Watermarking for the Secure Transmission of the Key into an Encrypted Image

  • Ali Khalfallah Research Unit Sciences and Technologies of Image and Telecommunication (RU SETIT), Sfax university - Tunisia
  • Med Karim Abdmouleh 1. Khurma University CollegeTaif UniversityTaif, Saudi Arabiamabdmouleh@tu.edu.sa2. Research Unit: Sciences and Technologies of Image and TelecommunicationsHigher Institute of BiotechnologyUniversity of SfaxSfax, Tunisia
  • Med Salim Bouhlel Research Unit: Sciences and Technologies of Image and TelecommunicationsHigher Institute of BiotechnologyUniversity of SfaxSfax, Tunisia

Abstract

Ensuring the confidentiality of any data exchanged always presents a great concern for all communication instances. Technically, encryption is the ideal solution for this task. However, this process must deal with the progress of the cryptanalysis that aims to disclose the information exchanged. The risk increases due to the need for a dual transmission that includes the encrypted medium and the decryption key. In a context of chaotic encryption of images, we propose to insert the decryption key into the encrypted image using image watermarking. Thus, only the watermarked encrypted image will be transmitted. Upon reception, the recipient extracts the key and decrypts the image. The cryptosystem proposed is based on an encryption using a dynamic Look-Up Table issued from a chaotic generator. The obtained results prove the efficiency of our method to ensure a secure exchange of images and keys.

Author Biographies

Ali Khalfallah, Research Unit Sciences and Technologies of Image and Telecommunication (RU SETIT), Sfax university - Tunisia
Sfax 3018
Med Karim Abdmouleh, 1. Khurma University CollegeTaif UniversityTaif, Saudi Arabiamabdmouleh@tu.edu.sa2. Research Unit: Sciences and Technologies of Image and TelecommunicationsHigher Institute of BiotechnologyUniversity of SfaxSfax, Tunisia
Taif
Med Salim Bouhlel, Research Unit: Sciences and Technologies of Image and TelecommunicationsHigher Institute of BiotechnologyUniversity of SfaxSfax, Tunisia
Sfax 3038

References

[1] Abd El-Latif, A.A.; Li, L.; Wang, N.; Han, Q.; Niu, X. (2013). A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces, Signal Processing, 93(11), 2986-3000, 2013.
https://doi.org/10.1016/j.sigpro.2013.03.031

[2] Abdelhakim, A.M.; Saleh, H.I.; Nassar, A.M. (2017). A quality guaranteed robust image watermarking optimization with artificial bee colony, Expert Syst. Appl., 72(C), 317-326, 2017.
https://doi.org/10.1016/j.eswa.2016.10.056

[3] Abdmouleh, M.K.; Khalfallah, A.; Bouhlel, M.S. (2012). Image encryptionwith dynamic chaotic look-up table, In 6th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT), 331-337, 2012.
https://doi.org/10.1109/SETIT.2012.6481937

[4] Abdmouleh, M.K.; Khalfallah, A.; Bouhlel, M.S. (2013). Dynamic chaotic look-up table for MRI medical image encryption, In International Conference on Systems, Control, Signal Processing and Informatics (SCSI), 241-246, 2013.

[5] Abdmouleh, M.K.; Khalfallah, A.; Bouhlel, M.S. (2014). A new watermarking technique for medical image using hierarchical encryption, International Journal of Computer Science Issues (IJCSI), 11(4), 27-32, 2014.

[6] Abdmouleh, M.K.; Khalfallah, A.; Bouhlel, M.S. (2014). An overview on cryptography and watermarking, In International Conference on Computers, Automatic Control, Signal Processing and Systems Science, 99-104, 2014.

[7] Abdmouleh, M.K.; Khalfallah, A.; Bouhlel, M.S. (2016). A chaotic cryptosystem for color image with dynamic look-up table, In Proceedings of the 7th International Conference on Image and Signal Processing (ICISP'16), Springer International Publishing, Trois-Rivieres, QC, Canada, 91-100, 2016.
https://doi.org/10.1007/978-3-319-33618-3_10

[8] Amri, H.; Khalfallah, A.; Gargouri, M.; Nebhani, N.; Lapayre, J.C.; Bouhlel, M.S. (2017). Medical image compression approach based on image resizing, digital watermarking and lossless compression, J. Signal Process. Syst., 87(2), 203-214, 2017.
https://doi.org/10.1007/s11265-016-1150-5

[9] Amri, H.; Khalfallah, A.; Lapayre, J.C.; Bouhlel, M.S. (2016). Watermarking for improving the reduction-expansion process of medical images (WREPro), International Journal of Imaging and Robotics (IJIR), 16(3), 124-139, 2016.

[10] Atee H.A.; Ahmad, R.; Noor, N.M.; Rahma, A.M.S.; Aljeroudi, Y. (2017). Extreme learning machine based optimal embedding location finder for image steganography, PLoS ONE, 12(2), 1-23, 2017.
https://doi.org/10.1371/journal.pone.0170329

[11] Behnia, S.; Akhshani, A.; Mahmodi, H.; Akhavan, A. (2008). A novel algorithm for image encryption based on mixture of chaotic maps, Chaos, Solitons & Fractals, 35(2), 408-419, 2008.
https://doi.org/10.1016/j.chaos.2006.05.011

[12] Biham, E.; Shamir, A. (1991). Differential cryptanalysis of DES-like cryptosystems, In Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO'90), Springer-Verlag, 2-21, 1991.
https://doi.org/10.1007/3-540-38424-3_1

[13] Biham, E.; Shamir, A. (2012). Differential cryptanalysis of the data encryption standard, Springer- Verlag, 2012.

[14] Bucerzan, D.; Ratiu, C.; Manolescu, M.J. (2013). SmartSteg: A New Android Based Steganography Application. International Journal of Computes Communications & Control, 8(5), 681-688, 2013.
https://doi.org/10.15837/ijccc.2013.5.642

[15] Devaney, R. L. (2003). An Introduction to Chaotic Dynamical Systems, 2nd ed., Westview Pr (Short Disc), 2003.

[16] Furht, B.; Socek, D.; Li, S.; S. Magliveras, S. (2005). Enhanced 1-D chaotic key-based algorithm for image encryption, in International Conference on Security and Privacy for Emerging Areas in Communications Networks, IEEE Computer Society, Los Alamitos, CA, USA, 406-407, 2005.

[17] Garfinkel, S.; Spafford, G. (1996). Practical UNIX and Internet security, 2nd ed, O'Reilly, Cambridge, 1996.

[18] Huang, C.K.; Nien, H.H. (2009). Multi chaotic systems based pixel shuffle for image encryption, Optics Communications, 282(11), 2123-2127, 2009.
https://doi.org/10.1016/j.optcom.2009.02.044

[19] Kammoun, F.; Khalfallah, A.; Bouhlel, M.S. (2006). New scheme of digital watermarking using an adaptive embedding strength applied on multiresolution filed by 9/7 wavelet, Int. J. Imaging Systems and Technology, 16(6), 249-257, 2006.
https://doi.org/10.1002/ima.20088

[20] Karamchandani, S.H. et al.(2015). PCA Encrypted Short Acoustic Data Inculcated in Digital Color Images. International Journal of Computes Communications & Control, 10(5), 678-685, 2015.
https://doi.org/10.15837/ijccc.2015.5.2029

[21] Kaushik, P.; Sharma, Y. (2012). Comparison of different image enhancement techniques based upon PSNR & MSE, International Journal of Applied Engineering Research, 7(11), 2010-2014, 2012.

[22] Khalfallah, A.; Kammoun, F.; Bouhlel, M.S.; Olivier, C. (2006). A new scheme of watermarking in multi-resolution filed by 5/3 wavelet: Family signature combined with the adapted embedding strength, In 2nd International Conference on Information Communication Technologies, 1145- 1152, 2006.

[23] Kishore Kumar, K.; Pavani, M. (2016). A new PCA based hybrid color image watermarking using cycle spinning - sharp frequency localized contour let transform for copyright protection, In First International Conference on Smart Trends in Information Technology and Computer Communications (SmartCom 2016), Jaipur, India, 355-364, 2016.
https://doi.org/10.1007/978-981-10-3433-6_43

[24] Kumar, S.; Dutta, A. (2016). A novel spatial domain technique for digital image watermarking using block entropy In International Conference on Recent Trends in Information Technology (ICRTIT), 1-4,2016.
https://doi.org/10.1109/ICRTIT.2016.7569530

[25] Kuribayashi, M.; Schaathun, H.G. (2015). Image fingerprinting system based on collusion secure code and watermarking method, In IEEE International Conference on Image Processing (ICIP), 2120-2124.
https://doi.org/10.1109/ICIP.2015.7351175

[26] Li, P.; Li, Z.; Halang, W.A.; Chen, G. (2007). A stream cipher based on a spatiotemporal chaotic system, Chaos Solitons & Fractals, 32(5), 1867-1876, 2007.
https://doi.org/10.1016/j.chaos.2005.12.021

[27] Liu, X.L.; Lin, C.C.; Chang, C.C.; Yuan, S.M. (2016). A survey of fragile watermarking based image authentication techniques, Journal of Information Hiding and Multimedia Signal Processing, 7(6), 1282-1292, 2016.

