We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Reversible Data Hiding for Security Applications

by Baig Firdous Sulthana, S. Bhavani
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 106 - Number 14
Year of Publication: 2014
Authors: Baig Firdous Sulthana, S. Bhavani
10.5120/18592-9922

Baig Firdous Sulthana, S. Bhavani . Reversible Data Hiding for Security Applications. International Journal of Computer Applications. 106, 14 ( November 2014), 38-43. DOI=10.5120/18592-9922

@article{ 10.5120/18592-9922,
author = { Baig Firdous Sulthana, S. Bhavani },
title = { Reversible Data Hiding for Security Applications },
journal = { International Journal of Computer Applications },
issue_date = { November 2014 },
volume = { 106 },
number = { 14 },
month = { November },
year = { 2014 },
issn = { 0975-8887 },
pages = { 38-43 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume106/number14/18592-9922/ },
doi = { 10.5120/18592-9922 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:39:26.025216+05:30
%A Baig Firdous Sulthana
%A S. Bhavani
%T Reversible Data Hiding for Security Applications
%J International Journal of Computer Applications
%@ 0975-8887
%V 106
%N 14
%P 38-43
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper discuss about RDH technique in encrypted image. In this paper RDH use single-level-2D-DWT and optimal transfer mechanism. Original image is converted into number to string which is having some numeric values. In the RDH technique a host image is taken and is divided into two parts. The pixel values of each part are calculated and estimate the errors using optimal mechanism. Optimal mechanisms find out the errors which are closer to zero and reduce the payload distortion problem. Then data will be embedded. Single-level-2D-DWT is used for filtration of embedded data; it will help in removing the de-noising, compression, expansion of image. The image will be hided and that hided image is send to recipient. The sender will send the two keys. The recipient will successfully take out the embed covert data and recovered the original data using inverse process.

References
  1. M. Goljan, J. Fridrich, & R. Du, "Distortion-free in data embedding," In proc. 4th Int. Workshop is on Information Hiding, Lecture Notes in Computer Science, vol. 2137, pp. 27-41 , 2001.
  2. M. U. Celik, G. Sharma, A. M. Tekalp, & E. Saber, "lossless generalized LSB data on embedding," IEEE trans. Image process. vol. 14, no. 2, pp. 253-266, Feb 2005.
  3. J. Fridrich, M. Goljan, & R. Du,"Lossless data embedding for all image formats,'' in proc. 4th SPIE. Security and Watermarking of Multimedia Contents, vol. 4675, pp. 572-583, 2002.
  4. J. Tia, " Reversible data embedding using the difference expansion, " IEEE Trans. Circuits Syst. Video Technol. , vol. 13, no. 8, pp. 890-896, Aug 2003.
  5. H. -C. Wu, C. -C. Lee, C. -S. Tsai, Y. -P. Chu & H. -R. Chen, "In a high capacity reversible data hiding scheme with an edge prediction & difference expansion," J. Syst. Softw. , vol. 82, pp. 1966-1973, 2009.
  6. L. Kamstra & H. J. A. M. Heijmans,"Reversible data embedding keen on images using wavelet techniques and sorting," IEEE Trans. Image Proces. , vol. 14, no. 12, pp. 2082-2090, Dec 2005.
  7. H. J. Kim, V. Sachnev, Y. Q. Shi, J. Nam, & H. -G. Choo,"A novel difference expansion transform used for reversible data embedding," IEEE Trans. Inf. Forensics.
  8. S. Weng, Y. Zhao, J. -S. Pan, & R. Ni," Reversible watermarking based on invariability and adjustment on pixel pairs," IEEE Signal Process. Lett, vol. 15, pp. 721-724, 2008.
  9. Y. Hu, H. -K . Lee, & J. Li," DE-based reversible data hiding by improving overflow location map," IEEE Trans. Circuits Syst, Video Techol. , vol. 19, no. 2, pp. 250-260, Feb 2009.
  10. Z. - Ni, Y. Q. Shi, N. Ansari, & W. Su, "Reversible data hiding," IEEE Trans. Circuits Syst. Video Technol. , vol. 16, no. 3, pp. 354-362, Mar 2006.
  11. W. -L. Tai, C. -C. Chang, "Reversible data hiding based on histogram modification of pixel differences," IEEE Trans. Circuits Syst. Video Technol. , vol. 19, no. 6, pp. 906-910, Jun 2009.
  12. C. -C. Chang, C. -C. Lin, Y. -H. Chen," Reversible data-embedding scheme using differences between original & predicted pixel values," IET Inf. Security, vol. 2, no. 2, pp. 35-46, 2008.
  13. P. Tsai, Y. -C. Hu, H. -L. Yeh, "Reversible image hiding scheme using predictive coding & histogram shifting," Signal Process. vol. 89, pp. 1129-1143, 2009.
  14. W. Hong, T. -S. Chen, Y. -p. Chang, a C. -W. Shiu, "In a high capacity reversible data hiding scheme using of orthogonal projection and prediction error modification," Signal Process. , vol . 90, pp. 2911-2922, 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Optimal transfer mechanism Reversible data hiding and Single-level-2D-DWT