An Integration of Keyless Encryption, Steganography, and Artificial Intelligence for the Secure Transmission of Stego Images

An Integration of Keyless Encryption, Steganography, and Artificial Intelligence for the Secure Transmission of Stego Images

Digvijay Pandey, Vinay Kumar Nassa, Ayushi Jhamb, Dashrath Mahto, Binay Kumar Pandey, A. S. Hovan George, A. Shaji George, Samir Kumar Bandyopadhyay
Copyright: © 2021 |Pages: 24
DOI: 10.4018/978-1-7998-7160-6.ch010
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Protected stored data as well as transfer in this virtual environment have been a significant thing since this world wide web has been used for information exchange. The need for data security rises as the level of personal data exchanged on the web is becoming more susceptible. To protect information from malicious use as well as alteration, services like confidential information but also data integrity have been needed. So many traditional cryptographic methods have been proposed by numerous studies throughout recent times to maintain multimedia data communicated over public networks. The chapter proposes a novel keyless picture encryption algorithm focused on a chaotic map. Almost every picture element is encoded by shuffling pixel values, which would be measured by an adapted cat map. In this suggested technique, steganography is used to transfer keyless encrypted information using a cover picture with encrypted information inserted in picture, audio, and video files.
Chapter Preview
Top

1. Introduction

At the present time, the entire globe tends to revolve round the World Wide Web. The web revolutionized the concept while becoming widely known for data transmission through one person to the other. The World Wide Web had already drastically changed around the globe. Time, space and average distance had also changed drastically. Information has become quickly available at any time and with almost any place. Individuals are nowadays digitally savvy, as illustrated mostly by internet and mobile phones. A World Wide Web that is overflowing to new technologies has been expanding rapidly.

The two-dimensional input is used to encrypt a digital image. The Digital Image’s (DI’s) equations to describe would be usually binary, of a two-dimensional image (Kamboj et al., 2013). Each kinds of image resolution defines that whether picture is vector or raster. The word “digital image” generally refers with vector graphics and bitmapped images when used solely. A DI has been generally denoted by f(x,y), in which x and y will be mutually perpendicular as well as the valuation with f at a certain factor (x,y) would be commensurate to a image's gray scale at a certain moment. Digital images were also classified into three categories (Kamboj et al., 2013).

1.1. Binary images

Binary images are images which are characterized only by one bit by each pixel. As each pixel only has two values ('0' or '1'), such images are quite effective besides database processing.

1.2. Grayscale Images

The grayscale (or grey level) picture merely conveys the color schemes as grayscale colors. Logic underneath differentiating these pictures from other kinds with color photos is that less data is provided to every and almost every pixel. Because the red, green, and blue components of grey have equal intensity in R G B space, each pixel only requires a single pixel intensity, as opposed to the three intensities required to define each pixel in a full color image.

1. 3 Colour Images

In a color image, each pixel has a distinct color, which is represented by the three primary colors present in an image: red, green, and blue. A linear combination of the three fundamental colors, red, green, and blue, can be used to describe a color, recognized by the human eye. The R G B based color-space is built around these three basic colors. The 24-bit information in an RGB image represents millions of colors.

1.4 Image Processing

Image Processing (IP) is indeed a method of conducting some few operations on an image with the particular objective of getting a better picture as well as extracting the large range of valuable information from all of this. This is a type with signal processing where an image is being used as the input as well as the outcome is an image or even a characteristic related to such an image. IP is among the quickest technologies in recent years. It also is a focal point with study throughout computer engineering scientific fields. Analogous to pictures, it's a form of signal indulgence. Generally, the whole method presents pictures as two-dimensional signals while still going to employ signal processing techniques. Its own applications are found in several areas of a business, and this is one of today's quickest technologies (Elkouny, A. et. al., 2002). A Digital Image Processing has been involved in the process of building a visual scheme but also, as a result, an established platform conducting maneuverability on even a digital image.

Complete Chapter List

Search this Book:
Reset