PSO-based steganography scheme using DWT-SVD and cryptography techniques for cloud data confidentiality and integrity

被引:0
|
作者
Mahmood, Ghassan Sabeeh [1 ,2 ]
Huang, Dong Jun [1 ]
机构
[1] School of Information Science and Engineering, Central South University, Changsha,410083, China
[2] Computer Science Department, College of Science, University of Diyala, Diyala, Iraq
关键词
Distributed database systems - Steganography - Singular value decomposition - Cloud storage - Wavelet decomposition - Particle swarm optimization (PSO) - Cloud security - Sensitive data - Signal reconstruction - Hash functions;
D O I
10.3966/199115992019123006003
中图分类号
学科分类号
摘要
Cloud computing is a model of providing services on the Internet, such as software, hardware, networking, and storage. These services can be accessed on a pay-per-use basis from anywhere at any time. However, data security in cloud computing has become a very important issue. One of the main worries of data security involves the cloud service provider, which has the capability to access sensitive data, and this in turn increases users concerns and decreases capability of cloud computing in many areas. This paper focuses on this significant affair and proposes an effective model to protect sensitive data in the cloud in order for cloud service providers do not have direct access to data. This paper puts forward a new method of combining steganography and cryptography techniques. The proposed method utilised Particle Swarm Optimization (PSO)-based steganography scheme using Discrete Wavelet Transform (DWT)- Singular Value Decomposition (SVD). The main components of the secret image are inserted into the host image. Then, the Advanced Encryption Standard (AES) encryption technique is employed to encrypt the stego image to guarantee data confidentiality. In addition, Data integrity is likewise achieved by utilising a secure hash algorithm 2 (SHA-2) by generating the hash value for the encrypted image before the encrypted image is saved in the cloud. Experimental results demonstrate that the proposed method performed well with more robustness, confidentiality, integrity, and high security. © 2019 Computer Society of the Republic of China. All rights reserved.
引用
收藏
页码:31 / 45
相关论文
共 12 条
  • [1] DWT-SVD Based Watermarking Scheme of JPEG Images Using Elliptic Curve Cryptography
    Gupta, Ritu
    Mundra, Pulkit
    Karwal, Shikha
    Singh, Abhilasha
    [J]. 2016 5TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2016, : 359 - 365
  • [2] DWT-SVD Based Image Steganography Using Threshold Value Encryption Method
    Khandelwal, Jyoti
    Sharma, Vijay Kumar
    Singh, Dilbag
    Zaguia, Atef
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (02): : 3299 - 3312
  • [3] A DWT-SVD based multiple watermarking scheme for image based data security
    Singh, Ranjeet Kumar
    Shaw, Dillip Kumar
    Jha, Sudhanshu Kumar
    Kumar, Manish
    [J]. JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2018, 39 (01):
  • [4] A hybrid DWT-SVD copyright protection scheme based on k-means clustering and visual cryptography
    Wang, Ming-Shi
    Chen, Wei-Che
    [J]. COMPUTER STANDARDS & INTERFACES, 2009, 31 (04) : 757 - 762
  • [5] Achieving Data Integrity and Confidentiality Using Image Steganography and Hashing Techniques
    Hambouz, Ahmed
    Shaheen, Yousef
    Manna, Abdelrahman
    Al-Fayoumi, Mustafa
    Tedmori, Sara
    [J]. 2019 2ND INTERNATIONAL CONFERENCE ON NEW TRENDS IN COMPUTING SCIENCES (ICTCS), 2019, : 45 - 50
  • [6] A DWT-SVD based adaptive color multi-watermarking scheme for copyright protection using AMEF and PSO-GWO
    Shen, Yuxin
    Tang, Chen
    Xu, Min
    Chen, Mingming
    Lei, Zhenkun
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2021, 168
  • [7] Digital Image Watermarking Using (2,2) Visual Cryptography with DWT-SVD Based Watermarking
    Kaur, Kamal Nayan
    Divya
    Gupta, Ishu
    Singh, Ashutosh Kumar
    [J]. COMPUTATIONAL INTELLIGENCE IN DATA MINING, 2019, 711 : 77 - 86
  • [8] Data Confidentiality and Integrity Verification using User Authenticator scheme in cloud
    Nirmala, V.
    Sivanandhan, R. K.
    Lakshmi, R. Shanmuga
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON GREEN HIGH PERFORMANCE COMPUTING (ICGHPC), 2013,
  • [9] A Novel Multiple Objective Optimized Dual Watermarking Scheme Based On DWT-SVD Using Firefly Algorithm
    Sejpal, Shveti
    Shah, Nikesh
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTING, ANALYTICS AND SECURITY TRENDS (CAST), 2016, : 46 - 51
  • [10] A SIFT-Based Robust Watermarking Scheme in DWT-SVD Domain Using Majority Voting Mechanism
    Liu, Zhen
    Zhu, Yue-Sheng
    Fan, Yi
    Sun, Zi-Qiang
    Lin, Han-Chi
    [J]. EIGHTH INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2016), 2016, 10033