Watermarking for the Secure Transmission of the Key into an Encrypted Image

Authors

  • Ali Khalfallah Research Unit Sciences and Technologies of Image and Telecommunication (RU SETIT), Sfax university - Tunisia
  • Med Karim Abdmouleh 1. Khurma University CollegeTaif UniversityTaif, Saudi Arabiamabdmouleh@tu.edu.sa2. Research Unit: Sciences and Technologies of Image and TelecommunicationsHigher Institute of BiotechnologyUniversity of SfaxSfax, Tunisia
  • Med Salim Bouhlel Research Unit: Sciences and Technologies of Image and TelecommunicationsHigher Institute of BiotechnologyUniversity of SfaxSfax, Tunisia

Keywords:

Image Encryption, Image Watermarking, Crypto-watermarking, Cryptanalysis, Chaos

Abstract

Ensuring the confidentiality of any data exchanged always presents a great concern for all communication instances. Technically, encryption is the ideal solution for this task. However, this process must deal with the progress of the cryptanalysis that aims to disclose the information exchanged. The risk increases due to the need for a dual transmission that includes the encrypted medium and the decryption key. In a context of chaotic encryption of images, we propose to insert the decryption key into the encrypted image using image watermarking. Thus, only the watermarked encrypted image will be transmitted. Upon reception, the recipient extracts the key and decrypts the image. The cryptosystem proposed is based on an encryption using a dynamic Look-Up Table issued from a chaotic generator. The obtained results prove the efficiency of our method to ensure a secure exchange of images and keys.

Author Biographies

Ali Khalfallah, Research Unit Sciences and Technologies of Image and Telecommunication (RU SETIT), Sfax university - Tunisia

Sfax 3018

Med Karim Abdmouleh, 1. Khurma University CollegeTaif UniversityTaif, Saudi Arabiamabdmouleh@tu.edu.sa2. Research Unit: Sciences and Technologies of Image and TelecommunicationsHigher Institute of BiotechnologyUniversity of SfaxSfax, Tunisia

Taif

Med Salim Bouhlel, Research Unit: Sciences and Technologies of Image and TelecommunicationsHigher Institute of BiotechnologyUniversity of SfaxSfax, Tunisia

Sfax 3038

References

Paar, C. & Pelzl, J. (2010). The Advanced Encryption Standard (AES), Springer, Berlin, Heidelberg, (pp. 87-121).

Biham, E. & Shamir, A. (2012). Differential cryptanalysis of the data encryption standard, Springer-Verlag.

Abdmouleh, M. K., Khalfallah, A. & Bouhlel, M. S. (2014). ‘A new watermarking technique for medical image using hierarchical encryption’, International Journal of Computer Science Issues (IJCSI), (Vol. 11, No. 4, pp. 27-32).

Abdmouleh, M. K., Khalfallah, A. & Bouhlel, M. S. (2016). A chaotic cryptosystem for color image with dynamic look-up table, in ‘Proceedings of the 7th International Conference on Image and Signal Processing (ICISP’16)’, Springer International Publishing, Trois-Rivieres, QC, Canada, (pp. 91-100).

Abd El-Latif, A. A., Li, L., Wang, N., Han, Q. & Niu, X. (2013). ‘A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces’, Signal Processing, (Vol. 93, No. 11, pp. 2986-3000).

Abdelhakim, A. M., Saleh, H. I. & Nassar, A. M. (2017). ‘A quality guaranteed robust image watermarking optimization with artificial bee colony’, Expert Syst. Appl., (Vol. 72, No. C, pp. 317-326).

Atee H. A., Ahmad, R., Noor, N. M., Rahma, A. M. S. & Aljeroudi, Y. (2017). ‘Extreme learning machine based optimal embedding location finder for image steganography’, PLoS ONE, (Vol. 12, No. 2).

Amri, H., Khalfallah, A., Gargouri, M., Nebhani, N., Lapayre, J. C. & Bouhlel, M. S. (2017). ‘Medical image compression approach based on image resizing, digital watermarking and lossless compression’, J. Signal Process. Syst., (Vol. 87, No. 2, pp. 203-214).

Lutovac, B., Daković, M., Stanković, S. & Orović, I. (2016). ‘An algorithm for robust image watermarking based on the DCT and Zernike moments’, Multimedia Tools and Applications, (pp. 1-20).

Khalfallah, A., Kammoun, F., Bouhlel, M. S. & Olivier, C. (2006). A new scheme of watermarking in multi-resolution filed by 5/3 wavelet: Family signature combined with the adapted embedding strength., in ‘2nd International Conference on Information Communication Technologies’, (pp. 1145-1152).

Kammoun, F., Khalfallah, A. & Bouhlel, M. S. (2006). ‘New scheme of digital watermarking using an adaptive embedding strength applied on multiresolution filed by 9/7 wavelet’, Int. J. Imaging Systems and Technology, (Vol. 16, No. 6, pp. 249-257).

Kaushik, P. & Sharma, Y. (2012). ‘Comparison of different image enhancement techniques based upon PSNR & MSE’, International Journal of Applied Engineering Research, (Vol. 7, No. 11).

