Skip to main content

A Hybrid Cryptographic and Steganographic Security Approach for Identity Management and Security of Digital Images

  • Conference paper
  • First Online:
Security in Computing and Communications (SSCC 2015)

Abstract

Privacy and security of image data are of paramount importance in our ever growing internet ecosystem of multimedia applications. Identity and security of image content play a major role in forensics and protection against media property theft. Copyright issues and ownership management as well as source identification within today’s cyberspace are very crucial. In our work, we proposed a hybrid technique of ensuring security of digital images as well as owner Identification by combining cryptographic and steganographic approaches. The steganography was used to embed a secret identification tag into the image which was engaged using a secret key. This was applied directly on the pixel values of the image used. The cryptographic technique was used to encrypt the image to conceal its visual contents. The implementation was done successfully and analysis of the output results was done using MATLAB.

This work was supported by Lab-STICC (UMR CNRS 6285) Research Laboratory, UBO France, AWBC Canada, Ambassade de France-Institut Français-Ghana and the DCSIT-UCC.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abbasi, A., Chen, H.: Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace. ACM Trans. Inf. Syst. (TOIS) 26(2), 7 (2008)

    Article  Google Scholar 

  2. Hung, J.-F., Rau, H.-H., Hsu, C.-Y., Chen, S.-C., Tsai, D.-J., Fann, Y., Park, J., Eng, J.: Implementing globally unique identifier architecture in date collection for a health management study in taiwan aboriginal tribe. In: Park, J.J(.J.H)., Pan, Y., Kim, C., Yang, Y. (eds.) Future Information Technology-II. LNEE, vol. 329, pp. 121–127. Springer, Heidelberg (2015)

    Google Scholar 

  3. Sun, J., Zhang, C., Fang, Y.: An Id-based framework achieving privacy and non-repudiation in vehicular ad hoc networks. In: IEEE Military Communications Conference, MILCOM 2007, pp. 1–7. IEEE, October 2007

    Google Scholar 

  4. Neuman, B.C., Ts’o, T.: Kerberos: An authentication service for computer networks. IEEE Commun. Mag. 32(9), 33–38 (1994)

    Article  Google Scholar 

  5. Acquisti, A., Gritzalis, S., Lambrinoudakis, C., di Vimercati, S. (eds.): Digital Privacy: Theory, Technologies, and Practices. CRC Press, Boca Raton (2007)

    Google Scholar 

  6. Bidgoli, H.: Handbook of Information Security: Information Warfare, Social, Legal, and International Issues and Security Foundations. Wiley, New York (2006). Vol. 2

    Google Scholar 

  7. Lazzez, A., Slimani, T.: Forensics investigation of web application security attacks. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 7(3), 10 (2015)

    Google Scholar 

  8. Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography. Morgan Kaufmann, San Francisco (2007)

    Google Scholar 

  9. Raggo, M.T., Hosmer, C.: Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems Mobile Devices and Network Protocols. Newnes, Oxford (2012)

    Google Scholar 

  10. Rebeiro, C., Mukhopadhyay, D., Bhattacharya, S.: Modern cryptography. In: Rebeiro, C., Mukhopadhyay, D., Bhattacharya, S. (eds.) Timing Channels in Cryptography, pp. 13–35. Springer, Heidelberg (2015)

    Google Scholar 

  11. Ren, N., Wang, Q., Zhu, C.: GIS spatial data updating algorithm based on digital watermarking technology. In: Bian, F., Xie, Y. (eds.) GRMSE 2014. CCIS, vol. 482, pp. 143–150. Springer, Heidelberg (2015)

    Chapter  Google Scholar 

  12. Schneier, B., Fredrikson, M., Kohno, T., Ristenpart, T.: Surreptitiously Weakening Cryptographic Systems (2015)

    Google Scholar 

  13. Farash, M.S.: Cryptanalysis and improvement of ‘an improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks’. Int. J. Netw. Manage. 25(1), 31–51 (2015)

    Article  Google Scholar 

  14. Mourouzis, T.: Optimizations in Algebraic and Differential Cryptanalysis (Doctoral dissertation, UCL (University College London)) (2015)

    Google Scholar 

  15. Duan, H., Luo, Q.: New progresses in swarm intelligence–based computation. Int. J. Bio-Inspired Comput. 7(1), 26–35 (2015)

    Article  MathSciNet  Google Scholar 

  16. Husien, S., Badi, H.: Artificial neural network for steganography. Neural Comput. Appl. 26(1), 111–116 (2015)

    Article  Google Scholar 

  17. Badhan, S., Juneja, M.: A novel approach for data hiding in color images using LSB based steganography with improved capacity and resistance to statistical attacks. In: Jain, L.C., Patnaik, S., Ichalkaranje, N. (eds.) Intelligent Computing, Communication and Devices, vol. 309, pp. 183–190. Springer, Heidelberg (2015)

    Google Scholar 

Download references

Acknowledgments

This work was supported by Lab-STICC (UMR CNRS 6285) at UBO France, AWBC Canada, Ambassade de France-Institut Français-Ghana and the DCSIT-UCC, and also Dominique Sotteau (formerly directeur de recherche, Centre national de la recherche scientifique (CNRS) in France and head of international relations, Institut national de recherche en informatique et automatique, INRIA) and currently the Scientific counselor of AWBC.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Quist-Aphetsi Kester .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Kester, QA., Nana, L., Pascu, A.C., Gire, S., Eghan, J.M., Quaynor, N.N. (2015). A Hybrid Cryptographic and Steganographic Security Approach for Identity Management and Security of Digital Images. In: Abawajy, J., Mukherjea, S., Thampi, S., Ruiz-Martínez, A. (eds) Security in Computing and Communications. SSCC 2015. Communications in Computer and Information Science, vol 536. Springer, Cham. https://doi.org/10.1007/978-3-319-22915-7_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-22915-7_22

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-22914-0

  • Online ISBN: 978-3-319-22915-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics