Abstract
In this paper, a novel security approach is proposed to improve the security and robustness of the data. It uses three levels of security to protect the sensitive data. In the first level, the data is to be protected by Gyration slab encryption algorithm. Result of the first level has to be embedded into an image as original using our earlier paper concept PLSB into a second level of security. The resultant image from the second level is considered as watermark Image. In the third level, the watermark image is embedded into the original image. Here watermark image and original image are similar. The final output of the proposed security approach is a watermarked image which holds the stego image. This method provides more security and robustness than the existing approaches. The main properties of the proposed approach are Gyration slab operations and watermark image and original image are similar. These can reduce the Brute-force attack and improve the confusion and diffusion principles. The main strengths of this paper are cryptanalysis, steganalysis, watermark analysis with reports.
Similar content being viewed by others
References
A. Miyaji, Y. Mo, How to enhance the security on the least significant bit, The 11th International Conference on Cryptology and Network Security (CANS 2012), vol. 7712 (Springer, Berlin, 2012), pp. 263–279
J. Fridrich, J. Kodovský, Rich models for steganalysis of digital images. IEEE Trans. Inform. Forensics Secur. 7(3), 868 (2012)
C. Cachin, J. Camenisch, Encrypting keys securely. IEEE Secur. Priv. 8(4), 66–69 (2010)
W. Bender, D. Gruhl, N. Morimoto, A. Lu, Techniques for data hiding. IBM Syst. J. 35(3,4), 313–336 (1996)
Ch. Rupa, Digital image steganography using sieperinski gasket fractal and PLSB. J. Inst. Eng. (India) Ser. B 54(3), 147–151 (2013)
W. Y. Zibideh, Modified-DES encryption algorithm with improved BER performance in wireless communication, radio and wireless symposium (RWS). IEEE international conference on radio and wireless symposium, 219–222, 2011
S. Kumar, Public key cryptographic system using mandelbrot sets, IEEE international conference on military communication conference, 1–5, 2006
C.M. Wang, N.I. Wu, C.S. Tsai, A high quality steganographic method with pixel-value differencing and modulus function. J. Syst. Softw. 81, 150–158 (2008)
E. S. Fami, Adaptive watermarking in Hadamard transform coefficients of textured image blocks. 16th IEEE international conference on artificial intelligence and signal processing (AISP), 503–507, 2012
C.Y. Weng et al., Steganographic data hiding in image processing using predictive differencing. Opto. Electron. Rev. 20, 126–133 (2012)
H.S.Md. Yatim, A practical and automated image-based framework for tracking pedestrian movements from a video. IERI Procedia 4, 181–187 (2013)
V.V. Nabiyev, Remove unwanted objects from an image, IEEE 19th conference on signal processing and communications applications (SIU), 9–12, 2011
K. Qi, D.-Q. Xie, An adaptive steganography for 3D point cloud models. 8th IEEE international conference on WiCOM, 1–4, 2012
A. Criminisi, K. Toyama, Object removal by exemplar-based inpainting. IEEE Trans. Image Process. 13(9), 1200–1212 (2004)
C. Wang, J. Ni, J. Huang, An informed watermarking scheme using hidden markov model in the wavelet domain. IEEE Trans. Inform. Forensics Secur. 7(3), 853–867 (2012)
I. Kim, Keypad against brute force attack on smartphones. Inform. Secur. IET 6, 71–76 (2012)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Rupa, C. A Novel Approach in Security Using Gyration Slab with Watermarking Technique. J. Inst. Eng. India Ser. B 97, 273–279 (2016). https://doi.org/10.1007/s40031-015-0195-3
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s40031-015-0195-3