Securing encrypted image information in audio data

被引:0
|
作者
Zeba Shamsi
Dolendro Singh Laiphrakpam
机构
[1] National Institute of Technology Silchar,Department of Computer Science and Engineering
来源
关键词
Image encryption; Ikeda map; Audio data; Information hiding; Lifting wavelet transform;
D O I
暂无
中图分类号
学科分类号
摘要
Advances in communication technologies have fueled growth in digital data transfer. Images are one of the most often conveyed types of digital information. Crytographic techniques help create cipher but also lure attackers as it indicates secret communication. To overcome, a method for encrypting a secret image and hiding it in audio data is proposed. The Ikeda map is used to create the encrypted image, which is then hidden in the audio’s lifting wavelet transform. Various statistical experiments show that the proposed approach conceals the encrypted image while causing minimal changes to the audio. The proposed algorithm shows robustness towards noise addition or random audio crop attack by retrieving a visually perceivable image after the attack. The suggested approach outperforms the current algorithms in terms of imperceptibility and embedding capacity.
引用
收藏
页码:33063 / 33085
页数:22
相关论文
共 50 条
  • [1] Securing encrypted image information in audio data
    Shamsi, Zeba
    Laiphrakpam, Dolendro Singh
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (21) : 33063 - 33085
  • [2] Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data
    Hu, Shengshan
    Wang, Qian
    Wang, Jingjun
    Qin, Zhan
    Ren, Kui
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2016, 25 (07) : 3411 - 3425
  • [3] Securing Mobile Data Collectors by Integrating Software Attestation and Encrypted Data Repositories
    Won, Jongho
    Bertino, Elisa
    2018 4TH IEEE INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC 2018), 2018, : 26 - 35
  • [4] NUYA: An Encrypted Mechanism for Securing Cloud Data from Data Mining Attacks
    Singh, Nitish Kumar
    Patel, Yashwant Singh
    Das, Utpalendu
    Chatterjee, Ananya
    2014 INTERNATIONAL CONFERENCE ON DATA MINING AND INTELLIGENT COMPUTING (ICDMIC), 2014,
  • [5] A scheme for encrypted image data compression
    Thakur, Nileshsingh V.
    Deshmukh, Kalyani
    Shah, Saurabh A.
    Semwal, Vijay Bhaskar
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2A): : 409 - 420
  • [6] Reversible Data Hiding in Encrypted Image
    Zhang, Xinpeng
    IEEE SIGNAL PROCESSING LETTERS, 2011, 18 (04) : 255 - 258
  • [7] Authentication of Encrypted Secret Information in Image Steganography
    Kalaivani, B.
    Padmaa, M.
    2014 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2014,
  • [8] Securing multi-client range queries over encrypted data
    Park, Jae Hwan
    Rezaeifar, Zeinab
    Hahn, Changhee
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (07): : 9679 - 9692
  • [9] Separation Of Encrypted And Compressed Image With Auxillary Information
    Sam, Baron B.
    Ashokkumar, K.
    Prakash, S. G. Surya
    Kannadhasan, Y.
    Vignesh, A.
    2015 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2015, : 1385 - 1388
  • [10] Securing Fast Learning! Ridge Regression over Encrypted Big Data
    Hu, Shengshan
    Wang, Qian
    Wang, Jingjun
    Chow, Sherman S. M.
    Zou, Qin
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 19 - 26