Skip to main content

An Efficient Privacy Preserving System Based on RST Attacks on Color Image

  • Conference paper
  • First Online:
Future Internet Technologies and Trends (ICFITT 2017)

Abstract

In Development of network communication need protect the transmission with fast Communication. Therefore, networking producers need to be constantly manage illegal use of the data. In our proposed approach, first step enter the user name and password then generate in text format that will be converted to QR-code using zxing library. Now the QR-code will be converted in to the share using Binary Visual cryptography algorithm. After that generated share-2 is save in the database that is for future reference at receiver side and share-1 is embedding into the R-Component LL bit using of block DWT-SVD and Pseudo Zernike moment. In embedded image further add G, B Component. So, Color watermark image is ready to transfer from the network. As in network there are different attackers apply RST attacks on the color watermark image and Generated attack Watermark Image. At the receiver side recover the attacks first apply Pseudo Zernike moment, Surf feature on R-component so, they will extract the attacks pixel and recover the scale-angle using affine transformation. Now share-1 and another share-2 is in data base so we will apply EX-OR operation to get the QR-Code. The final QR-code is decoded and we get the user name and password. This research work can give a way for providing authentication to all online Services.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Delphin Raj, K.M., Victor, N.: Secure QR coding of images using the techniques of encoding and encryption. Int. J. Appl. Eng. Res. 9(12), 2009–2017 (2014). ISSN 0973-4562

    Google Scholar 

  2. Ajish, S., Rajasree, R.: Secure mail using visual cryptography (SMVC). In: 5th ICCCNT 2014, 11–13 July 2014, Hefei, China (2014)

    Google Scholar 

  3. Gupta, A.K., Raval, M.S.: A robust and secure watermarking scheme based on singular values replacement. SaDhana 37(4), 425–440 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  4. Benoraira, A., Benmahammed, K., Boucenna, N.: Blind image watermarking technique based on differential embedding in DWT and DCT domains. EURASIP J. Adv. Sig. Process. 2015, 55 (2015)

    Article  Google Scholar 

  5. Gao, L., Gao, T., Sheng, G., Zhang, S.: Robust medical image watermarking scheme with rotation correction. In: Pan, J.-S., Snasel, V., Corchado, E.S., Abraham, A., Wang, S.-L. (eds.) Intelligent Data analysis and its Applications, Volume II. AISC, vol. 298, pp. 283–292. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-07773-4_28

    Google Scholar 

  6. Nguyen, S.C., Ha, K.H., Nguyen, H.M.: An improved image watermarking scheme using selective curvelet scales. In: 2015 International Conference on Advanced Technologies for Communications (ATC) (2015)

    Google Scholar 

  7. Saxena, V.: Collusion attack resistant watermarking scheme for images using DCT. IEEE (2014)

    Google Scholar 

  8. Bay, H., Ess, A., Tuytelaars, T., Van Gool, L.: Speeded-up robust features (SURF). Comput. Vis. Image Underst. 110, 346–359 (2007)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sheshang D. Degadwala .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Degadwala, S.D., Gaur, S. (2018). An Efficient Privacy Preserving System Based on RST Attacks on Color Image. In: Patel, Z., Gupta, S. (eds) Future Internet Technologies and Trends. ICFITT 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 220. Springer, Cham. https://doi.org/10.1007/978-3-319-73712-6_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-73712-6_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-73711-9

  • Online ISBN: 978-3-319-73712-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics