Cryptography Using Contrast Enhancement

Authors

  • M. M. Raghavendra  ECE, Brindavan Institute Of Technology And Sciences Kurnool, Andhra Pradesh, India
  • Sharvani  ECE, Brindavan Institute Of Technology And Sciences Kurnool, Andhra Pradesh, India
  • Satya Narayana  ECE, Brindavan Institute Of Technology And Sciences Kurnool, Andhra Pradesh, India
  • Vijay Kumar  ECE, Brindavan Institute Of Technology And Sciences Kurnool, Andhra Pradesh, India
  • Venkata Raju  ECE, Brindavan Institute Of Technology And Sciences Kurnool, Andhra Pradesh, India

Keywords:

Discrete wavelet transform , Contrast enhancement

Abstract

The proposed method of cryptography using contrast enhancement consists of two processes - extraction and recovery. Very often, the communication is required to be secure when the data is sensitive. The existing methods such as the Difference Expansion and Expansion Embedding suffer from undesirable distortion, which makes these methods unsuitable or less reliable. These methods use FFT (fast fourier transform) and this may result in loosing the data at the receiver part. The technique used in proposed system is discrete wavelet transform to achieve data without any loss. The message is embedded into cover image based on key and then, the covered image is transmitted. In this proposed system, one first contribution is a histogram shifting modulation, which adaptively takes care of the image content using the image prediction-errors and, by considering their immediate neighbourhood, the proposed scheme inserts data in textured areas where other methods fail to do so. This method inserts the carrier (cover) in the textured area and thus reduces the distortion. It also increases the embedding capacity of the cover image. In that way, the message embedded and extractor remain synchronized for message extraction and image reconstruction.

References

  1. Dawen Xu, Rangding Wang, and Yun Q. Shi, Fellow, IEEE "Data Hiding in Encrypted H.264/AVC Video Streams by Code word Substitution" IEEE Transaction On Information Forensics and Security, Vol. 9, NO. 4, April 2014 applied to? machine vibration analysis," in Proc. ASCI, 1999, pp. 398?405.
  2. Kede Ma. Weiming Zhang, Xianfeng Zhao, Nenghai Yu,Fenghua Li, "Reversible Data Hiding in Images by Reserving Room Before Encryption", IEEE Trans on Information Forensics and security, Vol. 8, No. 3, March 2013
  3. Kuo-Ming Hung, Wen-Kai Su, Ting-Wen Chen, LiMing Chen, "Reversible Data Hiding Base on VQ and Halftoning Technique", International Conference on Microelectronics, Communication and Renewable Energy (ICMiCR-2013).
  4. Jose, R.; Abraham, G, "A separable reversible data hiding in encrypted image with improved performance", Emerging Research Areas and 2013 International Conference on Microelectronics, Communications and Renewable Energy( AICERA/ICMiCR), 2013 Annual International Conference l'IEEE 2013.
  5. Siddhartha Malik, Anjali Sardana, Jaya, "A Keyless Approach to Image Encryption", 2012 international conference on Communication systems and Network Technologies l'2012 IEEE
  6. Yi-Hui Chen, Ci-Wei lan and Chiao Chih Huang, " A verifiable Visual Cryptography Scheme", Fifth International Conference and Evolutionary Computing l' IEEE 2011
  7. D. Coltuc, "Improved embedding for predictionbased reversible watermarking," IEE E Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 873?882, Sep. 2011.
  8. Wen Chung Kuo, Po Yu Lai, Lih Chyau Wuu, "Adaptive Reversible Data Hiding Based on
  9. Histogram",10th International Conference on Intelligent Systems Design and Application, l' IEEE 2010 (2002) The IEEE website. Online]. Available: http://www.ieee.org/
  10. W. Pan, G. Coatrieux, N. Cuppens, F. Cuppens, and C. Roux, "An additive and lossless watermarking method based on invariant image approximation and Haar wavelet transform," in Proc. IEEE EMBC Conf., Buenos Aires, Argentina, 2010, pp. 4740?4743. 11H. J. Hwang, H. J. Kim, V. Sachnev, and S. H. Joo, "Reversible watermarking method using optimal histogram pair shifting based on prediction and sorting? Internet Inform. Syst., vol. 4, no. 4, pp. 655?670, Aug. 2010. 11C. H.Yang andM.H. Tsai, "Improving histogram based reversible data hiding by interleaving predictions," IET Image Process., vol. 4, no. 4, pp. 223?234, Aug. 2010.

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
M. M. Raghavendra, Sharvani, Satya Narayana, Vijay Kumar, Venkata Raju, " Cryptography Using Contrast Enhancement, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 4, Issue 5, pp.1267-1273, March-April-2018.