Skip to main content

2019 | OriginalPaper | Buchkapitel

Image Content Protection Using Hybrid Approach of Blocking and Embedding Algorithm in the Context of Social Network

verfasst von : M. Naveen, G. N. K. Suresh Babu

Erschienen in: Intelligent Systems in Cybernetics and Automation Control Theory

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The security of an informative data plays a crucial role in current world. The reversible hiding mechanisms for data are able to perform the embedding of secret data in an image in secure way so that the receiver can receive image data without any data loss in secure manner. But, the existing data hiding mechanisms are able to embed the data only after the image encryption. This may cause error during the extraction and recover of image. The security of image content shared on collaborative (social) networks is the de-facto research today to minimize losses. This paper presents a hybrid mechanism of blocking and embedding for image data protection in the context of collaborative network. The outcomes of the system give the improved execution time for optimized transformation (29.3 s) than normal transformation (139.17 s). Also, it is observed that the PSNR value of 53.15 and 53.13 is observed for two set of image data which represents the improved image quality after recovery.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Kolk, R., Razaque, A.: Scalable and energy efficient computer vision for text translation. In: 2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT), Farmingdale, NY, pp. 1–6 (2016) Kolk, R., Razaque, A.: Scalable and energy efficient computer vision for text translation. In: 2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT), Farmingdale, NY, pp. 1–6 (2016)
2.
Zurück zum Zitat Jonaitis, D., Raudonis, V., Lipnickas, A.: Application of computer vision methods in automatic analysis of embryo development. IN: 2015 IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), Warsaw, pp. 258–260 (2015) Jonaitis, D., Raudonis, V., Lipnickas, A.: Application of computer vision methods in automatic analysis of embryo development. IN: 2015 IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), Warsaw, pp. 258–260 (2015)
3.
Zurück zum Zitat Ko, T.: A survey on behavior analysis in video surveillance for homeland security applications. In: 2008 37th IEEE Applied Imagery Pattern Recognition Workshop, Washington DC, pp. 1–8 (2008) Ko, T.: A survey on behavior analysis in video surveillance for homeland security applications. In: 2008 37th IEEE Applied Imagery Pattern Recognition Workshop, Washington DC, pp. 1–8 (2008)
4.
Zurück zum Zitat Ouloul, M.I., Moutakki, Z., Afdel, K., Amghar, A.: An efficient face recognition using SIFT descriptor in RGB-D images. Int. J. Electr. Comput. Eng. 5(6), 1227–1233 (2015) Ouloul, M.I., Moutakki, Z., Afdel, K., Amghar, A.: An efficient face recognition using SIFT descriptor in RGB-D images. Int. J. Electr. Comput. Eng. 5(6), 1227–1233 (2015)
5.
Zurück zum Zitat Bazmi, A., Faez, K.: Increasing the accuracy of detection and recognition in visual surveillance. Int. J. Electr. Comput. Eng. 2(3), 395 (2012) Bazmi, A., Faez, K.: Increasing the accuracy of detection and recognition in visual surveillance. Int. J. Electr. Comput. Eng. 2(3), 395 (2012)
6.
Zurück zum Zitat López-Valcarce, R., Romero, D.: Defending surveillance sensor networks against data-injection attacks via trusted nodes. In: 2017 25th European Signal Processing Conference (EUSIPCO), Kos, pp. 380–384 (2017) López-Valcarce, R., Romero, D.: Defending surveillance sensor networks against data-injection attacks via trusted nodes. In: 2017 25th European Signal Processing Conference (EUSIPCO), Kos, pp. 380–384 (2017)
7.
Zurück zum Zitat Ferrara, M., Franco, A., Maltoni, D.: Face demorphing. In: IEEE Transactions on Information Forensics and Security, vol. PP, no. 99, p. 1 Ferrara, M., Franco, A., Maltoni, D.: Face demorphing. In: IEEE Transactions on Information Forensics and Security, vol. PP, no. 99, p. 1
8.
Zurück zum Zitat Bhatnagar, S.C., Singh, N.: Assessing the impact of e-government: a study of projects in India. Inf. Technol. Int. Dev. 6(2), 109 (2010) Bhatnagar, S.C., Singh, N.: Assessing the impact of e-government: a study of projects in India. Inf. Technol. Int. Dev. 6(2), 109 (2010)
9.
Zurück zum Zitat Margaret, B.D., Kumar, R.J.V.: The socio-economic impact of e-governance: Indian scenario. Int. J. Sci. Res. Manag. 3(1) (2015) Margaret, B.D., Kumar, R.J.V.: The socio-economic impact of e-governance: Indian scenario. Int. J. Sci. Res. Manag. 3(1) (2015)
10.
Zurück zum Zitat Tao, R., Meng, X.Y., Wang, Y.: Image encryption with multiorders of fractional fourier transforms. IEEE Trans. Inf. Forensics Secur. 5(4), 734–738 (2010)CrossRef Tao, R., Meng, X.Y., Wang, Y.: Image encryption with multiorders of fractional fourier transforms. IEEE Trans. Inf. Forensics Secur. 5(4), 734–738 (2010)CrossRef
11.
Zurück zum Zitat Yang, F.: Image encryption algorithm based on fractional fourier transform. In: 2013 International Conference on Computational and Information Sciences, Shiyang, pp. 705–708 (2013) Yang, F.: Image encryption algorithm based on fractional fourier transform. In: 2013 International Conference on Computational and Information Sciences, Shiyang, pp. 705–708 (2013)
12.
Zurück zum Zitat Elshamy, A.M., et al.: Optical image encryption based on chaotic baker map and double random phase encoding. J. Lightwave Technol. 31(15), 2533–2539 (2013)CrossRef Elshamy, A.M., et al.: Optical image encryption based on chaotic baker map and double random phase encoding. J. Lightwave Technol. 31(15), 2533–2539 (2013)CrossRef
13.
Zurück zum Zitat Zhou, J., Liu, X., Au, O.C., Tang, Y.Y.: Designing an efficient image encryption-then-compression system via prediction error clustering and random permutation. IEEE Trans. Inf. Forensics Secur. 9(1), 39–50 (2014)CrossRef Zhou, J., Liu, X., Au, O.C., Tang, Y.Y.: Designing an efficient image encryption-then-compression system via prediction error clustering and random permutation. IEEE Trans. Inf. Forensics Secur. 9(1), 39–50 (2014)CrossRef
14.
Zurück zum Zitat Li, J., Liu, H.: Colour image encryption based on advanced encryption standard algorithm with two-dimensional chaotic map. IET Inf. Secur. 7(4), 265–270 (2013)MathSciNetCrossRef Li, J., Liu, H.: Colour image encryption based on advanced encryption standard algorithm with two-dimensional chaotic map. IET Inf. Secur. 7(4), 265–270 (2013)MathSciNetCrossRef
15.
Zurück zum Zitat Keyvanpour, M.R., Farnoosh, M.B.: A new encryption method for secure embedding in image watermarking. In: 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), Chengdu, pp. V2-403-V2-407 (2010) Keyvanpour, M.R., Farnoosh, M.B.: A new encryption method for secure embedding in image watermarking. In: 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), Chengdu, pp. V2-403-V2-407 (2010)
16.
Zurück zum Zitat Malakooti, M.V., Khederzdeh, M.: A lossless secure data embedding in image using DCT and Randomize key generator. In: 2012 Second International Conference on Digital Information and Communication Technology and it’s Applications (DICTAP), Bangkok, pp. 236–239 (2012) Malakooti, M.V., Khederzdeh, M.: A lossless secure data embedding in image using DCT and Randomize key generator. In: 2012 Second International Conference on Digital Information and Communication Technology and it’s Applications (DICTAP), Bangkok, pp. 236–239 (2012)
17.
Zurück zum Zitat Fatnassi, A., Gharsellaoui, H., Bouamama, S.: A novel approach for embedding information in image cover media with security. In: 2016 World Symposium on Computer Applications & Research (WSCAR), Cairo, pp. 104–109 (2016) Fatnassi, A., Gharsellaoui, H., Bouamama, S.: A novel approach for embedding information in image cover media with security. In: 2016 World Symposium on Computer Applications & Research (WSCAR), Cairo, pp. 104–109 (2016)
18.
Zurück zum Zitat Al-Haj, A., Abdel-Nabi, H.: Digital image security based on data hiding and cryptography. In: 2017 3rd International Conference on Information Management (ICIM), Chengdu, pp. 437–440 (2017) Al-Haj, A., Abdel-Nabi, H.: Digital image security based on data hiding and cryptography. In: 2017 3rd International Conference on Information Management (ICIM), Chengdu, pp. 437–440 (2017)
19.
Zurück zum Zitat Zhang, X.: Separable reversible data hiding in encrypted image. IEEE Trans. Inf. Forensics Secur. 7(2), 826–832 (2012)CrossRef Zhang, X.: Separable reversible data hiding in encrypted image. IEEE Trans. Inf. Forensics Secur. 7(2), 826–832 (2012)CrossRef
20.
Zurück zum Zitat Zhang, W., Chen, B., Nenghai, Yu.: Improving various reversible data hiding schemes via optimal codes for binary covers. IEEE Trans. Image Process. 21(6), 2991–3003 (2012)MathSciNetCrossRef Zhang, W., Chen, B., Nenghai, Yu.: Improving various reversible data hiding schemes via optimal codes for binary covers. IEEE Trans. Image Process. 21(6), 2991–3003 (2012)MathSciNetCrossRef
21.
Zurück zum Zitat Zhang, X.: Reversible data hiding with optimal value transfer. IEEE Trans. Multimedia 15(2), 316–325 (2013)CrossRef Zhang, X.: Reversible data hiding with optimal value transfer. IEEE Trans. Multimedia 15(2), 316–325 (2013)CrossRef
Metadaten
Titel
Image Content Protection Using Hybrid Approach of Blocking and Embedding Algorithm in the Context of Social Network
verfasst von
M. Naveen
G. N. K. Suresh Babu
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-00184-1_23