Securing encrypted image information in audio data

被引:0
|
作者
Zeba Shamsi
Dolendro Singh Laiphrakpam
机构
[1] National Institute of Technology Silchar,Department of Computer Science and Engineering
来源
关键词
Image encryption; Ikeda map; Audio data; Information hiding; Lifting wavelet transform;
D O I
暂无
中图分类号
学科分类号
摘要
Advances in communication technologies have fueled growth in digital data transfer. Images are one of the most often conveyed types of digital information. Crytographic techniques help create cipher but also lure attackers as it indicates secret communication. To overcome, a method for encrypting a secret image and hiding it in audio data is proposed. The Ikeda map is used to create the encrypted image, which is then hidden in the audio’s lifting wavelet transform. Various statistical experiments show that the proposed approach conceals the encrypted image while causing minimal changes to the audio. The proposed algorithm shows robustness towards noise addition or random audio crop attack by retrieving a visually perceivable image after the attack. The suggested approach outperforms the current algorithms in terms of imperceptibility and embedding capacity.
引用
收藏
页码:33063 / 33085
页数:22
相关论文
共 50 条
  • [41] Separable Reversible Encrypted Data Hiding in Encrypted Image Using AES algorithm and Lossy Technique
    Kadam, Parag
    Nawale, Mangesh
    Kandhare, Akash
    Patil, Mukesh
    2013 INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, INFORMATICS AND MEDICAL ENGINEERING (PRIME), 2013,
  • [42] Encrypted Image based Reversible Data hiding using Invertible Image Conversion
    Namkha, Stanzin
    Pattanayak, Himansu Sekhar
    2018 FIRST INTERNATIONAL CONFERENCE ON SECURE CYBER COMPUTING AND COMMUNICATIONS (ICSCCC 2018), 2018, : 128 - 133
  • [43] Chaining for Securing Data Provenance in Distributed Information Networks
    Wang, Xinlei
    Zeng, Kai
    Govindan, Kannan
    Mohapatra, Prasant
    2012 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2012), 2012,
  • [44] SENTINEY: Securing ENcrypted mulTI-party computatIoN for Enhanced data privacY and phishing detection
    Hendaoui, Fatma
    Hendaoui, Saloua
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 256
  • [45] Digital Audio Watermarking and Image Watermarking for Information Security
    Warkar, Rupali
    More, Priyanka
    Waghole, Dattatray
    2015 INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING (ICPC), 2015,
  • [46] Video summarizing based on both audio and image information
    Larabi, MC
    Fernandez-Maloigne, C
    2005 Beijing International Conference on Imaging: Technology and Applications for the 21st Century, 2005, : 292 - 293
  • [47] Reversible Data Hiding in Encrypted Image Based on MSB Inversion
    Yang, Cheng-Hsing
    Weng, Chi-Yao
    Hung, Chia-Ling
    Li, Chun-Ta
    2021 INTERNATIONAL CONFERENCE ON SECURITY AND INFORMATION TECHNOLOGIES WITH AI, INTERNET COMPUTING AND BIG-DATA APPLICATIONS, 2023, 314 : 3 - 13
  • [48] Reversible data hiding in the encrypted domain for medical image security
    Wu, Dan
    Xu, Ruxing
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2019, 125 : 225 - 226
  • [49] Content-Based Network Filtering of Encrypted Image Data
    Hamdi, Mohamed
    Boudriga, Noureddine
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 343 - 348
  • [50] A Separable Reversible Data Hiding in Encrypted Image with Improved Performance
    Jose, Rintu
    Abraham, Gincy
    2013 ANNUAL INTERNATIONAL CONFERENCE ON EMERGING RESEARCH AREAS & 2013 INTERNATIONAL CONFERENCE ON MICROELECTRONICS, COMMUNICATIONS & RENEWABLE ENERGY (AICERA/ICMICR), 2013,