SlideShare una empresa de Scribd logo
1 de 12
Descargar para leer sin conexión
International journal of Computer Networking and Communication (IJCNAC)Vol. 1, No. 1(August 2013) 25
www.arpublication.org
A Joint Encryption/Watermarking Algorithm for
Secure Image Transfer
Youssra LAKRISSI, Mohammed ERRITALI, Mohammed FAKIR
Information Processing and Telecommunication Teams, University Sultan Moulay Slimane,
Benimallal, Morocco
lakrissi.youssra@gmail.com
m.erritali@usms.ma
fakfad@yahoo.fr
Abstract
This paper presents a method combining encryption and watermarking for secure
images transfer. The proposed solution gives access to the outcomes of the image
integrity and of its origins as its attachment to one user even if the image is stored
encrypted. This method is based on the combination of encryption algorithms public-
private keys and secret keys, and watermarking. The algorithm for image encryption uses
a secret key. We encrypt the secret key with an asymmetric algorithm. This encrypted
secret key is then inserted into the encrypted image using watermark algorithm.
Keywords: Encryption, symmetric encryption, asymmetric encryption, hybrid
encryption, stream cipher, bloc cipher, watermarking, discrete wavelet transform.
1. INTRODUCTION
Rapid growth of Internet has contributed a lot in the increase of multimedia contents over
internet including digital images and videos. Due to exponential rise in multimedia contents, it
has become a trend to share information using digital images and video and at the same time it
has become a challenging issue to protect these contents from tempering in order to avoid a
misuse and retain confidentiality of data [1].
The security of data is pursued by assuring, among others authentication, to verify the identity
claimed by or for any system entity, data confidentiality to protect data against unauthorized
disclosure, data integrity to verify that data have been changed, destroyed or lost in an accidental
manner [1].
Actually, encrypted data need an additional level of protection in order to keep control on
them after the decryption phase. In fact, when the ciphered data is deciphered by the authorized
user, it is unprotected and it can be easily modified, tampered, or stolen. The scientific community
started focusing on the possibility of providing both security services simultaneously and
therefore to have the chance of watermarking encrypted data and detecting the watermark before
and after decryption. This allows to work in the encrypted domain, operating on ciphered data
without giving access to the plain one and increasing the operation efficiency.
Lian et al [2] draw a detailed scenario concerning video encryption and video watermarking
and proposes a new combined approach. Bas et al [3] give an overview on the possible scenarios
where the combination of both level of protection can be exploited, while Merhav [4] presents a
theoretic analysis of this problem. In literature a commutative scheme is presented by Lian et al
[5]: the image is wavelet transformed and some sub bands are ciphered while some others are
both ciphered (with sign encryption) and watermarked.
26
www.arpublication.org
In fact several methods have been developed to solve the problems of security and authenticity
in image transfer. In this paper, we present a hybrid coding approach where we propose to use
several types of encryption with the watermarking in order to secure the image transmission.
Samir Kumar [6] proposed a technique for invisible Digital Watermarking through Encryption
where the image is encoded within another image (cover image). Firstly, the cover image and the
target image can be adjusted by resize function. Secondly, only the final encrypted image i.e.
cover image and target image is sent over the network. This image is finally decoded at the
receiver end.
Puech and Rodrigues [1] present a method of partial or selective encryption for JPEG images.
It is based on encoding of some Huffman bit stream with AES cipher.
We propose a method combining symmetric encryption and watermarking which is robust to
noise and ensure the integrity (perceptual) and the Authenticity of image beside of hiding
associated data (high capacity) in image. This approach can access in different resolution levels
of image due to the wavelet watermarking and can process in real time.
Before embedding the secret key in the image, we are going to crypt it with an asymmetric
algorithm. At the reception, only public-private key will be needed to extract and decrypt the
secret key to get our image legible.
To encrypt the image, we have chosen to work with a symmetric stream cipher and symmetric
bloc cipher so we can make a comparison between them. To embed the secret key, we selected a
watermarking method based on discrete wavelet transform DWT [7].
The remainder of this paper is organized as follow. In Section II, we explain the encryption a
watermarking algorithms and in section III we detail the proposed method, before concluding, we
illustrate the results and discuss the performances of our approach in Sections 3 and 4
respectively.
2. RELATED WORK
2.1 Commutative Watermarking-Encryption (CWE)
One approach to commutative watermarking is provided by deploying homomorphic
encryption techniques so that some basic algebraic operations such as addition and multiplication
on the plaintexts can be transferred onto the corresponding cipher texts, i.e., they are transparent
to encryption [8]. Especially, if both the encryption and the watermarking process consist of the
same homomorphic operation, one gets a commutative watermarking-encryption scheme.
Examples of homomorphic operations are exponentiation modulo n, multiplication modulo n,
addition modulo n and the XOR operation. One major drawback of this approach is the influence
of encryption on robustness of the watermarking algorithm because after encryption there is no
visual information available for the watermark embedder to adapt itself to increase robustness
while at the same time minimizing visual quality degradation [2].
In partial encryption schemes, the plaintext multimedia data is partitioned into two disjoint
parts, where one part is encrypted and the other part is watermarked. Since the encryption part is
independent of the watermarking part, they are naturally commutative. Because there is some
information leakage through the unencrypted parts, in order to get a high level of perceptual
security, the data parts which are significant for perception are encrypted, while only the
perceptually unimportant parts are watermarked, leaving the door open for an attacker trying to
remove the watermark. This lack of robustness against malicious attacks seems to be a general
problem with CWE.
International journal of Computer Networking and Communication (IJCNAC)Vol. 1, No. 1(August 2013) 27
www.arpublication.org
2.2 Hybrid DCT-DWT Watermarking and IDEA Encryption of Internet
Contents
M.A. Mohamed [9] proposed a hybrid image protection scheme to establish a relation between
the data encryption key and the watermark. Prepositioned secret sharing allows the reconstruction
of different encryption keys by communicating different activating shares for the same
prepositioned information. Each activating share is used by the receivers to generate a fresh
content decryption key. In the proposed scheme, the activating share is used to carry copyright or
usage rights data. The bit stream that represents this data is also embedded in the content as a
visual watermark. When the encryption key needs to change, the data source generates a new
activating share, and encrypts the corresponding data with the key constructed from the new
activating share. Before transmission, the encrypted data is embedded in a multimedia stream.
Each receiver can extract the encrypted data from the host image, and decrypt this data after
reconstructing the same key.
3. ENCRYPTION AND WATERMARKING ALGORITHMS USED
3.1 Encryption Algorithm
a) Symmetric Stream Cipher
In cryptography, a stream cipher is a symmetric key cipher where plaintext digits are
combined with a pseudorandom cipher digit stream (key stream). In a stream cipher
each plaintext digit is encrypted one at a time with the corresponding digit of the key stream, to
give a digit of the ciphertext stream [10]. An alternative name is a state cipher, as the
encryption of each digit is dependent on the current state. In practice, a digit is typically
a bit and the combining operation an exclusive-or (XOR).
A stream cipher generates successive elements of the key stream based on an internal state
[10]. This state is updated in essentially two ways: if the state changes independently of the
