Future Internet Technologies and Trends. First International Conference, ICFITT 2017, Surat, India, August 31 - September 2, 2017, Proceedings

Research Article

An Efficient Privacy Preserving System Based on RST Attacks on Color Image

Download
187 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-73712-6_2,
        author={Sheshang Degadwala and Sanjay Gaur},
        title={An Efficient Privacy Preserving System Based on RST Attacks on Color Image},
        proceedings={Future Internet Technologies and Trends. First International Conference, ICFITT 2017, Surat, India, August 31 - September 2, 2017, Proceedings},
        proceedings_a={ICFITT},
        year={2018},
        month={2},
        keywords={QR codes VCS RGB-extract Block-DWT Surf Affine RST attacks},
        doi={10.1007/978-3-319-73712-6_2}
    }
    
  • Sheshang Degadwala
    Sanjay Gaur
    Year: 2018
    An Efficient Privacy Preserving System Based on RST Attacks on Color Image
    ICFITT
    Springer
    DOI: 10.1007/978-3-319-73712-6_2
Sheshang Degadwala1,*, Sanjay Gaur1,*
  • 1: Madhav University
*Contact email: sheshang13@gmail.com, sanjay.since@gmail.com

Abstract

In Development of network communication need protect the transmission with fast Communication. Therefore, networking producers need to be constantly manage illegal use of the data. In our proposed approach, first step enter the user name and password then generate in text format that will be converted to QR-code using zxing library. Now the QR-code will be converted in to the share using Binary Visual cryptography algorithm. After that generated share-2 is save in the database that is for future reference at receiver side and share-1 is embedding into the R-Component LL bit using of block DWT-SVD and Pseudo Zernike moment. In embedded image further add G, B Component. So, Color watermark image is ready to transfer from the network. As in network there are different attackers apply RST attacks on the color watermark image and Generated attack Watermark Image. At the receiver side recover the attacks first apply Pseudo Zernike moment, Surf feature on R-component so, they will extract the attacks pixel and recover the scale-angle using affine transformation. Now share-1 and another share-2 is in data base so we will apply EX-OR operation to get the QR-Code. The final QR-code is decoded and we get the user name and password. This research work can give a way for providing authentication to all online Services.