dc.contributor.author | Shifa, Amna | |
dc.contributor.author | Afgan, Muhammad Sher | |
dc.contributor.author | Asghar, Mamoona Naveed | |
dc.contributor.author | Fleury, Martin | |
dc.contributor.author | Memon, Imran | |
dc.contributor.author | Abdullah, Saima | |
dc.contributor.author | Rasheed, Nadia | |
dc.date.accessioned | 2020-05-21T08:12:57Z | |
dc.date.available | 2020-05-21T08:12:57Z | |
dc.date.copyright | 2018 | |
dc.date.issued | 2018-03-12 | |
dc.identifier.citation | Shifa, A., Afgan, M.S., Asghar, M.N., Fleury, M., Memon, I., Abdullah, S., Rasheed, N. (2018). Joint crypto-stego scheme for enhanced image protection with nearest-centroid clustering. IEEE Access. 6, pp. 16189 - 16206. doi: 10.1109/ACCESS.2018.2815037 | en_US |
dc.identifier.issn | 2169-3536 | |
dc.identifier.other | Articles - Software Research Institute AIT | en_US |
dc.identifier.uri | http://research.thea.ie/handle/20.500.12065/3223 | |
dc.description.abstract | Owing to the exceptional growth of information exchange over open communication
channels within the public Internet, confidential transmission of information has become a vital current
concern for organizations and individuals. In the proposed content-protection scheme, the decryption key is
embedded in the encrypted image by utilizing machine learning, nearest-centroid clustering classifier,
followed by Least Significant Bit matching (LSB-M) in the spatial domain. An image is first encrypted with
the Advanced Encryption Standard (AES) algorithm in output feedback (OFB) mode, after which the AES
key is embedded into the encrypted image. Preliminary nearest-centroid clustering followed by shuffling
the sequence of pixels within the clusters before applying LSB-M makes any attack more complex, as the
bits of the key are further dispersed within the encrypted image. In terms of contributions, one contribution
is the direct implementation of the proposed security mechanism on color images rather than first
converting them into gray tones. Another contribution of the Crypto-Stego method is that, it requires no
separate key distribution mechanism to decrypt the information. In addition, a parallel-processing approach
is implemented to improve the execution time and the efficiency of the scheme by exploiting system
resources. Extensive experiments were performed on RGB images with different resolutions and sizes to
confirm the effectiveness of the scheme. The high Structural Similarity (SSIM) index score confirmed that
the overall carrier image and stego-image were unaltered by processing. While an average value over the
test images of 0.0594 for Mean Squared Error (MSE) confirmed that malicious individuals cannot detect
the presence of stego data in the cover image. Moreover, negligible pixel intensity histogram changes also
validated the effectiveness of the proposed scheme. An average 77% efficiency and 1.5 times speed-up
factor was achieved through parallel processing showed the effectiveness of the joint Crypto-Stego method
for image confidentiality. | en_US |
dc.format | PDF | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.relation.ispartof | IEEE Access | en_US |
dc.rights | Attribution-NonCommercial-NoDerivs 3.0 Ireland | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/ie/ | * |
dc.subject | Cryptography | en_US |
dc.subject | Image processing | en_US |
dc.subject | Nearest-centroid clustering | en_US |
dc.subject | LSB-M steganography | en_US |
dc.subject | Parallel processing | en_US |
dc.title | Joint crypto-stego scheme for enhanced image protection with nearest-centroid clustering. | en_US |
dc.type | Article | en_US |
dc.description.peerreview | yes | en_US |
dc.identifier.doi | doi: 10.1109/ACCESS.2018.2815037 | |
dc.rights.access | Open Access | en_US |
dc.subject.department | Software Research Institute AIT | en_US |