Secure visual communication with advanced cryptographic and image processing techniques

被引:0
作者
Sathananthavathi, V. [1 ]
Kumar, K. Ganesh [1 ]
Kumar, M. Sathish [1 ]
机构
[1] Mepco Schlenk Engn Coll, Sivakasi, India
基金
英国科研创新办公室;
关键词
Cryptography; Steganography; AES; DWT; LSB; SSIM; PSNR; MSE and BPP; AUTHENTICATION; INTERNET;
D O I
10.1007/s11042-023-17224-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Securing data during transmission is critical to prevent unauthorized access, interception, or modification of the data. Data can be communicated securely while maintaining its confidentiality, integrity, and availability by using cryptographic algorithms and measures. In the proposed work, a hybrid data compression algorithm is proposed to increase the amount of input data that is encrypted using the Advanced Encryption Standard (AES) cryptography method to boost security level, and it can be utilized to carry out the lossy compacting Steganography method. By reducing the quantity of data transmitted, this technique can enable speedy transmission over a sluggish internet connection or use less space on different storage devices. The cover image is compressed using Discrete Wavelet Transform (DWT), which reduces the cover image's dimensions by lossyly compressing the image. The ordinary text is converted to hexadecimal format from text. The encrypted data will then be inserted into the compressed cover picture using the least significant bit (LSB) with Image vector array (IVA). Bits per pixel (BPP), Mean Squared Error (MSE), Peak Signal to Noise Ratio (PSNR), and Structural Similarity Index (SSIM) were some of the metrics we used to evaluate the proposed technique.
引用
收藏
页码:45367 / 45389
页数:23
相关论文
共 34 条
  • [1] DISCRETE COSINE TRANSFORM
    AHMED, N
    NATARAJAN, T
    RAO, KR
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 1974, C 23 (01) : 90 - 93
  • [2] Secure mobile internet voting system using biometric authentication and wavelet based AES
    Ajish, S.
    Kumar, K. S. Anil
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 61
  • [3] Novel color image steganalysis method based on RGB channel empirical modes to expose stego images with diverse payloads
    Amrutha, E.
    Arivazhagan, S.
    Jebarani, W. Sylvia Lilly
    [J]. PATTERN ANALYSIS AND APPLICATIONS, 2023, 26 (01) : 239 - 253
  • [4] [Anonymous], 2019, Hybrid and advanced compression techniques for medical images, DOI DOI 10.1007/978-3-030-12575-2_1
  • [5] Arivazhagan S., 2019, Int J Eng Adv Technol (IJEAT), V8, P4923, DOI [10.35940/ijeat.F9239.088619, DOI 10.35940/IJEAT.F9239.088619]
  • [6] Image authentication techniques for surveillance applications
    Bartolini, F
    Tefas, A
    Barni, M
    Pitas, I
    [J]. PROCEEDINGS OF THE IEEE, 2001, 89 (10) : 1403 - 1418
  • [7] Quantum cryptography: Public key distribution and coin tossing
    Bennett, Charles H.
    Brassard, Gilles
    [J]. THEORETICAL COMPUTER SCIENCE, 2014, 560 : 7 - 11
  • [8] Bhardwaj M., 2019, 4 INT C INF SYST COM
  • [9] An efficient visually meaningful image compression and encryption scheme based on compressive sensing and dynamic LSB embedding
    Chai, Xiuli
    Wu, Haiyang
    Gan, Zhihua
    Zhang, Yushu
    Chen, Yiran
    Nixon, Kent W.
    [J]. OPTICS AND LASERS IN ENGINEERING, 2020, 124
  • [10] A novel local binary pattern based blind feature image steganography
    Chakraborty, Soumendu
    Jalal, Anand Singh
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (27-28) : 19561 - 19574