plaintext or ciphertext messages, the cipher are classified as a synchronous stream cipher as
shown in figure 1. By contrast, self-synchronising stream ciphers update their state based on
previous cipher text digits as shown in figure 2.
Fig.1 Principle of synchronous stream cipher
Fig.2 Principle of auto-synchronous stream cipher
b) Symmetric Bloc Cipher (AES)
AES is based on a design principle known as a substitution-permutation network, and is fast in
both software and hardware [11]. AES is a variant of Rijndael [12] which has a fixed block
28
www.arpublication.org
size of 128 bits, and a key size of 128, 192, or 256 bits. By contrast, the Rijndael specification per
se is specified with block and key sizes that may be any multiple of 32 bits, both with a minimum
of 128 and a maximum of 256 bits [13].
AES operates on a 4×4 column-major order matrix of bytes, termed the state, although some
versions of Rijndael have a larger block size and have additional columns in the state. Most AES
calculations are done in a special finite field.
The key size used for an AES cipher specifies the number of repetitions of transformation
rounds that convert the input, called the plaintext, into the final output, called the ciphertext. The
number of cycles of repetition are as follow:
• 10 cycles of repetition for 128-bit keys [13].
• 12 cycles of repetition for 192-bit keys [14].
• 14 cycles of repetition for 256-bit keys [15].
Each round consists of several processing steps, each containing five similar but different
stages, including one that depends on the encryption key itself. A set of reverse rounds are
applied to transform ciphertext back into the original plaintext using the same encryption key.
Figure 3 shows the principle of AES encryption
Fig.3 AES encryption [1]
c) Asymmetric Encryption (RSA):
RSA is an algorithm for public-key cryptography that is based on the presumed difficulty
of factoring large integers, the factoring problem [16]. The RSA algorithm involves three
steps: key generation, encryption and decryption.
A user of RSA creates and then publishes the product of two large prime numbers, along with
an auxiliary value, as their public key. The prime factors must be kept secret. Anyone can use
the public key to encrypt a message, but with currently published methods, if the public key is
large enough, only someone with knowledge of the prime factors can feasibly decode the
message [16]. Whether breaking RSA encryption is as hard as factoring is an open question
known as the RSA problem.
Figure 4 shows the principle of asymmetric cryptography
Fig.4 Asymmetric encryption
International journal of Computer Networking and Communication (IJCNAC)Vol. 1, No. 1(August 2013) 29
www.arpublication.org
3.2 Watermarking Method
The concept of Image watermarking mainly came into existence in 1990s because of the
widespread of the Internet [17]. At that time an invisible watermark message was inserted into
an image which is to be transferred such that the invisible message will survive intended or
unintended attacks.
The process of watermarking begins when the encoder inserts watermark into image,
producing watermarked image. The decoder extracts and validates the presence of watermarked
input or unmarked input [18].
The transform domain watermarking systems are based on Fourier and Cosine transform
which are the invertible transform applied to the image where the coefficients are modified by
the watermark data. The Discrete Cosine transform watermarking [19] divides the image into
different frequency band and choose the middle frequency band for watermarking. The method
that we are going to use on our approach is wavelet watermarking.
The Wavelet domain watermarking system is the multi-band watermarking scheme. The
attacker may not be able to detect the embedded watermark without knowing the parameter. The
original image is decomposed into wavelet coefficients and then multi-energy watermarking
scheme based on the qualified significant wavelet tree.
a) Embedding Watermark
The host image is taken as the input is decomposed with the fingerprint image using wavelet
transform. The fingerprint image of is taken as the copyright image is embedded in the
approximate and detailed coefficient diagonally of the host image. Then the inverse wavelet
transform is applied on these coefficients. The embedding process is performed by using the
following steps:
a. The image is decomposed using wavelet gives approximate coefficient (LL) and detailed
coefficient of horizontal (HL), vertical (LH) and diagonal (HH) shown in figure 5 of the input
image are estimated by using the equation (3).
Figure 5: Wavelet decomposition
ࢃ′ሺ࢓, ࢔ሻ ൌ
૚
√ࡹࡺ
∑ ∑ ࢌሺ࢞, ࢟ሻࢻሺ࢞, ࢟ሻ ൅
૚
√ࡹࡺ
ࡺି૚
࢐ୀࢁ
ࡹି૚
࢏ୀࢁ ∑ ∑ ࢌሺ࢞, ࢟ሻΩሺ࢞, ࢟ሻࡺି૚
࢐ୀࢁ
ࡹି૚
࢏ୀࢁ (3)
Where W (m, n) is the Wavelet Series of the host image.
b. The fingerprint image is embedded in the coefficient of LL and HH by using the equation (4) and (5)
LLi,j൐ ݄ܶ‫ܮܮ‬ ݄ܶ݁݊ ∑ ∑ ࡸࡸሺ࢏, ࢐ሻ ൅ ɛ ∗ ࡸࡸሺ࢏, ࢐ሻ ∗ ࢃሺ࢏, ࢐ሻࡺି૚
࢐ୀ૙
ࡹିࡺ
࢏ୀ૙ (4)
LL’i,j= LLi,j Else
HHi,j ൐ ݄ܶ‫ܪܪ‬ ࢀࢎࢋ࢔ ∑ ∑ ࡸࡸሺ࢏, ࢐ሻ ൅ ɛ ∗ ࡴࡴሺ࢏, ࢐ሻ ∗ ࢃሺ࢏, ࢐ሻࡺି૚
࢐ୀ૙
ࡹିࡺ
࢏ୀ૙ (5)
HH’i,j= HHi,j ࡱ࢒࢙ࢋ
30
www.arpublication.org
Where m is height of original image, n is the width of original image. The threshold value of
the approximate coefficient LLi, j for embedding the watermarking is defined as ThLL of 15
with the embedding strength of is 0.06. Then the detailed coefficients HHi, j is embedded with
W using the threshold value of ThHH is 45 and embedding strength of is 3.5. The constant
values will be varied according to the visibility of the watermarked image.
c. The watermarked image is obtained by applying inverse discrete wavelet transform (IDWT)
on the coefficient obtained during step 2 using equation (6).
ࢌ′ሺ࢓, ࢔ሻ ൌ
૚
√ࡹࡺ
ሺ∑ ∑ ࢃሺ࢐, ࢓, ࢔ሻࢻሺ࢞, ࢟ሻ ൅ࡺି૚
࢐ୀࢁ
ࡹି૚
࢏ୀࢁ ∑ ∑ ࢃሺ࢐, ࢓, ࢔ሻΩሺ࢞, ࢟ሻሻࡺି૚
࢐ୀࢁ
ࡹି૚
࢏ୀࢁ (6)
b) Extracting Watermark
In the extraction process, the watermarked image and the copyright image (fingerprint image)
are processed by the following steps
a. The watermarked image is decomposed using wavelets gives approximate coefficient (LL)
and detailed coefficient of horizontal (HL), vertical (LH) and diagonal (HH) of the input image
are estimated by using the equation (7)
ࢃᇱ
ሺ࢓, ࢔ሻ ൌ
૚
√ࡹࡺ
∑ ∑ ࢌᇱ
ሺ࢓, ࢔ሻࢻሺ࢞, ࢟ሻ ൅
૚
√ࡹࡺ
ࡺି૚
࢐ୀࢁ
ࡹି૚
࢏ୀࢁ ∑ ∑ ࢌᇱ
ሺ࢓, ࢔ሻΩሺ࢞, ࢟ሻࡺି૚
࢐ୀࢁ
ࡹି૚
࢏ୀࢁ (7)
b. The watermarked image is extracted using the equation (8) and (9).
LL’i,j ൐ ݄ܶ‫ܮܮ‬ ݄ܶ݁݊ ∑ ∑ ࢆࡸሺ࢏, ࢐ሻ ൅ ࡸࡸሺ࢏, ࢐ሻ ∗ ࢃሺ࢏, ࢐ሻࡺି૚
࢐ୀ૙
ࡹିࡺ
࢏ୀ૙ (8)
LL’’i,j = LL’i,j Else
HH’i,j ൐ ݄ܶ‫ܪܪ‬ ࢀࢎࢋ࢔ ∑ ∑ ࢆࡸሺ࢏, ࢐ሻ ൅ ࡴࡴሺ࢏, ࢐ሻ ∗ ࢃሺ࢏, ࢐ሻࡺି૚
࢐ୀ૙
ࡹିࡺ
࢏ୀ૙ (9)
HH’’i,j= HH’i,j ࡱ࢒࢙ࢋ
Where ZL (i, j) is 0
c. The inverse DWT (IDWT) is applied on the coefficient obtained during step 2 using
equation (10). The fingerprint image (copyright image) is extracted.
ࢌሺ࢓, ࢔ሻ ൌ
૚
√ࡹࡺ
ሺ∑ ∑ ࢃ′ሺ࢐, ࢓, ࢔ሻࢻሺ࢞, ࢟ሻ ൅ࡺି૚
࢐ୀࢁ
ࡹି૚
࢏ୀࢁ ∑ ∑ ࢃ′ሺ࢐, ࢓, ࢔ሻΩሺ࢞, ࢟ሻሻࡺି૚
࢐ୀࢁ
ࡹି૚
࢏ୀࢁ (10)
4. ENCRYPTION-WATERMARKING COMBINATION
Recall that the asymmetric methods are not suitable for encrypting images because they are
too long computation time. We should therefore use a conventional secret key encryption with
transmission channel for transferring the key.
We have developed a method that combines a symmetric encryption algorithm for image,
asymmetric encryption algorithm to encrypt the secret key and discrete wavelet transform for
watermarking.
We suppose that a person M wish to send an image securely to another person S. M will use a
symmetric algorithm to encrypt the image.
International journal of Computer Networking and Communication (IJCNAC)Vol. 1, No. 1(August 2013) 31
www.arpublication.org
In our approach, we have the choice to use a synchronous stream cipher or bloc cipher (AES)
to encrypt the image, while we will encrypt the secret key with an asymmetric algorithm such as
RSA.
Firstable, M generates his secret key to encrypt the image with it, then this secret key will be
encrypted too with a RSA public key ( RSApub-key) to obtain an encrypted secrete key k’ which
will be then inserted in the encrypted image using discrete wavelet transform (DWT) to get at the
end an encrypted watermarked image.
Finally, M send the image to S as shown in figure 6. S then receives the image, extracted the
mark (the encrypted secret key k’) and decrypted it using his RSA private key, So he can decrypt
the image that M send it to him and viewed it.
Fig.7 Encryption and watermarking combination
If M wants to send a new image to S, it will use a new secret key K1 for this new session. The
method will then be identical, but the public and private keys will not be used in the same order.
