Securing encrypted image information in audio data

被引:0
|
作者
Zeba Shamsi
Dolendro Singh Laiphrakpam
机构
[1] National Institute of Technology Silchar,Department of Computer Science and Engineering
来源
关键词
Image encryption; Ikeda map; Audio data; Information hiding; Lifting wavelet transform;
D O I
暂无
中图分类号
学科分类号
摘要
Advances in communication technologies have fueled growth in digital data transfer. Images are one of the most often conveyed types of digital information. Crytographic techniques help create cipher but also lure attackers as it indicates secret communication. To overcome, a method for encrypting a secret image and hiding it in audio data is proposed. The Ikeda map is used to create the encrypted image, which is then hidden in the audio’s lifting wavelet transform. Various statistical experiments show that the proposed approach conceals the encrypted image while causing minimal changes to the audio. The proposed algorithm shows robustness towards noise addition or random audio crop attack by retrieving a visually perceivable image after the attack. The suggested approach outperforms the current algorithms in terms of imperceptibility and embedding capacity.
引用
收藏
页码:33063 / 33085
页数:22
相关论文
共 50 条
  • [31] Information-flow control for programming on encrypted data
    Mitchell, John C.
    Sharma, Rahul
    Stefan, Deian
    Zimmerman, Joe
    2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2012, : 45 - 60
  • [32] Reversible Data Hiding with Multiple Data for Multiple Users in an Encrypted Image
    Malik, Asad
    Wang, Hongxia
    Wu, Hanzhou
    Abdullahi, Sani M.
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2019, 11 (01) : 46 - 61
  • [33] Information Security Through Encrypted Domain Data Hiding
    Kumar, Vikas
    Muchhal, Prateek
    Thanikasiselvan, V
    INNOVATIVE DATA COMMUNICATION TECHNOLOGIES AND APPLICATION, 2020, 46 : 370 - 379
  • [34] Encrypted Audio Watermarking in Frequency Domain
    Nair, Uma R.
    Birajdar, Gajanan K.
    SMART TRENDS IN INFORMATION TECHNOLOGY AND COMPUTER COMMUNICATIONS, SMARTCOM 2016, 2016, 628 : 573 - 580
  • [35] Integrated data processing between image and audio - Musical instrument (piano) playing information processing
    Saitoh, J
    Kodate, A
    Tominaga, H
    SIXTH INTERNATIONAL CONFERENCE ON IMAGE PROCESSING AND ITS APPLICATIONS, VOL 1, 1997, (443): : 438 - 442
  • [36] Securing EPR Data Using Cryptography and Image Watermarking
    Zaz, Youssef
    El Fadil, Lhoussain
    El Kayyali, Mohamed
    INTERNATIONAL JOURNAL OF MOBILE COMPUTING AND MULTIMEDIA COMMUNICATIONS, 2012, 4 (02) : 76 - 87
  • [37] Internet of Things: Securing Data using Image Steganography
    Yin, Joanne Hwan Jie
    Fen, Gan May
    Mughal, Fiza
    Iranmanesh, Vahab
    2015 THIRD INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, MODELLING AND SIMULATION (AIMS 2015), 2015, : 310 - 314
  • [38] A Watermark Scheme for Encrypted Audio Signal
    Liu, Zhenghui
    Cao, Yi
    Lin, Kejia
    IAENG International Journal of Applied Mathematics, 2022, 52 (03):
  • [39] Securing Data in Image Using Advanced Encryption Standard
    Chavan, Puja
    Pagar, Aditya
    Pote, Sanket
    Fulsundar, Avdhoot
    Ghante, Piyush
    Mane, Phinehas
    Sonawane, Raj
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON DATA SCIENCE, MACHINE LEARNING AND APPLICATIONS, VOL 1, ICDSMLA 2023, 2025, 1273 : 411 - 419
  • [40] Effective reversible data hiding in encrypted image with privacy protection for image content
    Qin, Chuan
    Zhang, Xinpeng
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2015, 31 : 154 - 164