, D. C., Liu, J. L., & Li, C. T. (2003). Digital signature-based image authentication. In C. S. Lu (Ed.), Multimedia security: Steganography and digital watermarking techniques for protection of intellectual property. Hershey: Idea Group Inc. Lou, D. C., Liu, J. L., & Li, C. T. (2003). Digital signature-based image authentication. In C. S. Lu (Ed.), Multimedia security: Steganography and digital watermarking techniques for protection of intellectual property. Hershey: Idea Group Inc.
2.
go back to reference Petrovic, R. (2005). Digital watermarks for audio integrity verification. Serbia and Montenegro, Nis, pp. 28–30. Petrovic, R. (2005). Digital watermarks for audio integrity verification. Serbia and Montenegro, Nis, pp. 28–30.
3.
go back to reference Chang, W. H., & Chang, L. W. (2010). Semi-fragile watermarking for image authentication, localization, and recovery using Tchebichef moments. In Communications and Information Technologies (ISCIT). Chang, W. H., & Chang, L. W. (2010). Semi-fragile watermarking for image authentication, localization, and recovery using Tchebichef moments. In Communications and Information Technologies (ISCIT).
4.
go back to reference Radharani, S., & Valarmathi, M. L. (2010). A study of watermarking scheme for image authentication. International Journal of Computer Applications, 2(4), 24–32.CrossRef Radharani, S., & Valarmathi, M. L. (2010). A study of watermarking scheme for image authentication. International Journal of Computer Applications, 2(4), 24–32.CrossRef
5.
go back to reference Li, C.-T., & Yang, F.-M. (2003). One-dimensional neighborhood forming strategy for fragile watermarking. Journal of Electronic Imaging, 12(2), 284–291.CrossRef Li, C.-T., & Yang, F.-M. (2003). One-dimensional neighborhood forming strategy for fragile watermarking. Journal of Electronic Imaging, 12(2), 284–291.CrossRef
6.
go back to reference Barni, M., Bartolini, F., Cappellini, V., & Piva, A. (1998). A DCT-domain system for robust image watermarking. Signal Processing, 66, 357–372.CrossRefMATH Barni, M., Bartolini, F., Cappellini, V., & Piva, A. (1998). A DCT-domain system for robust image watermarking. Signal Processing, 66, 357–372.CrossRefMATH
7.
go back to reference Cox, I. J., Kilian, J., Leighton, F. T., & Shamoon, T. (1997). Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, 6(12), 1673–1687.CrossRef Cox, I. J., Kilian, J., Leighton, F. T., & Shamoon, T. (1997). Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, 6(12), 1673–1687.CrossRef
8.
go back to reference Hartung, F., & Girod, B. (1998). Watermarking of uncompressed and compressed video. Signal Processing, 66, 283–301.CrossRefMATH Hartung, F., & Girod, B. (1998). Watermarking of uncompressed and compressed video. Signal Processing, 66, 283–301.CrossRefMATH
9.
go back to reference Li, C.-T., Lou, D.-C., & Liu, J.-L. (2000). Image authentication and integrity verification via content-based watermarks and a public key cryptosystem. International Conference on Image Processing, 3, 694–697. Li, C.-T., Lou, D.-C., & Liu, J.-L. (2000). Image authentication and integrity verification via content-based watermarks and a public key cryptosystem. International Conference on Image Processing, 3, 694–697.
11.
go back to reference Sultana, F., Charles, S., & Govardhan, A. (2013). A tamper proof noise resilient end to end image based authentication system over wireless transmission with AWGN channel using wavelet based templates and AES. IJCSNS International Journal of Computer Science and Network Security, 13(5), 41–48. Sultana, F., Charles, S., & Govardhan, A. (2013). A tamper proof noise resilient end to end image based authentication system over wireless transmission with AWGN channel using wavelet based templates and AES. IJCSNS International Journal of Computer Science and Network Security, 13(5), 41–48.
12.
go back to reference Shoemaker, C. (2002). Rudko. Hidden bits: A survey of techniques for digital watermarking. Independent Study EER-290 Prof Rudko, Spring. Shoemaker, C. (2002). Rudko. Hidden bits: A survey of techniques for digital watermarking. Independent Study EER-290 Prof Rudko, Spring.
13.
go back to reference Tewfik, A. H. (2000). Digital watermarking. San Mercury News. Tewfik, A. H. (2000). Digital watermarking. San Mercury News.
14.
go back to reference Goel, S., Rana, A., Kaur, M. (2013). A review of comparison techniques of image steganography. IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE), 6(1), 41–48. ISSN: 2278-1676, p-ISSN: 2320-3331. Goel, S., Rana, A., Kaur, M. (2013). A review of comparison techniques of image steganography. IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE), 6(1), 41–48. ISSN: 2278-1676, p-ISSN: 2320-3331.
15.
go back to reference El-Bendary, M. A. M., Abou-El-azm, A. E., El-Fishawy, N. A., Shawki, F., El-Tokhy, M. A. R., Kazemian, H. B. (2012). Performance of the audio signals transmission over wireless networks with the channel interleaving considerations. EURASIP Journal on Audio, Speech, and Music Processing, 1–14. El-Bendary, M. A. M., Abou-El-azm, A. E., El-Fishawy, N. A., Shawki, F., El-Tokhy, M. A. R., Kazemian, H. B. (2012). Performance of the audio signals transmission over wireless networks with the channel interleaving considerations. EURASIP Journal on Audio, Speech, and Music Processing, 1–14.
Metadata
Title
Content Verification of Encrypted Images Transmitted Over Wireless AWGN Channels
Authors
Sabry S. Nassar
Nabil M. Ayad
Hamdy M. Kelash
Hala S. El-sayed
Mohsen A. M. El-Bendary
Fathi E. Abd El-Samie
Osama S. Faragallah
Publication date
01-06-2016
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 3/2016
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-015-3142-3

Other articles of this Issue 3/2016

Wireless Personal Communications 3/2016 Go to the issue