Although five keys are needed per session, most of them are transparent to users. In fact, the
private key can be associated with the software, and the two parties, it is not useful to know the
secret key that is inserted in the image. However, for each session, the value of the secret key K
must change. Indeed, if the secret key wasn’t changed every person has the software can encrypt
all images.
5. THE EXPERIMENTAL RESULTS
We applied our method to an image size of 64 * 64. First using the synchronous stream cipher
and secondly with the AES block cipher.
In following figures, we’ll show an example of our application with results.
Consider that Alice wants to send an image to Bob. First Bob should generate his public and
private key, and then send the public one to Alice. Figure 8 illustrates the generation of RSA
keys.
32
www.arpublication.org
Fig.9 Generation of RSA keys
Once the keys are generated, click on the button ‘send the public key’ to send the public key
and display the main interface. Figure 10 shows the main interface of the application.
Fig.10 Main interface
In this interface, we choose which method we want to encrypt our image, giving the radio
button to select whether we wish to encrypt by synchronous stream cipher or by block cipher
(AES). The secret key is displayed in the listbox.
The button ‘Encrypt the key by RSA’ is activated to allow encryption for the secret key of the
stream cipher by RSA;The result is displayed in the listbox surrounded below on figure 11.
International journal of Computer Networking and Communication (IJCNAC)Vol. 1, No. 1(August 2013) 33
www.arpublication.org
Fig.11 Result of secret key encrypted by RSA
After that Alice will watermark the stream cipher encrypted image by the encrypted secret key
using DWT, so she can send securely the encrypted watermarked image to Bob.
Once Bob got the image, hi will extract the mark (means the encrypted secret key) and
decrypted it using his RSA private key. Figure 12 shows the mark extracted and decrypted.
Fig.12 Extract and decrypt the mark from the watermarked image
After encrypting the image, we have watermarked it with the secret key using wavelet discrete
transform (figure 13.c) with a difference between the stream cipher encrypted image and the
encrypted watermarked image ( PSNR=32.32 db) appears on figure 13.e where we can see the
pixel used for watermarking. For the block cipher, the encrypted-watermarked image is shown on
figure 8.d with a difference (PSNR=41.29 db) illustrate in figure 13.f.
34
www.arpublication.org
After decryption, we can see very well the difference between using synchronous stream
cipher in figure 13.g (PSNR=18.62 db) and the bloc cipher (AES) in figure 13.h with
PSNR=8.09db.
Even after applying a noise for the encrypted watermarked image, we note that the stream
cipher is more robust to noise than the AES encryption with a difference (PSNR = 16.41db) for
decryption stream in figure 13.i and (PSNR = 8.02 db) in figure 13.j for the AES decryption.
(a) (b) (c) (d)
(e)
(f) (g) (h)
(i) (j)
Fig. 13 a) Stream cipher encrypted image, b) Image (a) watermarked, c) Difference between (a) and (b),
d) Image (b) decrypted with synchronous stream cipher, e) AES encrypted image, f) Image (e)
watermarked, g) Difference between (e) and (f), h) Image (f) decrypted with AES, i) i) Difference entre
original image and stream cipher decrypted image, j) Difference between the original and decrypted
image with AES
6. CONCLUSION
In this paper, we present a method combined encryption and watermarking algorithms for
images secure transfer. We choose to encrypt the image with a symmetric algorithm (stream
cipher synchronous and bloc cipher ‘AES’) and encrypt the image with an asymmetric algorithm
(RSA). To embed the encrypted key we use a discrete wavelet transform DWT, we prefer to use
multi resolution field because it resists noising that may occur during the transfer.
From the experimental results, we find that the method of stream ciphers makes the most
optimal final image, while the block cipher does not give good results.
International journal of Computer Networking and Communication (IJCNAC)Vol. 1, No. 1(August 2013) 35
www.arpublication.org
7. REFERENCES
[1] W. Puech, J. M. Rodrigues and J.-E. Develay-Morice. “Safe Transfert of Medical Images by
Conjoined Coding: Selective Encryption by AES Using the Stream Cipher Mode OFB and JPEG
Compression.” traitement du signal 2006_volume 23_numéro 6.
[2] S. Lian, Multimedia Content Encryption. CRC Press, 2009.
[3] P. Bas and S. K. et al., “First summary report on hybrid systems,” European Project IST-2002-
07932, ECRYPT - Network of Excellence in Cryptology, Deliverable D.WVL.5, 2005.
[4] N. Merhav, “On joint coding for watermarking and encryption,” IEEE Transactions on
Information Theory 52, January 2006.
[5] S. Lian, Z. Liu, and H. Wang, “Commutative watermarking and encryption for media data,”
Optical Engineering Letters 45, August 2006.
[6] Samir Kumar Bandyopadhyay and Tuhin Utsab Paul and Avishek Raychoudhur. “Invisible Digital
Watermarking Through Encryption » International Journal of Computer Applications (0975 –
8887) Volume 4– No.8, August 2010.
[7] D. Kundur and D. Hatzinakos. A robust digital image watermarking scheme using the wavelet-
based fusion. In IEEE Signal Processing Society 1997 International Conference on Image
Processing (ICIP'97), Santa Barbara, California, October 1997.
[8] J. Herrera-Joancomarti, S. Katzenbeisser, D. Megias, J. Minguillion, A. Pommer, M. Steinebach,
and A. Uhl, .ECRYPT European Network of Excellence in Cryptology, First Summary Report on
Hybrid Systems,. 2005. [Online]. Available: http://www.ecrypt.eu.org/ecrypt1/
documents/D.WVL.5-1.0.pdf.
[9] M.A. Mohamed and A.M. El-Mohandes “Hybrid DCT-DWT Watermarking and IDEA Encryption
of Internet Contents”. IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No
2, January 2012.
[10] Matt J. B. Robshaw, Stream Ciphers Technical Report TR-701, version 2.0, RSA Laboratories,
1995.
[11] Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, Niels Ferguson,
Tadayoshi Kohno, Mike Stay (May 2000). "The Twofish Team's Final Comments on AES
Selection".
[12] J. Daemen and V. Rijmen. The Design of Rijndael. SpringerVerlag New York, Inc. Secaucus, NJ,
USA, 2002.
[13] Pascal Junod et Serge Vaudenay. Une nouvelle famille d'algorithmes de chiffrement par bloc.
Université J. Fourier, Grenoble 2003.
[14] James Nechvatal, Elaine Barker, Lawrence Bassham, William Burr, Morris Dworkin, James Foti,
Roback, « Report on the Development of the Advanced Encryption Standard (AES) » , 2 octobre
2000. Consulté le 8 juin 2009.
[15] R. Anderson, E. Biham and L. Knudsen “The Case for Serpent” 24th March 2000.
[16] Rivest, R.; A. Shamir; L. Adleman (1978). "A Method for Obtaining Digital Signatures and
Public-Key Cryptosystems". Communications of the ACM 21 (2): 120–126.
[17] R.G. van Schyndel, A.Z. Tirkel, and C.F. Osborne, "A digital watermark", ICIP'94, vol. 2, pp. 86-
90, Austin, USA, 1994.
[18] J.J.K.O Ruanaidh, W.J. Dowling, and F.M. Boland, "Watermarking digital images for copryright
protection", IEE Proc.-Vis. Image Signal Process., vol. 143, n° 4, pp. 250-256, 1996.
[19] Mei Jiansheng,, Li Sukang and Tan Xiaomei “A Digital Watermarking Algorithm Based On DCT
and DWT” ISBN 978-952-5726-00-8 (Print), 978-952-5726-01-5 (CD-ROM)Proceedings of the
2009 International Symposium on Web Information Systems and Applications
(WISA’09)Nanchang, P. R. China, May 22-24, 2009, pp. 104-107.
Authors
Youssra LAKRISSI Obtained a master's degree in business
intelligence from the faculty of science and technology, Beni Mellal at
Morocco in 2013. Her research concerns image processing and
cryptography.
36
www.arpublication.org
Mohammed ERRITALI Obtained a master's degree in business
intelligence from the faculty of science and technology, Beni Mellal at
Morocco in 2010. His current interests include developing
specification and design techniques for use within Intelligent Network,
data mining, image processing and cryptography.
He is currently a professor at the Faculty of Science and
Technology, University Sultan Moulay Slimane , and also a member
of the LRI laboratory at the faculty of sciences, Mohamed V Agdal
University, Rabat.
Dr Mohamed FAKIR obtained a degree in Master of Electrical
Engineering from Nagaoka University of Technology in 1991 and a
Ph.D. degree in electrical engineering from the University of Cadi
Ayyad, Morocco. He was a team member in Hitachi Ltd., Japan
between 1991 and 1994. He is currently a professor at the Faculty of
Science and Technology, University Sultan Moulay Slimane,
Morocco.His research concerns the recognition and artificial
intelligence.

