Digital Image Watermarking and Encryption Using DWT and RSA

Omar Alirr, Kasmiran Jumari

    Research output: Contribution to journalArticle

    4 Citations (Scopus)

    Abstract

    In DWT based watermarking technique the cover image is decomposed to its frequency bands, the coefficients in these bands are modified to hide secret messages. The main characteristics of DWT Watermarking are the imperceptibility, capacity and low complexity. However, this technique has some limitations if it is used alone; it will not be efficient in terms of data security. In this paper the aim is to incorporate the DWT technique with the RSA public-key algorithm, to accomplish a high capacity and secure communication system. The difficulty of factoring in the RSA algorithm has made it one of the most powerful cryptosystems. The proposed technique aims to transfer high capacity secure data by embedding it inside the cover image without affecting or degrading the imperceptibility of the cover image. The security, capacity and imperceptibility are the main criteria according to which the performance of the system is judged. Many scenarios with different cover images and secret messages, different sizes and different image types, these scenarios are used to evaluate the performance of the proposed system by computing the PSNR and the corresponding payload sizes. For the system to not show any suspension of secret data that is being transferred, the value of the PSNR should be around 40dB, so a trade off must be made between security, capacity and imperceptibility to find to what extent this system can reach.

    Original languageEnglish
    Pages (from-to)958-963
    Number of pages6
    JournalInternational Review on Computers and Software
    Volume8
    Issue number4
    Publication statusPublished - Apr 2013

    Fingerprint

    Image watermarking
    Watermarking
    Cryptography
    Security of data
    Frequency bands
    Communication systems
    Secure communication

    Keywords

    • DWT watermarking
    • Public-key cryptograph
    • RSA

    ASJC Scopus subject areas

    • Computer Science(all)

    Cite this

    Digital Image Watermarking and Encryption Using DWT and RSA. / Alirr, Omar; Jumari, Kasmiran.

    In: International Review on Computers and Software, Vol. 8, No. 4, 04.2013, p. 958-963.

    Research output: Contribution to journalArticle

    Alirr, Omar ; Jumari, Kasmiran. / Digital Image Watermarking and Encryption Using DWT and RSA. In: International Review on Computers and Software. 2013 ; Vol. 8, No. 4. pp. 958-963.
    @article{29a4e4d056eb47ac8e22a1213b29fd1a,
    title = "Digital Image Watermarking and Encryption Using DWT and RSA",
    abstract = "In DWT based watermarking technique the cover image is decomposed to its frequency bands, the coefficients in these bands are modified to hide secret messages. The main characteristics of DWT Watermarking are the imperceptibility, capacity and low complexity. However, this technique has some limitations if it is used alone; it will not be efficient in terms of data security. In this paper the aim is to incorporate the DWT technique with the RSA public-key algorithm, to accomplish a high capacity and secure communication system. The difficulty of factoring in the RSA algorithm has made it one of the most powerful cryptosystems. The proposed technique aims to transfer high capacity secure data by embedding it inside the cover image without affecting or degrading the imperceptibility of the cover image. The security, capacity and imperceptibility are the main criteria according to which the performance of the system is judged. Many scenarios with different cover images and secret messages, different sizes and different image types, these scenarios are used to evaluate the performance of the proposed system by computing the PSNR and the corresponding payload sizes. For the system to not show any suspension of secret data that is being transferred, the value of the PSNR should be around 40dB, so a trade off must be made between security, capacity and imperceptibility to find to what extent this system can reach.",
    keywords = "DWT watermarking, Public-key cryptograph, RSA",
    author = "Omar Alirr and Kasmiran Jumari",
    year = "2013",
    month = "4",
    language = "English",
    volume = "8",
    pages = "958--963",
    journal = "International Review on Computers and Software",
    issn = "1828-6003",
    publisher = "Praise Worthy Prize",
    number = "4",

    }

    TY - JOUR

    T1 - Digital Image Watermarking and Encryption Using DWT and RSA

    AU - Alirr, Omar

    AU - Jumari, Kasmiran

    PY - 2013/4

    Y1 - 2013/4

    N2 - In DWT based watermarking technique the cover image is decomposed to its frequency bands, the coefficients in these bands are modified to hide secret messages. The main characteristics of DWT Watermarking are the imperceptibility, capacity and low complexity. However, this technique has some limitations if it is used alone; it will not be efficient in terms of data security. In this paper the aim is to incorporate the DWT technique with the RSA public-key algorithm, to accomplish a high capacity and secure communication system. The difficulty of factoring in the RSA algorithm has made it one of the most powerful cryptosystems. The proposed technique aims to transfer high capacity secure data by embedding it inside the cover image without affecting or degrading the imperceptibility of the cover image. The security, capacity and imperceptibility are the main criteria according to which the performance of the system is judged. Many scenarios with different cover images and secret messages, different sizes and different image types, these scenarios are used to evaluate the performance of the proposed system by computing the PSNR and the corresponding payload sizes. For the system to not show any suspension of secret data that is being transferred, the value of the PSNR should be around 40dB, so a trade off must be made between security, capacity and imperceptibility to find to what extent this system can reach.

    AB - In DWT based watermarking technique the cover image is decomposed to its frequency bands, the coefficients in these bands are modified to hide secret messages. The main characteristics of DWT Watermarking are the imperceptibility, capacity and low complexity. However, this technique has some limitations if it is used alone; it will not be efficient in terms of data security. In this paper the aim is to incorporate the DWT technique with the RSA public-key algorithm, to accomplish a high capacity and secure communication system. The difficulty of factoring in the RSA algorithm has made it one of the most powerful cryptosystems. The proposed technique aims to transfer high capacity secure data by embedding it inside the cover image without affecting or degrading the imperceptibility of the cover image. The security, capacity and imperceptibility are the main criteria according to which the performance of the system is judged. Many scenarios with different cover images and secret messages, different sizes and different image types, these scenarios are used to evaluate the performance of the proposed system by computing the PSNR and the corresponding payload sizes. For the system to not show any suspension of secret data that is being transferred, the value of the PSNR should be around 40dB, so a trade off must be made between security, capacity and imperceptibility to find to what extent this system can reach.

    KW - DWT watermarking

    KW - Public-key cryptograph

    KW - RSA

    UR - http://www.scopus.com/inward/record.url?scp=84879922859&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=84879922859&partnerID=8YFLogxK

    M3 - Article

    AN - SCOPUS:84879922859

    VL - 8

    SP - 958

    EP - 963

    JO - International Review on Computers and Software

    JF - International Review on Computers and Software

    SN - 1828-6003

    IS - 4

    ER -