Watermarking for the Secure Transmission of the Key into an Encrypted Image
Keywords:
Image Encryption, Image Watermarking, Crypto-watermarking, Cryptanalysis, ChaosAbstract
Ensuring the confidentiality of any data exchanged always presents a great concern for all communication instances. Technically, encryption is the ideal solution for this task. However, this process must deal with the progress of the cryptanalysis that aims to disclose the information exchanged. The risk increases due to the need for a dual transmission that includes the encrypted medium and the decryption key. In a context of chaotic encryption of images, we propose to insert the decryption key into the encrypted image using image watermarking. Thus, only the watermarked encrypted image will be transmitted. Upon reception, the recipient extracts the key and decrypts the image. The cryptosystem proposed is based on an encryption using a dynamic Look-Up Table issued from a chaotic generator. The obtained results prove the efficiency of our method to ensure a secure exchange of images and keys.
References
Paar, C. & Pelzl, J. (2010). The Advanced Encryption Standard (AES), Springer, Berlin, Heidelberg, (pp. 87-121).
Biham, E. & Shamir, A. (2012). Differential cryptanalysis of the data encryption standard, Springer-Verlag.
Abdmouleh, M. K., Khalfallah, A. & Bouhlel, M. S. (2014). ‘A new watermarking technique for medical image using hierarchical encryption’, International Journal of Computer Science Issues (IJCSI), (Vol. 11, No. 4, pp. 27-32).
Abdmouleh, M. K., Khalfallah, A. & Bouhlel, M. S. (2016). A chaotic cryptosystem for color image with dynamic look-up table, in ‘Proceedings of the 7th International Conference on Image and Signal Processing (ICISP’16)’, Springer International Publishing, Trois-Rivieres, QC, Canada, (pp. 91-100).
Abd El-Latif, A. A., Li, L., Wang, N., Han, Q. & Niu, X. (2013). ‘A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces’, Signal Processing, (Vol. 93, No. 11, pp. 2986-3000).
Abdelhakim, A. M., Saleh, H. I. & Nassar, A. M. (2017). ‘A quality guaranteed robust image watermarking optimization with artificial bee colony’, Expert Syst. Appl., (Vol. 72, No. C, pp. 317-326).
Atee H. A., Ahmad, R., Noor, N. M., Rahma, A. M. S. & Aljeroudi, Y. (2017). ‘Extreme learning machine based optimal embedding location finder for image steganography’, PLoS ONE, (Vol. 12, No. 2).
Amri, H., Khalfallah, A., Gargouri, M., Nebhani, N., Lapayre, J. C. & Bouhlel, M. S. (2017). ‘Medical image compression approach based on image resizing, digital watermarking and lossless compression’, J. Signal Process. Syst., (Vol. 87, No. 2, pp. 203-214).
Lutovac, B., Daković, M., Stanković, S. & Orović, I. (2016). ‘An algorithm for robust image watermarking based on the DCT and Zernike moments’, Multimedia Tools and Applications, (pp. 1-20).
Khalfallah, A., Kammoun, F., Bouhlel, M. S. & Olivier, C. (2006). A new scheme of watermarking in multi-resolution filed by 5/3 wavelet: Family signature combined with the adapted embedding strength., in ‘2nd International Conference on Information Communication Technologies’, (pp. 1145-1152).
Kammoun, F., Khalfallah, A. & Bouhlel, M. S. (2006). ‘New scheme of digital watermarking using an adaptive embedding strength applied on multiresolution filed by 9/7 wavelet’, Int. J. Imaging Systems and Technology, (Vol. 16, No. 6, pp. 249-257).
Kaushik, P. & Sharma, Y. (2012). ‘Comparison of different image enhancement techniques based upon PSNR & MSE’, International Journal of Applied Engineering Research, (Vol. 7, No. 11).
Kumar, S. & Dutta, A. (2016). A novel spatial domain technique for digital image watermarking using block entropy, in ‘International Conference on Recent Trends in Information Technology (ICRTIT)’, (pp. 1-4).
Kishore Kumar, K. & Pavani, M. (2016). A new PCA based hybrid color image watermarking using cycle spinning - sharp frequency localized contour let transform for copyright protection, in ‘First International Conference on Smart Trends in Information Technology and Computer Communications (SmartCom 2016)’, Jaipur, India, (pp. 355-364).
Kuribayashi, M. & Schaathun, H.G. (2015). Image fingerprinting system based on collusion secure code and watermarking method, in ‘IEEE International Conference on Image Processing (ICIP)’, (pp. 2120-2124).
Liu, X. L., Lin, C.C., Chang, C.C. & Yuan, S.M. (2016). ‘A survey of fragile watermarking based image authentication techniques’, Journal of Information Hiding and Multimedia Signal Processing, (Vol. 7, No. 6, pp. 1282-1292).