Más contenido relacionado

La actualidad más candente

Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniquePerformance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniqueAncy Mariam Babu
 
Encryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on MatlabEncryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on MatlabMuhammad Saif Ul Islam
 
Keyless approach of separable hiding data into encrypted image
Keyless approach of separable hiding data into encrypted imageKeyless approach of separable hiding data into encrypted image
Keyless approach of separable hiding data into encrypted imageprjpublications
 
Image Cryptography using RSA Algorithm
Image Cryptography using RSA AlgorithmImage Cryptography using RSA Algorithm
Image Cryptography using RSA Algorithmijtsrd
 
An Image Encryption using Chaotic Based Cryptosystem
An Image Encryption using Chaotic Based CryptosystemAn Image Encryption using Chaotic Based Cryptosystem
An Image Encryption using Chaotic Based Cryptosystemxlyle
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
File transfer using cryptography techniques
File transfer using cryptography techniquesFile transfer using cryptography techniques
File transfer using cryptography techniquesmiteshkumar82
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
 
Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java  Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java PiyushPatil73
 
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...IJCNCJournal
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanismShubham Patil
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: ReportAparna Nk
 

La actualidad más candente (20)

Thesis Background
Thesis BackgroundThesis Background
Thesis Background
 
Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniquePerformance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption technique
 
Encryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on MatlabEncryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on Matlab
 
Keyless approach of separable hiding data into encrypted image
Keyless approach of separable hiding data into encrypted imageKeyless approach of separable hiding data into encrypted image
Keyless approach of separable hiding data into encrypted image
 
Secure image encryption using aes
Secure image encryption using aesSecure image encryption using aes
Secure image encryption using aes
 
Image Cryptography using RSA Algorithm
Image Cryptography using RSA AlgorithmImage Cryptography using RSA Algorithm
Image Cryptography using RSA Algorithm
 
An Image Encryption using Chaotic Based Cryptosystem
An Image Encryption using Chaotic Based CryptosystemAn Image Encryption using Chaotic Based Cryptosystem
An Image Encryption using Chaotic Based Cryptosystem
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
File transfer using cryptography techniques
File transfer using cryptography techniquesFile transfer using cryptography techniques
File transfer using cryptography techniques
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
Image Security
Image SecurityImage Security
Image Security
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and Steganography
 
Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java  Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java
 
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT Approach
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanism
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: Report
 
Fx3610771081
Fx3610771081Fx3610771081
Fx3610771081
 

Destacado

Fast watermarking for digital content protecting using GPUs
Fast watermarking for digital content protecting using GPUsFast watermarking for digital content protecting using GPUs
Fast watermarking for digital content protecting using GPUsAmirali Sharifian
 
ROBUST LOSSLESS WATERMARKING OF RELATIONAL DATABASES USING MULTIMEDIA DATA_An...
ROBUST LOSSLESS WATERMARKING OF RELATIONAL DATABASES USING MULTIMEDIA DATA_An...ROBUST LOSSLESS WATERMARKING OF RELATIONAL DATABASES USING MULTIMEDIA DATA_An...
ROBUST LOSSLESS WATERMARKING OF RELATIONAL DATABASES USING MULTIMEDIA DATA_An...anjuvipin
 
color image watermarking
color image watermarkingcolor image watermarking
color image watermarkingsudhakar_icon
 

Destacado (6)

Fast watermarking for digital content protecting using GPUs
Fast watermarking for digital content protecting using GPUsFast watermarking for digital content protecting using GPUs
Fast watermarking for digital content protecting using GPUs
 
ROBUST LOSSLESS WATERMARKING OF RELATIONAL DATABASES USING MULTIMEDIA DATA_An...
ROBUST LOSSLESS WATERMARKING OF RELATIONAL DATABASES USING MULTIMEDIA DATA_An...ROBUST LOSSLESS WATERMARKING OF RELATIONAL DATABASES USING MULTIMEDIA DATA_An...
ROBUST LOSSLESS WATERMARKING OF RELATIONAL DATABASES USING MULTIMEDIA DATA_An...
 
color image watermarking
color image watermarkingcolor image watermarking
color image watermarking
 
Watermarking lecture #4
Watermarking lecture #4Watermarking lecture #4
Watermarking lecture #4
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Chapter1 2
Chapter1 2Chapter1 2
Chapter1 2
 

Similar a A Joint Encryption/Watermarking Algorithm for Secure Image Transfer

HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERINGHYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERINGIJNSA Journal
 
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...IJECEIAES
 
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY IJCNCJournal
 
REAL-TIME MODE HOPPING OF BLOCK CIPHER ALGORITHMS FOR MOBILE STREAMING
REAL-TIME MODE HOPPING OF BLOCK CIPHER  ALGORITHMS FOR MOBILE STREAMINGREAL-TIME MODE HOPPING OF BLOCK CIPHER  ALGORITHMS FOR MOBILE STREAMING
REAL-TIME MODE HOPPING OF BLOCK CIPHER ALGORITHMS FOR MOBILE STREAMINGijwmn
 
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...CSCJournals
 
Iaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure imageIaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure imageIaetsd Iaetsd
 
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...IJERA Editor
 
Protection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based SystemProtection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based SystemIRJET Journal
 
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERSA NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERSIJNSA Journal
 
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEDESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEIJNSA Journal
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET Journal
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...Kimberly Thomas
 
Comparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationComparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationIJTET Journal
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
 
Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...CSCJournals
 
DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...
DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...
DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...cscpconf
 
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block CiphersA Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block CiphersIJNSA Journal
 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...IJCNCJournal
 

Similar a A Joint Encryption/Watermarking Algorithm for Secure Image Transfer (20)

HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERINGHYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
 
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...
 
