Skip to main content

Advertisement

Encrypted Image Deployed, Both in Cloud and Self-managed System

  • Original Research
  • Published:
SN Computer Science Aims and scope Submit manuscript

Abstract

Embedding data into a given medium is called Steganography, in such a way that it cannot be detected in a given image. Also, cloud computing has altered the way information is accessed, stored, and transmitted; the emphasis is in making the data more robust and keeping it hidden within a given image. The current techniques of spatial embedding do not deliver the robustness that is needed for basic compression algorithms. To produce a better method, it takes the help of the least-significant bit paradigm (Wayner, Disappearing cryptography: information hiding: steganography and watermarking. 3rd ed. Morgan Kaufmann Publishers, Burlington, 2009; Gruhl and Bender, Echo hiding. In: Proceeding of information hiding workshop, p. 295–315, 1996). With this paradigm, we are led towards the idea of transforming the embedding system from the very beginning, which is to hide the data in the domains of frequency. The following paper proposes a method of transform embedding which uses current digital encryption methods and improves the steganography results by using the empirical data, and the encrypted image is deployed in the cloud to be used from anywhere. This method is more robust than the existing spatial embedding methods. The claims are backed by the experimental results which are shown in the paper.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Wayner P. Disappearing cryptography: information hiding: steganography and watermarking. 3rd ed. Burlington: Morgan Kaufmann Publishers; 2009.

    Google Scholar 

  2. Petitcolas FAP, Anderson RJ, Kuhn MG. Information hiding—a survey. In: Proceedings of the IEEE, special issue on protection of multimedia content, vol. 87, no. 7, p. 1062–1078; 1999.

  3. Bender W, Gruhl D, Morimoto N, Lu A. Techniques for data hiding. IBM Syst J. 1996;35(3–4):313–36.

    Article  Google Scholar 

  4. Dong X, Bocko M, Ignjatovic Z. Data hiding via phase manipulation of audio signals. In: IEEE international conference on acoustics, speech, and signal processing (ICASSP), vol. 5, p. 377–380; 2004.

  5. Kandel ER, Schwartz JH, Jessell TM. Principles of neural science. 4th ed. New York: McGraw-Hill; 2000.

    Google Scholar 

  6. Cvejic N, Seppben T. Increasing the capacity of LSB-based audio steganography. FIN-90014, Finland; 2002.

  7. Johnson NF, Jajodia S. Exploring steganography: seeing the unseen. Comput J. 1998;31(2):26–34.

    Google Scholar 

  8. Djebbar F, Ayad B, Abed-Meraim K, Hamam H. A view on latest audio steganography. In: 7th IEEE international conference on innovations in information technology; 2011.

  9. Gopalan K. Audio steganography using bit modification. ProcIntConfMultimed. 2003;1:629–32.

    Google Scholar 

  10. Gruhl D, Bender W. Echo hiding. In: Proceeding of information hiding workshop, p. 295–315; 1996.

  11. Shirali-Shahreza S, Shirali-Shahreza M. Steganography in silence intervals of speech. In: Proceedings of the fourth IEEE international conference on intelligent information hiding and multimedia signal, p. 605–607; 2008.

Download references

Funding

No funding is involved.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ridhima Ahluwalia.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This paper does not contain any studies with human participants or animals performed by any of the authors.

Informed consent

None.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the topical collection “Computational Statistics” guest edited by Anish Gupta, Mike Hinchey, Vincenzo Puri, Zeev Zalevsky and Wan Abdul Rahim.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ahluwalia, R., Gupta, A. & Chaudhary, P. Encrypted Image Deployed, Both in Cloud and Self-managed System. SN COMPUT. SCI. 1, 358 (2020). https://doi.org/10.1007/s42979-020-00367-w

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-020-00367-w

Keywords