Abstract
Privacy and security of image data are of paramount importance in our ever growing internet ecosystem of multimedia applications. Identity and security of image content play a major role in forensics and protection against media property theft. Copyright issues and ownership management as well as source identification within today’s cyberspace are very crucial. In our work, we proposed a hybrid technique of ensuring security of digital images as well as owner Identification by combining cryptographic and steganographic approaches. The steganography was used to embed a secret identification tag into the image which was engaged using a secret key. This was applied directly on the pixel values of the image used. The cryptographic technique was used to encrypt the image to conceal its visual contents. The implementation was done successfully and analysis of the output results was done using MATLAB.
This work was supported by Lab-STICC (UMR CNRS 6285) Research Laboratory, UBO France, AWBC Canada, Ambassade de France-Institut Français-Ghana and the DCSIT-UCC.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abbasi, A., Chen, H.: Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace. ACM Trans. Inf. Syst. (TOIS) 26(2), 7 (2008)
Hung, J.-F., Rau, H.-H., Hsu, C.-Y., Chen, S.-C., Tsai, D.-J., Fann, Y., Park, J., Eng, J.: Implementing globally unique identifier architecture in date collection for a health management study in taiwan aboriginal tribe. In: Park, J.J(.J.H)., Pan, Y., Kim, C., Yang, Y. (eds.) Future Information Technology-II. LNEE, vol. 329, pp. 121–127. Springer, Heidelberg (2015)
Sun, J., Zhang, C., Fang, Y.: An Id-based framework achieving privacy and non-repudiation in vehicular ad hoc networks. In: IEEE Military Communications Conference, MILCOM 2007, pp. 1–7. IEEE, October 2007
Neuman, B.C., Ts’o, T.: Kerberos: An authentication service for computer networks. IEEE Commun. Mag. 32(9), 33–38 (1994)
Acquisti, A., Gritzalis, S., Lambrinoudakis, C., di Vimercati, S. (eds.): Digital Privacy: Theory, Technologies, and Practices. CRC Press, Boca Raton (2007)
Bidgoli, H.: Handbook of Information Security: Information Warfare, Social, Legal, and International Issues and Security Foundations. Wiley, New York (2006). Vol. 2
Lazzez, A., Slimani, T.: Forensics investigation of web application security attacks. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 7(3), 10 (2015)
Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography. Morgan Kaufmann, San Francisco (2007)
Raggo, M.T., Hosmer, C.: Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems Mobile Devices and Network Protocols. Newnes, Oxford (2012)
Rebeiro, C., Mukhopadhyay, D., Bhattacharya, S.: Modern cryptography. In: Rebeiro, C., Mukhopadhyay, D., Bhattacharya, S. (eds.) Timing Channels in Cryptography, pp. 13–35. Springer, Heidelberg (2015)
Ren, N., Wang, Q., Zhu, C.: GIS spatial data updating algorithm based on digital watermarking technology. In: Bian, F., Xie, Y. (eds.) GRMSE 2014. CCIS, vol. 482, pp. 143–150. Springer, Heidelberg (2015)
Schneier, B., Fredrikson, M., Kohno, T., Ristenpart, T.: Surreptitiously Weakening Cryptographic Systems (2015)
Farash, M.S.: Cryptanalysis and improvement of ‘an improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks’. Int. J. Netw. Manage. 25(1), 31–51 (2015)
Mourouzis, T.: Optimizations in Algebraic and Differential Cryptanalysis (Doctoral dissertation, UCL (University College London)) (2015)
Duan, H., Luo, Q.: New progresses in swarm intelligence–based computation. Int. J. Bio-Inspired Comput. 7(1), 26–35 (2015)
Husien, S., Badi, H.: Artificial neural network for steganography. Neural Comput. Appl. 26(1), 111–116 (2015)
Badhan, S., Juneja, M.: A novel approach for data hiding in color images using LSB based steganography with improved capacity and resistance to statistical attacks. In: Jain, L.C., Patnaik, S., Ichalkaranje, N. (eds.) Intelligent Computing, Communication and Devices, vol. 309, pp. 183–190. Springer, Heidelberg (2015)
Acknowledgments
This work was supported by Lab-STICC (UMR CNRS 6285) at UBO France, AWBC Canada, Ambassade de France-Institut Français-Ghana and the DCSIT-UCC, and also Dominique Sotteau (formerly directeur de recherche, Centre national de la recherche scientifique (CNRS) in France and head of international relations, Institut national de recherche en informatique et automatique, INRIA) and currently the Scientific counselor of AWBC.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Kester, QA., Nana, L., Pascu, A.C., Gire, S., Eghan, J.M., Quaynor, N.N. (2015). A Hybrid Cryptographic and Steganographic Security Approach for Identity Management and Security of Digital Images. In: Abawajy, J., Mukherjea, S., Thampi, S., Ruiz-Martínez, A. (eds) Security in Computing and Communications. SSCC 2015. Communications in Computer and Information Science, vol 536. Springer, Cham. https://doi.org/10.1007/978-3-319-22915-7_22
Download citation
DOI: https://doi.org/10.1007/978-3-319-22915-7_22
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-22914-0
Online ISBN: 978-3-319-22915-7
eBook Packages: Computer ScienceComputer Science (R0)