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
 
REAL-TIME MODE HOPPING OF BLOCK CIPHER ALGORITHMS FOR MOBILE STREAMING
REAL-TIME MODE HOPPING OF BLOCK CIPHER  ALGORITHMS FOR MOBILE STREAMINGREAL-TIME MODE HOPPING OF BLOCK CIPHER  ALGORITHMS FOR MOBILE STREAMING
REAL-TIME MODE HOPPING OF BLOCK CIPHER ALGORITHMS FOR MOBILE STREAMING
 
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
 
Iaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure imageIaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure image
 
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
 
18. 23367.pdf
18. 23367.pdf18. 23367.pdf
18. 23367.pdf
 
Protection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based SystemProtection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based System
 
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERSA NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
 
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEDESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
 
Comparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationComparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure Communication
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
 
Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...
 
DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...
DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...
DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...
 
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block CiphersA Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 

Más de ijcnac

Designing Financial Information System Using Structured System Analysis and D...
Designing Financial Information System Using Structured System Analysis and D...Designing Financial Information System Using Structured System Analysis and D...
Designing Financial Information System Using Structured System Analysis and D...ijcnac
 
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGES
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGESEFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGES
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGESijcnac
 
A Comparative Analysis of the Performance of VoIP Traffic with Different Type...
A Comparative Analysis of the Performance of VoIP Traffic with Different Type...A Comparative Analysis of the Performance of VoIP Traffic with Different Type...
A Comparative Analysis of the Performance of VoIP Traffic with Different Type...ijcnac
 
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...ijcnac
 
The Escalating Nigeria National Security Challenge: Smart Objects and Interne...
The Escalating Nigeria National Security Challenge: Smart Objects and Interne...The Escalating Nigeria National Security Challenge: Smart Objects and Interne...
The Escalating Nigeria National Security Challenge: Smart Objects and Interne...ijcnac
 
Performance Analysis and Simulation of OLSR Routing Protocol in MANET
Performance Analysis and Simulation of  OLSR Routing Protocol in MANET Performance Analysis and Simulation of  OLSR Routing Protocol in MANET
Performance Analysis and Simulation of OLSR Routing Protocol in MANET ijcnac
 
BookyScholia: A Methodology for the Investigation of Expert Systems
BookyScholia: A Methodology for the  Investigation of Expert SystemsBookyScholia: A Methodology for the  Investigation of Expert Systems
BookyScholia: A Methodology for the Investigation of Expert Systemsijcnac
 
Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...
Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...
Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...ijcnac
 
Study of Polarization Mode Dispersion in the Optical Digital Connection to Hi...
Study of Polarization Mode Dispersion in the Optical Digital Connection to Hi...Study of Polarization Mode Dispersion in the Optical Digital Connection to Hi...
Study of Polarization Mode Dispersion in the Optical Digital Connection to Hi...ijcnac
 

Más de ijcnac (9)

Designing Financial Information System Using Structured System Analysis and D...
Designing Financial Information System Using Structured System Analysis and D...Designing Financial Information System Using Structured System Analysis and D...
Designing Financial Information System Using Structured System Analysis and D...
 
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGES
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGESEFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGES
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGES
 
A Comparative Analysis of the Performance of VoIP Traffic with Different Type...
A Comparative Analysis of the Performance of VoIP Traffic with Different Type...A Comparative Analysis of the Performance of VoIP Traffic with Different Type...
A Comparative Analysis of the Performance of VoIP Traffic with Different Type...
 
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
 
The Escalating Nigeria National Security Challenge: Smart Objects and Interne...
The Escalating Nigeria National Security Challenge: Smart Objects and Interne...The Escalating Nigeria National Security Challenge: Smart Objects and Interne...
The Escalating Nigeria National Security Challenge: Smart Objects and Interne...
 
Performance Analysis and Simulation of OLSR Routing Protocol in MANET
Performance Analysis and Simulation of  OLSR Routing Protocol in MANET Performance Analysis and Simulation of  OLSR Routing Protocol in MANET
Performance Analysis and Simulation of OLSR Routing Protocol in MANET
 
BookyScholia: A Methodology for the Investigation of Expert Systems
BookyScholia: A Methodology for the  Investigation of Expert SystemsBookyScholia: A Methodology for the  Investigation of Expert Systems
BookyScholia: A Methodology for the Investigation of Expert Systems
 
Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...
Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...
Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...
 
Study of Polarization Mode Dispersion in the Optical Digital Connection to Hi...
Study of Polarization Mode Dispersion in the Optical Digital Connection to Hi...Study of Polarization Mode Dispersion in the Optical Digital Connection to Hi...
Study of Polarization Mode Dispersion in the Optical Digital Connection to Hi...
 

Último

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 

Último (20)