Priyanka, S. M. (2017). ‘Region-based hybrid medical image watermarking for secure telemedicine applications’, Multimedia Tools and Applications, (Vol. 76, No. 3, pp. 3617-3647).
Amri, H., Khalfallah, A., Lapayre, J.-C. & Bouhlel, M.-S. (2016). ‘Watermarking for improving the reduction-expansion process of medical images (WREPro)’, International Journal of Imaging and Robotics (IJIR), (Vol. 16, No. 3, pp. 124-139).
Uhl, A. & Pommer, A. (2004). Image and Video Encryption: from Digital Rights Management to Secured Personal Communication (Advances in Information Security), Springer-Verlag TELOS, Santa Clara, CA, USA.
Stinson, D. R. (2006). Cryptography: theory and practice, Discrete mathematics and its applications, Chapman & Hall/CRC, Boca Raton.
Masmoudi, A., Bouhlel, M. S. & Puech, W. (2010). A new image cryptosystem based on chaotic map and continued fractions, in ‘18th European Signal Processing Conference (EUSIPCO)’, (pp. 1504-1508).
Abdmouleh, M. K., Khalfallah, A. & Bouhlel, M. S. (2012). Image encryptionwith dynamic chaotic look-up table, in ‘6th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)’, (pp. 331-337).
Abdmouleh, M. K., Khalfallah, A. & Bouhlel, M. S. (2013). Dynamic chaotic look-up table for MRI medical image encryption, in ‘International Conference on Systems, Control, Signal Processing and Informatics (SCSI)’, (pp. 241-246).
Rivest, R. L., Shamir, A. & Adleman, L. M. (1983). ‘A method for obtaining digital signatures and public-key cryptosystems’, Commun. ACM, (Vol. 26, No. 1, pp. 96-99).
Garfinkel, S. & Spafford, G. (1996). Practical UNIX and Internet security, 2nd ed, O’Reilly, Cambridge.
Abdmouleh, M. K., Khalfallah, A. &Bouhlel, M. S. (2012). Image encryption with dynamic chaotic look-up table, in ‘6th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)’, (pp. 331-337).
Biham, E. & Shamir, A. (1990). Differential cryptanalysis of DES-like cryptosystems, in ‘CRYPTO’, (pp. 2-21).
Huang, C. K. & Nien, H. H. (2009). ‘Multi chaotic systems based pixel shuffle for image encryption’, Optics Communications, (Vol. 282, No. 11, pp. 2123-2127).
Sam, I. S., Devaraj, P. & Bhuvaneswaran, R. S. (2010). Enhanced substitution-diffusion based image cipher using improved chaotic map, in ‘ICT’, (pp. 116-123).
Wang, Y., Wong, K. W., Liao, X. & Chen, G. (2011). ‘A new chaos-based fast image encryption algorithm’, Appl. Soft Comput., (Vol. 11, No. 1, pp. 514-522).
Shannon, C. E. (1948). ‘A Mathematical Theory of Communication’, The Bell System Technical Journal, (Vol. 27, No. 3, pp. 379-423).
Behnia, S., Akhshani, A., Mahmodi, H. & Akhavan, A. (2008). ‘A novel algorithm for image encryption based on mixture of chaotic maps’, Chaos, Solitons & Fractals, (Vol. 35, No. 2, pp. 408-419).
Furht, B., Socek, D., Li, S. & S. Magliveras, S. (2005). Enhanced 1-D chaotic key-based algorithm for image encryption, in ‘International Conference on Security and Privacy for Emerging Areas in Communications Networks’, IEEE Computer Society, Los Alamitos, CA, USA, (pp. 406-407).
Li, P., Li, Z., Halang, W. A. & Chen, G. (2007). ‘A stream cipher based on a spatiotemporal chaotic system’, Chaos Solitons and Fractals, (Vol. 32, No. 5, pp. 1867-1876).
Devaney, R. L. (2003). An Introduction to Chaotic Dynamical Systems, 2nd ed., Westview Pr (Short Disc).
Additional Files
Published
Issue
Section
License
ONLINE OPEN ACCES: Acces to full text of each article and each issue are allowed for free in respect of Attribution-NonCommercial 4.0 International (CC BY-NC 4.0.
You are free to:
-Share: copy and redistribute the material in any medium or format;
-Adapt: remix, transform, and build upon the material.
The licensor cannot revoke these freedoms as long as you follow the license terms.
DISCLAIMER: The author(s) of each article appearing in International Journal of Computers Communications & Control is/are solely responsible for the content thereof; the publication of an article shall not constitute or be deemed to constitute any representation by the Editors or Agora University Press that the data presented therein are original, correct or sufficient to support the conclusions reached or that the experiment design or methodology is adequate.