Abstract
Increased data transmission through the network has led to the need for greater security in order to protect against different attacks. To transfer data safely, there are many techniques in use, such as digital watermarking, fingerprinting, cryptography, digital signature and steganography. The aim of this paper is to propose a method to send text data securely over the network using digital watermarking, steganography and cryptography techniques together in combination, to provide greater security. First, the cover image will be compressed using JPEG Compression Algorithm. The message to be sent is then encrypted using the improved RSA algorithm. Then the encrypted message bits and the bits of watermark image are embedded into the compressed cover image.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Rosaline, S.I., Rengarajaswamy, C.: A Steganographic substitution technique using APPM for encrypted pixels. In: International Conference on Information Communication and Embedded Systems (ICES), 21–22 February 2013. IEEE Explore (2013)
Bhalla, J.S., Nagrath, P.: Nested digital image watermarking technique using blowfish encryption algorithm. Int. J. Sci. Res. Publ. 3(4), 1–6 (2013)
Singh, A., Malik, S.: Securing data by using cryptography with steganography. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(5), 404–409 (2013). http://www.ijarcsse.com
Tyagi, V., kumar, A., Patel, R., Tyagi, S., Gangwar, S.S.: Image steganography using least significant bit with cryptography. J. Glob. Res. Comput. Sci. 3(3), 53–55 (2012). http://www.jgrcs.info
Abikoye Oluwakemi, C., Adewole Kayode, S., Oladipupo Ayotunde, J.: Efficient data hiding system using cryptography and steganography. Int. J. Appl. Inf. Syst. 4(11), 6–11 (2012). http://www.ijais.org
Bandyopadhyay, S.K., Paul, T.U., Raychoudhury, A.: Invisible digital watermarking through encryption. Int. J. Comput. Appl. 4(8), 18–20 (2010)
Jaseena, K.U., John, A.: Text watermarking using combined image and text for authentication and protection. Int. J. Comput. Appl. 20(4), 8–13 (2011)
Agrawal, D., Gupta, V., Mehta, G.: Digital watermarking technique using discrete cosine transform. Int. J. Eng. Innov. Res. 2(1), 9–14 (2013)
Thapa, M., Sandeep Kumar Sood, Meenakshi Sharma, A.P.: Digital image watermarking technique based on different attacks. International Journal of Advanced Computer Science and Applications, Vol. 2, No. 4, pp. 14–19 (2011)
Ghazy, R.A., Amoon, M., Abdallah, H.A., El-Fishawy, N.A., Hadhoud, M.M., Dessouky, M.I., Alshebeili, S.A., Abd El-Samie, F.E.: Block based embedding of encrypted watermarks using singular value decomposition. Optik 125(20), 6299–6304 (2014)
Singh, A., Gahlawat, M.: Secure data transmission using watermarking and image compression. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 2(5), 1705–1724 (2013)
Lin, S.D., Shie, S.-C., Guo, J.Y.: Improving the robustness of DCT-based image watermarking against JPEG compression. Comput. Stan. Interfaces 32(1–2), 54–60 (2010)
Choudhary, V., Praveen, N.: Enhanced Rsa Cryptosystem Based On Three Prime Numbers. Int. J. Innovative Sci. Eng. Technol 1(10), pp. 753–757 (2014). ISSN 2348 – 7968
Swaminathan, A., Agarwal, G.: A Comparative Study Of Image Compression Methods, Digital Image Processing
Nizar, F., Latheef, F., Jamal, A.: RSA based encrypted data embedding using APPM. Int. J. Eng. Trends Technol. 9(15), 777–782 (2014)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Sundari, M., Revathi, P.B., Sumesh, S. (2015). Secure Communication Using Digital Watermarking with Encrypted Text Hidden in an Image. In: Abawajy, J., Mukherjea, S., Thampi, S., Ruiz-MartÃnez, A. (eds) Security in Computing and Communications. SSCC 2015. Communications in Computer and Information Science, vol 536. Springer, Cham. https://doi.org/10.1007/978-3-319-22915-7_24
Download citation
DOI: https://doi.org/10.1007/978-3-319-22915-7_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-22914-0
Online ISBN: 978-3-319-22915-7
eBook Packages: Computer ScienceComputer Science (R0)