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 

A Joint Encryption/Watermarking Algorithm for Secure Image Transfer

  • 1. International journal of Computer Networking and Communication (IJCNAC)Vol. 1, No. 1(August 2013) 25 www.arpublication.org A Joint Encryption/Watermarking Algorithm for Secure Image Transfer Youssra LAKRISSI, Mohammed ERRITALI, Mohammed FAKIR Information Processing and Telecommunication Teams, University Sultan Moulay Slimane, Benimallal, Morocco lakrissi.youssra@gmail.com m.erritali@usms.ma fakfad@yahoo.fr Abstract This paper presents a method combining encryption and watermarking for secure images transfer. The proposed solution gives access to the outcomes of the image integrity and of its origins as its attachment to one user even if the image is stored encrypted. This method is based on the combination of encryption algorithms public- private keys and secret keys, and watermarking. The algorithm for image encryption uses a secret key. We encrypt the secret key with an asymmetric algorithm. This encrypted secret key is then inserted into the encrypted image using watermark algorithm. Keywords: Encryption, symmetric encryption, asymmetric encryption, hybrid encryption, stream cipher, bloc cipher, watermarking, discrete wavelet transform. 1. INTRODUCTION Rapid growth of Internet has contributed a lot in the increase of multimedia contents over internet including digital images and videos. Due to exponential rise in multimedia contents, it has become a trend to share information using digital images and video and at the same time it has become a challenging issue to protect these contents from tempering in order to avoid a misuse and retain confidentiality of data [1]. The security of data is pursued by assuring, among others authentication, to verify the identity claimed by or for any system entity, data confidentiality to protect data against unauthorized disclosure, data integrity to verify that data have been changed, destroyed or lost in an accidental manner [1]. Actually, encrypted data need an additional level of protection in order to keep control on them after the decryption phase. In fact, when the ciphered data is deciphered by the authorized user, it is unprotected and it can be easily modified, tampered, or stolen. The scientific community started focusing on the possibility of providing both security services simultaneously and therefore to have the chance of watermarking encrypted data and detecting the watermark before and after decryption. This allows to work in the encrypted domain, operating on ciphered data without giving access to the plain one and increasing the operation efficiency. Lian et al [2] draw a detailed scenario concerning video encryption and video watermarking and proposes a new combined approach. Bas et al [3] give an overview on the possible scenarios where the combination of both level of protection can be exploited, while Merhav [4] presents a theoretic analysis of this problem. In literature a commutative scheme is presented by Lian et al [5]: the image is wavelet transformed and some sub bands are ciphered while some others are both ciphered (with sign encryption) and watermarked.
  • 2. 26 www.arpublication.org In fact several methods have been developed to solve the problems of security and authenticity in image transfer. In this paper, we present a hybrid coding approach where we propose to use several types of encryption with the watermarking in order to secure the image transmission. Samir Kumar [6] proposed a technique for invisible Digital Watermarking through Encryption where the image is encoded within another image (cover image). Firstly, the cover image and the target image can be adjusted by resize function. Secondly, only the final encrypted image i.e. cover image and target image is sent over the network. This image is finally decoded at the receiver end. Puech and Rodrigues [1] present a method of partial or selective encryption for JPEG images. It is based on encoding of some Huffman bit stream with AES cipher. We propose a method combining symmetric encryption and watermarking which is robust to noise and ensure the integrity (perceptual) and the Authenticity of image beside of hiding associated data (high capacity) in image. This approach can access in different resolution levels of image due to the wavelet watermarking and can process in real time. Before embedding the secret key in the image, we are going to crypt it with an asymmetric algorithm. At the reception, only public-private key will be needed to extract and decrypt the secret key to get our image legible. To encrypt the image, we have chosen to work with a symmetric stream cipher and symmetric bloc cipher so we can make a comparison between them. To embed the secret key, we selected a watermarking method based on discrete wavelet transform DWT [7]. The remainder of this paper is organized as follow. In Section II, we explain the encryption a watermarking algorithms and in section III we detail the proposed method, before concluding, we illustrate the results and discuss the performances of our approach in Sections 3 and 4 respectively. 2. RELATED WORK 2.1 Commutative Watermarking-Encryption (CWE) One approach to commutative watermarking is provided by deploying homomorphic encryption techniques so that some basic algebraic operations such as addition and multiplication on the plaintexts can be transferred onto the corresponding cipher texts, i.e., they are transparent to encryption [8]. Especially, if both the encryption and the watermarking process consist of the same homomorphic operation, one gets a commutative watermarking-encryption scheme. Examples of homomorphic operations are exponentiation modulo n, multiplication modulo n, addition modulo n and the XOR operation. One major drawback of this approach is the influence of encryption on robustness of the watermarking algorithm because after encryption there is no visual information available for the watermark embedder to adapt itself to increase robustness while at the same time minimizing visual quality degradation [2]. In partial encryption schemes, the plaintext multimedia data is partitioned into two disjoint parts, where one part is encrypted and the other part is watermarked. Since the encryption part is independent of the watermarking part, they are naturally commutative. Because there is some information leakage through the unencrypted parts, in order to get a high level of perceptual security, the data parts which are significant for perception are encrypted, while only the perceptually unimportant parts are watermarked, leaving the door open for an attacker trying to remove the watermark. This lack of robustness against malicious attacks seems to be a general problem with CWE.
  • 3. International journal of Computer Networking and Communication (IJCNAC)Vol. 1, No. 1(August 2013) 27 www.arpublication.org 2.2 Hybrid DCT-DWT Watermarking and IDEA Encryption of Internet Contents M.A. Mohamed [9] proposed a hybrid image protection scheme to establish a relation between the data encryption key and the watermark. Prepositioned secret sharing allows the reconstruction of different encryption keys by communicating different activating shares for the same prepositioned information. Each activating share is used by the receivers to generate a fresh content decryption key. In the proposed scheme, the activating share is used to carry copyright or usage rights data. The bit stream that represents this data is also embedded in the content as a visual watermark. When the encryption key needs to change, the data source generates a new activating share, and encrypts the corresponding data with the key constructed from the new activating share. Before transmission, the encrypted data is embedded in a multimedia stream. Each receiver can extract the encrypted data from the host image, and decrypt this data after reconstructing the same key. 3. ENCRYPTION AND WATERMARKING ALGORITHMS USED 3.1 Encryption Algorithm a) Symmetric Stream Cipher In cryptography, a stream cipher is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (key stream). In a stream cipher each plaintext digit is encrypted one at a time with the corresponding digit of the key stream, to give a digit of the ciphertext stream [10]. An alternative name is a state cipher, as the encryption of each digit is dependent on the current state. In practice, a digit is typically a bit and the combining operation an exclusive-or (XOR). A stream cipher generates successive elements of the key stream based on an internal state [10]. This state is updated in essentially two ways: if the state changes independently of the plaintext or ciphertext messages, the cipher are classified as a synchronous stream cipher as shown in figure 1. By contrast, self-synchronising stream ciphers update their state based on previous cipher text digits as shown in figure 2. Fig.1 Principle of synchronous stream cipher Fig.2 Principle of auto-synchronous stream cipher b) Symmetric Bloc Cipher (AES) AES is based on a design principle known as a substitution-permutation network, and is fast in both software and hardware [11]. AES is a variant of Rijndael [12] which has a fixed block
  • 4. 28 www.arpublication.org size of 128 bits, and a key size of 128, 192, or 256 bits. By contrast, the Rijndael specification per se is specified with block and key sizes that may be any multiple of 32 bits, both with a minimum of 128 and a maximum of 256 bits [13]. AES operates on a 4×4 column-major order matrix of bytes, termed the state, although some versions of Rijndael have a larger block size and have additional columns in the state. Most AES calculations are done in a special finite field. The key size used for an AES cipher specifies the number of repetitions of transformation rounds that convert the input, called the plaintext, into the final output, called the ciphertext. The number of cycles of repetition are as follow: • 10 cycles of repetition for 128-bit keys [13]. • 12 cycles of repetition for 192-bit keys [14]. • 14 cycles of repetition for 256-bit keys [15]. Each round consists of several processing steps, each containing five similar but different stages, including one that depends on the encryption key itself. A set of reverse rounds are applied to transform ciphertext back into the original plaintext using the same encryption key. Figure 3 shows the principle of AES encryption Fig.3 AES encryption [1] c) Asymmetric Encryption (RSA): RSA is an algorithm for public-key cryptography that is based on the presumed difficulty of factoring large integers, the factoring problem [16]. The RSA algorithm involves three steps: key generation, encryption and decryption. A user of RSA creates and then publishes the product of two large prime numbers, along with an auxiliary value, as their public key. The prime factors must be kept secret. Anyone can use the public key to encrypt a message, but with currently published methods, if the public key is large enough, only someone with knowledge of the prime factors can feasibly decode the message [16]. Whether breaking RSA encryption is as hard as factoring is an open question known as the RSA problem. Figure 4 shows the principle of asymmetric cryptography Fig.4 Asymmetric encryption
  • 5. International journal of Computer Networking and Communication (IJCNAC)Vol. 1, No. 1(August 2013) 29 www.arpublication.org 3.2 Watermarking Method The concept of Image watermarking mainly came into existence in 1990s because of the widespread of the Internet [17]. At that time an invisible watermark message was inserted into an image which is to be transferred such that the invisible message will survive intended or unintended attacks. The process of watermarking begins when the encoder inserts watermark into image, producing watermarked image. The decoder extracts and validates the presence of watermarked input or unmarked input [18]. The transform domain watermarking systems are based on Fourier and Cosine transform which are the invertible transform applied to the image where the coefficients are modified by the watermark data. The Discrete Cosine transform watermarking [19] divides the image into different frequency band and choose the middle frequency band for watermarking. The method that we are going to use on our approach is wavelet watermarking. The Wavelet domain watermarking system is the multi-band watermarking scheme. The attacker may not be able to detect the embedded watermark without knowing the parameter. The original image is decomposed into wavelet coefficients and then multi-energy watermarking scheme based on the qualified significant wavelet tree. a) Embedding Watermark The host image is taken as the input is decomposed with the fingerprint image using wavelet transform. The fingerprint image of is taken as the copyright image is embedded in the approximate and detailed coefficient diagonally of the host image. Then the inverse wavelet transform is applied on these coefficients. The embedding process is performed by using the following steps: a. The image is decomposed using wavelet gives approximate coefficient (LL) and detailed coefficient of horizontal (HL), vertical (LH) and diagonal (HH) shown in figure 5 of the input image are estimated by using the equation (3). Figure 5: Wavelet decomposition ࢃ′ሺ࢓, ࢔ሻ ൌ ૚ √ࡹࡺ ∑ ∑ ࢌሺ࢞, ࢟ሻࢻሺ࢞, ࢟ሻ ൅ ૚ √ࡹࡺ ࡺି૚ ࢐ୀࢁ ࡹି૚ ࢏ୀࢁ ∑ ∑ ࢌሺ࢞, ࢟ሻΩሺ࢞, ࢟ሻࡺି૚ ࢐ୀࢁ ࡹି૚ ࢏ୀࢁ (3) Where W (m, n) is the Wavelet Series of the host image. b. The fingerprint image is embedded in the coefficient of LL and HH by using the equation (4) and (5) LLi,j൐ ݄ܶ‫ܮܮ‬ ݄ܶ݁݊ ∑ ∑ ࡸࡸሺ࢏, ࢐ሻ ൅ ɛ ∗ ࡸࡸሺ࢏, ࢐ሻ ∗ ࢃሺ࢏, ࢐ሻࡺି૚ ࢐ୀ૙ ࡹିࡺ ࢏ୀ૙ (4) LL’i,j= LLi,j Else HHi,j ൐ ݄ܶ‫ܪܪ‬ ࢀࢎࢋ࢔ ∑ ∑ ࡸࡸሺ࢏, ࢐ሻ ൅ ɛ ∗ ࡴࡴሺ࢏, ࢐ሻ ∗ ࢃሺ࢏, ࢐ሻࡺି૚ ࢐ୀ૙ ࡹିࡺ ࢏ୀ૙ (5) HH’i,j= HHi,j ࡱ࢒࢙ࢋ
  • 6. 30 www.arpublication.org Where m is height of original image, n is the width of original image. The threshold value of the approximate coefficient LLi, j for embedding the watermarking is defined as ThLL of 15 with the embedding strength of is 0.06. Then the detailed coefficients HHi, j is embedded with W using the threshold value of ThHH is 45 and embedding strength of is 3.5. The constant values will be varied according to the visibility of the watermarked image. c. The watermarked image is obtained by applying inverse discrete wavelet transform (IDWT) on the coefficient obtained during step 2 using equation (6). ࢌ′ሺ࢓, ࢔ሻ ൌ ૚ √ࡹࡺ ሺ∑ ∑ ࢃሺ࢐, ࢓, ࢔ሻࢻሺ࢞, ࢟ሻ ൅ࡺି૚ ࢐ୀࢁ ࡹି૚ ࢏ୀࢁ ∑ ∑ ࢃሺ࢐, ࢓, ࢔ሻΩሺ࢞, ࢟ሻሻࡺି૚ ࢐ୀࢁ ࡹି૚ ࢏ୀࢁ (6) b) Extracting Watermark In the extraction process, the watermarked image and the copyright image (fingerprint image) are processed by the following steps a. The watermarked image is decomposed using wavelets gives approximate coefficient (LL) and detailed coefficient of horizontal (HL), vertical (LH) and diagonal (HH) of the input image are estimated by using the equation (7) ࢃᇱ ሺ࢓, ࢔ሻ ൌ ૚ √ࡹࡺ ∑ ∑ ࢌᇱ ሺ࢓, ࢔ሻࢻሺ࢞, ࢟ሻ ൅ ૚ √ࡹࡺ ࡺି૚ ࢐ୀࢁ ࡹି૚ ࢏ୀࢁ ∑ ∑ ࢌᇱ ሺ࢓, ࢔ሻΩሺ࢞, ࢟ሻࡺି૚ ࢐ୀࢁ ࡹି૚ ࢏ୀࢁ (7) b. The watermarked image is extracted using the equation (8) and (9). LL’i,j ൐ ݄ܶ‫ܮܮ‬ ݄ܶ݁݊ ∑ ∑ ࢆࡸሺ࢏, ࢐ሻ ൅ ࡸࡸሺ࢏, ࢐ሻ ∗ ࢃሺ࢏, ࢐ሻࡺି૚ ࢐ୀ૙ ࡹିࡺ ࢏ୀ૙ (8) LL’’i,j = LL’i,j Else HH’i,j ൐ ݄ܶ‫ܪܪ‬ ࢀࢎࢋ࢔ ∑ ∑ ࢆࡸሺ࢏, ࢐ሻ ൅ ࡴࡴሺ࢏, ࢐ሻ ∗ ࢃሺ࢏, ࢐ሻࡺି૚ ࢐ୀ૙ ࡹିࡺ ࢏ୀ૙ (9) HH’’i,j= HH’i,j ࡱ࢒࢙ࢋ Where ZL (i, j) is 0 c. The inverse DWT (IDWT) is applied on the coefficient obtained during step 2 using equation (10). The fingerprint image (copyright image) is extracted. ࢌሺ࢓, ࢔ሻ ൌ ૚ √ࡹࡺ ሺ∑ ∑ ࢃ′ሺ࢐, ࢓, ࢔ሻࢻሺ࢞, ࢟ሻ ൅ࡺି૚ ࢐ୀࢁ ࡹି૚ ࢏ୀࢁ ∑ ∑ ࢃ′ሺ࢐, ࢓, ࢔ሻΩሺ࢞, ࢟ሻሻࡺି૚ ࢐ୀࢁ ࡹି૚ ࢏ୀࢁ (10) 4. ENCRYPTION-WATERMARKING COMBINATION Recall that the asymmetric methods are not suitable for encrypting images because they are too long computation time. We should therefore use a conventional secret key encryption with transmission channel for transferring the key. We have developed a method that combines a symmetric encryption algorithm for image, asymmetric encryption algorithm to encrypt the secret key and discrete wavelet transform for watermarking. We suppose that a person M wish to send an image securely to another person S. M will use a symmetric algorithm to encrypt the image.
  • 7. International journal of Computer Networking and Communication (IJCNAC)Vol. 1, No. 1(August 2013) 31 www.arpublication.org In our approach, we have the choice to use a synchronous stream cipher or bloc cipher (AES) to encrypt the image, while we will encrypt the secret key with an asymmetric algorithm such as RSA. Firstable, M generates his secret key to encrypt the image with it, then this secret key will be encrypted too with a RSA public key ( RSApub-key) to obtain an encrypted secrete key k’ which will be then inserted in the encrypted image using discrete wavelet transform (DWT) to get at the end an encrypted watermarked image. Finally, M send the image to S as shown in figure 6. S then receives the image, extracted the mark (the encrypted secret key k’) and decrypted it using his RSA private key, So he can decrypt the image that M send it to him and viewed it. Fig.7 Encryption and watermarking combination If M wants to send a new image to S, it will use a new secret key K1 for this new session. The method will then be identical, but the public and private keys will not be used in the same order. Although five keys are needed per session, most of them are transparent to users. In fact, the private key can be associated with the software, and the two parties, it is not useful to know the secret key that is inserted in the image. However, for each session, the value of the secret key K must change. Indeed, if the secret key wasn’t changed every person has the software can encrypt all images. 5. THE EXPERIMENTAL RESULTS We applied our method to an image size of 64 * 64. First using the synchronous stream cipher and secondly with the AES block cipher. In following figures, we’ll show an example of our application with results. Consider that Alice wants to send an image to Bob. First Bob should generate his public and private key, and then send the public one to Alice. Figure 8 illustrates the generation of RSA keys.