Kumar, S. & Dutta, A. (2016). A novel spatial domain technique for digital image watermarking using block entropy, in ‘International Conference on Recent Trends in Information Technology (ICRTIT)’, (pp. 1-4).

Kishore Kumar, K. & Pavani, M. (2016). A new PCA based hybrid color image watermarking using cycle spinning - sharp frequency localized contour let transform for copyright protection, in ‘First International Conference on Smart Trends in Information Technology and Computer Communications (SmartCom 2016)’, Jaipur, India, (pp. 355-364).

Kuribayashi, M. & Schaathun, H.G. (2015). Image fingerprinting system based on collusion secure code and watermarking method, in ‘IEEE International Conference on Image Processing (ICIP)’, (pp. 2120-2124).

Liu, X. L., Lin, C.C., Chang, C.C. & Yuan, S.M. (2016). ‘A survey of fragile watermarking based image authentication techniques’, Journal of Information Hiding and Multimedia Signal Processing, (Vol. 7, No. 6, pp. 1282-1292).

Priyanka, S. M. (2017). ‘Region-based hybrid medical image watermarking for secure telemedicine applications’, Multimedia Tools and Applications, (Vol. 76, No. 3, pp. 3617-3647).

Amri, H., Khalfallah, A., Lapayre, J.-C. & Bouhlel, M.-S. (2016). ‘Watermarking for improving the reduction-expansion process of medical images (WREPro)’, International Journal of Imaging and Robotics (IJIR), (Vol. 16, No. 3, pp. 124-139).

Uhl, A. & Pommer, A. (2004). Image and Video Encryption: from Digital Rights Management to Secured Personal Communication (Advances in Information Security), Springer-Verlag TELOS, Santa Clara, CA, USA.

Stinson, D. R. (2006). Cryptography: theory and practice, Discrete mathematics and its applications, Chapman & Hall/CRC, Boca Raton.

Masmoudi, A., Bouhlel, M. S. & Puech, W. (2010). A new image cryptosystem based on chaotic map and continued fractions, in ‘18th European Signal Processing Conference (EUSIPCO)’, (pp. 1504-1508).

Abdmouleh, M. K., Khalfallah, A. & Bouhlel, M. S. (2012). Image encryptionwith dynamic chaotic look-up table, in ‘6th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)’, (pp. 331-337).

Abdmouleh, M. K., Khalfallah, A. & Bouhlel, M. S. (2013). Dynamic chaotic look-up table for MRI medical image encryption, in ‘International Conference on Systems, Control, Signal Processing and Informatics (SCSI)’, (pp. 241-246).

Rivest, R. L., Shamir, A. & Adleman, L. M. (1983). ‘A method for obtaining digital signatures and public-key cryptosystems’, Commun. ACM, (Vol. 26, No. 1, pp. 96-99).

Garfinkel, S. & Spafford, G. (1996). Practical UNIX and Internet security, 2nd ed, O’Reilly, Cambridge.

Abdmouleh, M. K., Khalfallah, A. &Bouhlel, M. S. (2012). Image encryption with dynamic chaotic look-up table, in ‘6th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)’, (pp. 331-337).

Biham, E. & Shamir, A. (1990). Differential cryptanalysis of DES-like cryptosystems, in ‘CRYPTO’, (pp. 2-21).

Huang, C. K. & Nien, H. H. (2009). ‘Multi chaotic systems based pixel shuffle for image encryption’, Optics Communications, (Vol. 282, No. 11, pp. 2123-2127).

Sam, I. S., Devaraj, P. & Bhuvaneswaran, R. S. (2010). Enhanced substitution-diffusion based image cipher using improved chaotic map, in ‘ICT’, (pp. 116-123).

Wang, Y., Wong, K. W., Liao, X. & Chen, G. (2011). ‘A new chaos-based fast image encryption algorithm’, Appl. Soft Comput., (Vol. 11, No. 1, pp. 514-522).

Shannon, C. E. (1948). ‘A Mathematical Theory of Communication’, The Bell System Technical Journal, (Vol. 27, No. 3, pp. 379-423).

Behnia, S., Akhshani, A., Mahmodi, H. & Akhavan, A. (2008). ‘A novel algorithm for image encryption based on mixture of chaotic maps’, Chaos, Solitons & Fractals, (Vol. 35, No. 2, pp. 408-419).

Furht, B., Socek, D., Li, S. & S. Magliveras, S. (2005). Enhanced 1-D chaotic key-based algorithm for image encryption, in ‘International Conference on Security and Privacy for Emerging Areas in Communications Networks’, IEEE Computer Society, Los Alamitos, CA, USA, (pp. 406-407).

Li, P., Li, Z., Halang, W. A. & Chen, G. (2007). ‘A stream cipher based on a spatiotemporal chaotic system’, Chaos Solitons and Fractals, (Vol. 32, No. 5, pp. 1867-1876).

Devaney, R. L. (2003). An Introduction to Chaotic Dynamical Systems, 2nd ed., Westview Pr (Short Disc).

Additional Files

Published

2020-11-20

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.