A Hybrid Approach of Cryptography: Watermarking Scheme Based on Quantum Chaos

A Hybrid Approach of Cryptography: Watermarking Scheme Based on Quantum Chaos

Ranjeet Kumar Singh
DOI: 10.4018/IJSESD.326758
Article PDF Download
Open access articles are freely available for download

Abstract

This article represents a dual security mechanism based on compressive sensing, quantum chaos map, random pixel exchange, and frequency division approach. It also provides the digital data authentication system based on combined approach of DWT and SVD. Two watermarks are used for dual authentication purposes and compressive sensing is used to provide parallel compression and data encryption. The detail algorithm and approach is explained in the next section. This approach is more effective than other conventional approachs and takes less time and space complexity to the others i.e. AES, DES RSA type data encryption mechanism. This article also provides the parallel compression mechanism which reduced the required memory size. This mechanism also provides the parallel digital data security as well as authentication system which provided more secure communication on the social network and also provides a secure authentication mechanism based on frequency division, compressive sensing, random pixel exchange, etc. The results are shown in the form of images and tables.
Article Preview
Top

1. Introduction

In recent years, image-based data security or digital data security is a widely research area in information processing. Digital data security and authentication play an important role in information processing. There are several approach and mechanism are available for information security and authentication i.e., cryptography, stenography and watermarking. This paper presents a hybrids concept of cryptography and watermarking mechanism for information security and privacy. In the past few years, a lot of information security and authentication mechanisms have been available to secure the important and valuable digital information. These mechanisms can be deeply classified some categories based on their features. For the purpose of digital content security cryptography plays an important role. A complex algorithm for image-based data encryption is the most recent and updated research field. Haojiang Gao et al. (2006) made a proposal for an indirect disorder calculation based on the reduction and compulsion function instead of the direct dose. In Su Maung et al. (2008), S-box turbulent guides have been used to provide limited protection. Here the creators brought a powerful 8x8 S-box with the help of layout map and 2D mapping method. In Ahmad and Alam (2009), using three different clutter maps, initially, a blank digital image was divided into 8x8 square and later a square based on rearranged images created using a 2D map cap strategy. The redesigned digital image is distorted using the chaotic sequence generated by the 1D strategic guide. Advanced Advanced Guide Calculations are available by Zhang Yun-Peng et al. (2009). This paper addresses disorder and DES based picture encryption. Here creators decreased the hour of emphasis of DES and DES box extension; it utilizes the calculated tumult succession to make the pseudo-arbitrary arrangement. On account of large information or huge picture encryption DNA succession-based encryption is introduced in Zhou et al. (2010). The calculation is fundamentally intended to decrease the encryption time for large computerized content, utilizing DNA groupings as a key. The DNA groupings are utilized to scramble the first digital data i.e image, where DNA layout is planned by utilizing second DNA succession which is utilized for a pixel substitution.

Now a days, due to reduced high computational cost compressive sensing and Arnold cat map are used in data security. Nanrun Zhou et al. (2014) proposed a hybrid algorithm based on measurement matrix in compressive sensing.

In our article, it has two phase one is encrypt the watermark image and other is embedding the encrypted watermark image into cover object. However, the method presented in our paper for the purpose of encryption of watermark, we use quantum chaos to generate a large number of random numbers. Quantum chaos is an ancient method of constructing quantum problem-solving work where quantum is generally considered to be the largest of numbers. Here we look at the frequency-based encryption to provide additional flexibility and robustness in the proposed algorithm. The proposed work first divides the actual image into four blocks and these blocks are further subdivided into parts of the frequency i.e., the horizontal and vertical frequency band at the bottom and the top is used for encryption.

Complete Article List

Search this Journal:
Reset
Volume 15: 1 Issue (2024)
Volume 14: 1 Issue (2023)
Volume 13: 9 Issues (2022)
Volume 12: 4 Issues (2021)
Volume 11: 4 Issues (2020)
Volume 10: 4 Issues (2019)
Volume 9: 4 Issues (2018)
Volume 8: 4 Issues (2017)
Volume 7: 4 Issues (2016)
Volume 6: 4 Issues (2015)
Volume 5: 4 Issues (2014)
Volume 4: 4 Issues (2013)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing