Skip to main content

Image Security Using Triple Key Chaotic Encryption and SPIHT Compression Technique in Steganography

  • Conference paper
  • First Online:

Part of the book series: Algorithms for Intelligent Systems ((AIS))

Abstract

In recent trend biometric authentication is been used extensively to authenticate the person remotely. So, it is necessary to secure the sensitive secret data by encryption, before transmitting over medium. This paper proposed a stout, highly secure authentication technique based on semantic segmentation, Triple key chaotic encryption and data hiding. If a user wants to be authenticated remotely, then firstly image is segmented to extract head and body parts through semantic segmentation. Second, take A’s fingerprint and encrypt it using Triple key chaotic encryption technique. Furthermore, qualified significant wavelet tree is used to place the encrypted signal in the most significant wavelet coefficient of image. Finally, Inverse Discrete Wavelet Transform is applied to obtain stego image. The output image is further compressed before transmission over wireless medium using Set Partition in Hierarchical Tree compression technique. This technique has good resistance against lossless transmission and compression. The performance measures are Peak signal to noise ratio, correlation index, information entropy and compression ratio.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Madero A (2013) Password secured systems and negative authentication. Ph.D. dissertation, Dept. Eng. Manage., Massachusetts Inst. Technol., Cambridge, MA, USA (Online). Available: http://hdl.handle.net/1721.1/90691

  2. Pascual A, Miller S (2013) Identity fraud report: data breaches becoming a treasure trove for fraudsters. Javelin Strategy Res., Pleasanton, CA, USA, Tech. Rep. 1/2013

    Google Scholar 

  3. Yoon E-J, Yoo K-Y (2013) Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem. J Supercomput 63(1):235–255

    Google Scholar 

  4. Chuang M-C, Chen MC (2014) An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics. Expert Syst Appl 41(4):1411–1418

    Google Scholar 

  5. Lamport L (1981) Password authentication with insecure communication. Commun ACM 24(11)770–772

    Google Scholar 

  6. Stallings W (2010) Cryptography and network security: principles and practice, 5th edn. Prentice-Hall, Upper Saddle River, NJ

    Google Scholar 

  7. Liao I-E, Lee C-C, Hwang M-S (2006) A password authentication scheme over insecure networks. J Comput Syst Sci 72(4):727–740

    Google Scholar 

  8. Jakobsson M, Dhiman M (2013) The benefits of understanding passwords. In: Mobile authentication (Springer Briefs in Computer Science). Springer, New York, NY, pp. 5–24

    Google Scholar 

  9. Weir M, Aggarwal S, Collins M, Stern H (2010) Testing metrics for password creation policies by attacking large sets of revealed passwords. In: Proceedings of the 17th ACM conference computer, communication and secure, pp 162–175

    Google Scholar 

  10. Wang Y-Y, Liu J-Y, Xiao F-X, Dan J (2009) A more efficient and secure dynamic ID-based remote user authentication scheme. Comput Commun 32(4):583–585

    Google Scholar 

  11. Khan MK, Kim S-K, Alghathbar K (2011) Cryptanalysis and security enhancement of a ‘more efficient & secure dynamic ID-based remote user authentication scheme’. Comput Commun 34(3):305–309

    Google Scholar 

  12. Yoon E-J, Kim S-H, Yoo K-Y (2012) A security enhanced remote user authentication scheme using smart cards. Int J Innov Comput Inf Control 8(5B):3661–3675

    Google Scholar 

  13. Madhusudhan R, Mittal RC (2012) Dynamic ID-based remote user password authentication schemes using smart cards: a review. Intell Algorithms Data-Centric Sens Netw 35(4):1235–1248

    Google Scholar 

  14. Das AK (2013) A secure and effective user authentication and privacy preserving protocol with smart cards for wireless communications. Netw Sci 2(1–2):12–27

    Google Scholar 

  15. Jain AK, Ross A, Prabhakar S (2004) An introduction to biometric recognition. IEEE Trans Circ Syst Video Technol 14(1):4–20

    Google Scholar 

  16. Chen P-Y, Lin H-J (2006) A DWT based approach for image steganography. Int J Appl Sci Eng 4(3):275–290

    Google Scholar 

  17. Areepongsa S, Syed YF, Kaewkamnerd N, Rao KR (2000) Steganography for a low bit-rate wavelet based image coder. In: Proc. IEEE international conference on image processing, vol 1, pp 597–600

    Google Scholar 

  18. Kundur D, Zhao Y, Campisi P (2004) A stenographic framework for dual authentication and compression of high resolution imagery. In: Proceedings of the IEEE international symposium on circuits and systems, vol 2, pp 1–4

    Google Scholar 

  19. Hemalatha S, Acharya UD, Renuka A, Kamath PR (2013) A secure color image steganography in transform domain. Int J Crypt Inf Secur 3(1):17–24

    Google Scholar 

  20. Rao NN, Thrimurthy P, Babu BR (2009) A novel scheme for digital rights management of images using biometrics. Int J Comput Sci Netw Secur 9(3):157–167

    Google Scholar 

  21. Wu CW, Rulkov NF (1993) Studying chaos via 1-0 maps-a tutorial. IEEE Trans Circuits Syst I: Fundam Theor Appl 40(10):707–721

    Google Scholar 

  22. Yen C, Guo I (1999) A chaotic neural network for signal encryption/decryption and its VLSI architecture. In: Proceedings of the 10th VLSI Design/CAD symposium, Nan-Tou, Taiwan, August 1999, pp 319–322

    Google Scholar 

  23. Doulamis N, Doulamis A, Ntalianis K, Kollias S (2003) An efficient fully unsupervised video object segmentation scheme using an adaptive neural network classifier architecture. IEEE Trans Neural Netw 14(3):616–630

    Google Scholar 

  24. Li S, Li W (2000) Shape-adaptive discrete wavelet transforms for arbitrarily shaped visual object coding. IEEE Trans Circuits Syst Video Technol 10(5):725–743

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ajay Khunteta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Khunteta, A., Sharma, P., Pathak, S., Noonia, A. (2020). Image Security Using Triple Key Chaotic Encryption and SPIHT Compression Technique in Steganography. In: Mathur, G., Sharma, H., Bundele, M., Dey, N., Paprzycki, M. (eds) International Conference on Artificial Intelligence: Advances and Applications 2019. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-15-1059-5_26

Download citation

Publish with us

Policies and ethics