Skip to main content
Log in

A Novel Approach in Security Using Gyration Slab with Watermarking Technique

  • Original Contribution
  • Published:
Journal of The Institution of Engineers (India): Series B Aims and scope Submit manuscript

Abstract

In this paper, a novel security approach is proposed to improve the security and robustness of the data. It uses three levels of security to protect the sensitive data. In the first level, the data is to be protected by Gyration slab encryption algorithm. Result of the first level has to be embedded into an image as original using our earlier paper concept PLSB into a second level of security. The resultant image from the second level is considered as watermark Image. In the third level, the watermark image is embedded into the original image. Here watermark image and original image are similar. The final output of the proposed security approach is a watermarked image which holds the stego image. This method provides more security and robustness than the existing approaches. The main properties of the proposed approach are Gyration slab operations and watermark image and original image are similar. These can reduce the Brute-force attack and improve the confusion and diffusion principles. The main strengths of this paper are cryptanalysis, steganalysis, watermark analysis with reports.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. http://www.thehansindia.com/posts/index/2014-04-05/Andhra-University-official-website-hacked-by-Pakistan-cyber-experts-91089, April 2014

  2. A. Miyaji, Y. Mo, How to enhance the security on the least significant bit, The 11th International Conference on Cryptology and Network Security (CANS 2012), vol. 7712 (Springer, Berlin, 2012), pp. 263–279

  3. J. Fridrich, J. Kodovský, Rich models for steganalysis of digital images. IEEE Trans. Inform. Forensics Secur. 7(3), 868 (2012)

    Article  Google Scholar 

  4. C. Cachin, J. Camenisch, Encrypting keys securely. IEEE Secur. Priv. 8(4), 66–69 (2010)

  5. W. Bender, D. Gruhl, N. Morimoto, A. Lu, Techniques for data hiding. IBM Syst. J. 35(3,4), 313–336 (1996)

    Article  Google Scholar 

  6. Ch. Rupa, Digital image steganography using sieperinski gasket fractal and PLSB. J. Inst. Eng. (India) Ser. B 54(3), 147–151 (2013)

    Article  Google Scholar 

  7. W. Y. Zibideh, Modified-DES encryption algorithm with improved BER performance in wireless communication, radio and wireless symposium (RWS). IEEE international conference on radio and wireless symposium, 219–222, 2011

  8. S. Kumar, Public key cryptographic system using mandelbrot sets, IEEE international conference on military communication conference, 1–5, 2006

  9. C.M. Wang, N.I. Wu, C.S. Tsai, A high quality steganographic method with pixel-value differencing and modulus function. J. Syst. Softw. 81, 150–158 (2008)

    Article  Google Scholar 

  10. E. S. Fami, Adaptive watermarking in Hadamard transform coefficients of textured image blocks. 16th IEEE international conference on artificial intelligence and signal processing (AISP), 503–507, 2012

  11. C.Y. Weng et al., Steganographic data hiding in image processing using predictive differencing. Opto. Electron. Rev. 20, 126–133 (2012)

    Google Scholar 

  12. H.S.Md. Yatim, A practical and automated image-based framework for tracking pedestrian movements from a video. IERI Procedia 4, 181–187 (2013)

    Article  Google Scholar 

  13. V.V. Nabiyev, Remove unwanted objects from an image, IEEE 19th conference on signal processing and communications applications (SIU), 9–12, 2011

  14. K. Qi, D.-Q. Xie, An adaptive steganography for 3D point cloud models. 8th IEEE international conference on WiCOM, 1–4, 2012

  15. A. Criminisi, K. Toyama, Object removal by exemplar-based inpainting. IEEE Trans. Image Process. 13(9), 1200–1212 (2004)

    Article  Google Scholar 

  16. C. Wang, J. Ni, J. Huang, An informed watermarking scheme using hidden markov model in the wavelet domain. IEEE Trans. Inform. Forensics Secur. 7(3), 853–867 (2012)

    Article  Google Scholar 

  17. I. Kim, Keypad against brute force attack on smartphones. Inform. Secur. IET 6, 71–76 (2012)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ch. Rupa.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rupa, C. A Novel Approach in Security Using Gyration Slab with Watermarking Technique. J. Inst. Eng. India Ser. B 97, 273–279 (2016). https://doi.org/10.1007/s40031-015-0195-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s40031-015-0195-3

Keywords

Navigation