A Robust Image Cryptography Scheme using Optimal Band Selection and Dynamic Key Embedding
Ali Baig Mohammad1, Tummala Ranga Babu2

1Ali Baig Mohammad, Research Scholar, ECE Dept., ANU College of Engg. & Tech., Acharya Nagarjuna University, Guntur, Assistant Professor, ECE Dept., Koneru Lakshmaiah Education Foundation, Vaddeswaram, Andhra Pradesh, India.
2Prof. Tummala. Ranga Babu, Professor & Head, ECE Dept., R.V.R & J.C College of Engineering, Guntur, Andhra Pradesh, India.
Manuscript received on July 20, 2019. | Revised Manuscript received on August 10, 2019. | Manuscript published on August 30, 2019. | PP: 2224-2229 | Volume-8 Issue-6, August 2019. | Retrieval Number: F8620088619/2019©BEIESP | DOI: 10.35940/ijeat.F8620.088619
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Secure Image transmission over media like internet has become very important these days. Several techniques for enhancing security during image transmission like cryptography, steganography, etc. evolved over a period of time. In all these techniques, the images are converted to a form that is not detectable by the intermediate user except the sender and the authenticated user. Still these techniques have limitations in ensuring security in the transmission of secret images due to several attacks in the channel through which they are transmitted. In this paper, an approach of embedding secret information in a host image is carried out using a method of selecting the room for embedding in an optimal way to make the model robust against attacks. Further, an optimal way of key embedding is carried out on the selected band. The encrypted image obtained during the above mentioned steps is subjected to several attacks and the effected image is decrypted and the results are compared with the original host image with respect to the metrics like Peak Signal to Noise Ratio (PSNR), Mean Squared Error (MSE) and Normalized Cross Correlation (NCC). This proposed method is applied on several images and the above-mentioned metrics are obtained. The proposed approach proves to outperform the conventional LL band selection and LSB Key embedding methods.
Keywords: Cryptography, Discrete Wavelet Transform, PSNR, MSE, NCC.