  • 8. 32 www.arpublication.org Fig.9 Generation of RSA keys Once the keys are generated, click on the button ‘send the public key’ to send the public key and display the main interface. Figure 10 shows the main interface of the application. Fig.10 Main interface In this interface, we choose which method we want to encrypt our image, giving the radio button to select whether we wish to encrypt by synchronous stream cipher or by block cipher (AES). The secret key is displayed in the listbox. The button ‘Encrypt the key by RSA’ is activated to allow encryption for the secret key of the stream cipher by RSA;The result is displayed in the listbox surrounded below on figure 11.
  • 9. International journal of Computer Networking and Communication (IJCNAC)Vol. 1, No. 1(August 2013) 33 www.arpublication.org Fig.11 Result of secret key encrypted by RSA After that Alice will watermark the stream cipher encrypted image by the encrypted secret key using DWT, so she can send securely the encrypted watermarked image to Bob. Once Bob got the image, hi will extract the mark (means the encrypted secret key) and decrypted it using his RSA private key. Figure 12 shows the mark extracted and decrypted. Fig.12 Extract and decrypt the mark from the watermarked image After encrypting the image, we have watermarked it with the secret key using wavelet discrete transform (figure 13.c) with a difference between the stream cipher encrypted image and the encrypted watermarked image ( PSNR=32.32 db) appears on figure 13.e where we can see the pixel used for watermarking. For the block cipher, the encrypted-watermarked image is shown on figure 8.d with a difference (PSNR=41.29 db) illustrate in figure 13.f.
  • 10. 34 www.arpublication.org After decryption, we can see very well the difference between using synchronous stream cipher in figure 13.g (PSNR=18.62 db) and the bloc cipher (AES) in figure 13.h with PSNR=8.09db. Even after applying a noise for the encrypted watermarked image, we note that the stream cipher is more robust to noise than the AES encryption with a difference (PSNR = 16.41db) for decryption stream in figure 13.i and (PSNR = 8.02 db) in figure 13.j for the AES decryption. (a) (b) (c) (d) (e) (f) (g) (h) (i) (j) Fig. 13 a) Stream cipher encrypted image, b) Image (a) watermarked, c) Difference between (a) and (b), d) Image (b) decrypted with synchronous stream cipher, e) AES encrypted image, f) Image (e) watermarked, g) Difference between (e) and (f), h) Image (f) decrypted with AES, i) i) Difference entre original image and stream cipher decrypted image, j) Difference between the original and decrypted image with AES 6. CONCLUSION In this paper, we present a method combined encryption and watermarking algorithms for images secure transfer. We choose to encrypt the image with a symmetric algorithm (stream cipher synchronous and bloc cipher ‘AES’) and encrypt the image with an asymmetric algorithm (RSA). To embed the encrypted key we use a discrete wavelet transform DWT, we prefer to use multi resolution field because it resists noising that may occur during the transfer. From the experimental results, we find that the method of stream ciphers makes the most optimal final image, while the block cipher does not give good results.
  • 11. International journal of Computer Networking and Communication (IJCNAC)Vol. 1, No. 1(August 2013) 35 www.arpublication.org 7. REFERENCES [1] W. Puech, J. M. Rodrigues and J.-E. Develay-Morice. “Safe Transfert of Medical Images by Conjoined Coding: Selective Encryption by AES Using the Stream Cipher Mode OFB and JPEG Compression.” traitement du signal 2006_volume 23_numéro 6. [2] S. Lian, Multimedia Content Encryption. CRC Press, 2009. [3] P. Bas and S. K. et al., “First summary report on hybrid systems,” European Project IST-2002- 07932, ECRYPT - Network of Excellence in Cryptology, Deliverable D.WVL.5, 2005. [4] N. Merhav, “On joint coding for watermarking and encryption,” IEEE Transactions on Information Theory 52, January 2006. [5] S. Lian, Z. Liu, and H. Wang, “Commutative watermarking and encryption for media data,” Optical Engineering Letters 45, August 2006. [6] Samir Kumar Bandyopadhyay and Tuhin Utsab Paul and Avishek Raychoudhur. “Invisible Digital Watermarking Through Encryption » International Journal of Computer Applications (0975 – 8887) Volume 4– No.8, August 2010. [7] D. Kundur and D. Hatzinakos. A robust digital image watermarking scheme using the wavelet- based fusion. In IEEE Signal Processing Society 1997 International Conference on Image Processing (ICIP'97), Santa Barbara, California, October 1997. [8] J. Herrera-Joancomarti, S. Katzenbeisser, D. Megias, J. Minguillion, A. Pommer, M. Steinebach, and A. Uhl, .ECRYPT European Network of Excellence in Cryptology, First Summary Report on Hybrid Systems,. 2005. [Online]. Available: http://www.ecrypt.eu.org/ecrypt1/ documents/D.WVL.5-1.0.pdf. [9] M.A. Mohamed and A.M. El-Mohandes “Hybrid DCT-DWT Watermarking and IDEA Encryption of Internet Contents”. IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No 2, January 2012. [10] Matt J. B. Robshaw, Stream Ciphers Technical Report TR-701, version 2.0, RSA Laboratories, 1995. [11] Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, Niels Ferguson, Tadayoshi Kohno, Mike Stay (May 2000). "The Twofish Team's Final Comments on AES Selection". [12] J. Daemen and V. Rijmen. The Design of Rijndael. SpringerVerlag New York, Inc. Secaucus, NJ, USA, 2002. [13] Pascal Junod et Serge Vaudenay. Une nouvelle famille d'algorithmes de chiffrement par bloc. Université J. Fourier, Grenoble 2003. [14] James Nechvatal, Elaine Barker, Lawrence Bassham, William Burr, Morris Dworkin, James Foti, Roback, « Report on the Development of the Advanced Encryption Standard (AES) » , 2 octobre 2000. Consulté le 8 juin 2009. [15] R. Anderson, E. Biham and L. Knudsen “The Case for Serpent” 24th March 2000. [16] Rivest, R.; A. Shamir; L. Adleman (1978). "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems". Communications of the ACM 21 (2): 120–126. [17] R.G. van Schyndel, A.Z. Tirkel, and C.F. Osborne, "A digital watermark", ICIP'94, vol. 2, pp. 86- 90, Austin, USA, 1994. [18] J.J.K.O Ruanaidh, W.J. Dowling, and F.M. Boland, "Watermarking digital images for copryright protection", IEE Proc.-Vis. Image Signal Process., vol. 143, n° 4, pp. 250-256, 1996. [19] Mei Jiansheng,, Li Sukang and Tan Xiaomei “A Digital Watermarking Algorithm Based On DCT and DWT” ISBN 978-952-5726-00-8 (Print), 978-952-5726-01-5 (CD-ROM)Proceedings of the 2009 International Symposium on Web Information Systems and Applications (WISA’09)Nanchang, P. R. China, May 22-24, 2009, pp. 104-107. Authors Youssra LAKRISSI Obtained a master's degree in business intelligence from the faculty of science and technology, Beni Mellal at Morocco in 2013. Her research concerns image processing and cryptography.
  • 12. 36 www.arpublication.org Mohammed ERRITALI Obtained a master's degree in business intelligence from the faculty of science and technology, Beni Mellal at Morocco in 2010. His current interests include developing specification and design techniques for use within Intelligent Network, data mining, image processing and cryptography. He is currently a professor at the Faculty of Science and Technology, University Sultan Moulay Slimane , and also a member of the LRI laboratory at the faculty of sciences, Mohamed V Agdal University, Rabat. Dr Mohamed FAKIR obtained a degree in Master of Electrical Engineering from Nagaoka University of Technology in 1991 and a Ph.D. degree in electrical engineering from the University of Cadi Ayyad, Morocco. He was a team member in Hitachi Ltd., Japan between 1991 and 1994. He is currently a professor at the Faculty of Science and Technology, University Sultan Moulay Slimane, Morocco.His research concerns the recognition and artificial intelligence.