[28] Lutovac, B.; Dakovic, M.; Stankovic, S.; Orovic, I. (2017). An algorithm for robust image watermarking based on the DCT and Zernike moments, Multimedia Tools and Applications, 76(22), 23333-23352 , 2017.
https://doi.org/10.1007/s11042-016-4127-2

[29] Manglem Sing, K.; Chanu, Y.J.; Tuithung, T. (2014). Steganalysis of ± Steganography based on Noncausal Linear Predictor. International Journal of Computes Communications & Control, 9(5), 623-632, 2014.
https://doi.org/10.15837/ijccc.2014.5.704

[30] Masmoudi, A.; Bouhlel, M.S.; Puech, W. (2010). A new image cryptosystem based on chaotic map and continued fractions, In 18th European Signal Processing Conference (EUSIPCO), 1504-1508, 2010.

[31] Mazurczyk, W.; Karas, M.; Szczypiorski, K. (2013). SkyDe: a Skype-based Steganographic Method. International Journal of Computes Communications & Control, 8(3), 432-443, 2013.
https://doi.org/10.15837/ijccc.2013.3.469

[32] Paar, C.; Pelzl, J. (2010). The Advanced Encryption Standard (AES), In Understanding Cryptography: A Textbook for Students and Practitioners, Springer, Berlin, Heidelberg, 87-121, 2010.
https://doi.org/10.1007/978-3-642-04101-3_4

[33] Priyanka, S.M. (2017). Region-based hybrid medical image watermarking for secure telemedicine applications, Multimedia Tools and Applications, 76(3), 3617-3647, 2017.
https://doi.org/10.1007/s11042-016-3913-1

[34] Puech W.; Rodrigues J.M. (2004). A New Crypto-Watermarking Method for Medical Images Safe Transfer, In 12th European Signal Processing Conference (EUSIPCO'04), 1481-1484, 2004.

[35] Rivest, R.L.; Shamir, A.; Adleman, L.M. (1983). A method for obtaining digital signatures and public-key cryptosystems, Commun. ACM, 26(1), 96-99, 1983.
https://doi.org/10.1145/357980.358017

[36] Sam, I.S.; Devaraj, P.; Bhuvaneswaran, R.S. (2010). Enhanced substitution-diffusion based image cipher using improved chaotic map, In ICT, 116-123, 2010.
https://doi.org/10.1007/978-3-642-15766-0_17

[37] Shannon, C.E. (1948). A Mathematical Theory of Communication, The Bell System Technical Journal, 27(3), 379-423, 1948.
https://doi.org/10.1002/j.1538-7305.1948.tb01338.x

[38] Stinson, D.R. (2006). Cryptography: theory and practice, Discrete mathematics and its applications, Chapman; Hall/CRC, Boca Raton.

[39] Uhl, A.; Pommer, A. (2004). Image and Video Encryption: from Digital Rights Management to Secured Personal Communication (Advances in Information Security), Springer-Verlag TELOS, Santa Clara, CA, USA, 2004.

[40] Wang, Y.; Wong, K.W.; Liao, X.; Chen, G. (2011). A new chaos-based fast image encryption algorithm, Appl. Soft Comput., 11(1), 514-522, 2011.
https://doi.org/10.1016/j.asoc.2009.12.011
Published
2020-11-20
How to Cite
KHALFALLAH, Ali; ABDMOULEH, Med Karim; BOUHLEL, Med Salim. Watermarking for the Secure Transmission of the Key into an Encrypted Image. INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, [S.l.], v. 15, n. 6, nov. 2020. ISSN 1841-9844. Available at: <http://univagora.ro/jour/index.php/ijccc/article/view/3824>. Date accessed: 30 nov. 2020. doi: https://doi.org/10.15837/ijccc.2020.6.3824.

Keywords

Image Encryption, Image Watermarking, Crypto-watermarking, Cryptanalysis, Chaos