We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Performance Analysis on Different Images using Reversible Data Hiding Technique and its Application

by Khan Amrin Naaz, Imdad Rizvi, M.M. Kadam
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 129 - Number 16
Year of Publication: 2015
Authors: Khan Amrin Naaz, Imdad Rizvi, M.M. Kadam
10.5120/ijca2015907006

Khan Amrin Naaz, Imdad Rizvi, M.M. Kadam . Performance Analysis on Different Images using Reversible Data Hiding Technique and its Application. International Journal of Computer Applications. 129, 16 ( November 2015), 44-57. DOI=10.5120/ijca2015907006

@article{ 10.5120/ijca2015907006,
author = { Khan Amrin Naaz, Imdad Rizvi, M.M. Kadam },
title = { Performance Analysis on Different Images using Reversible Data Hiding Technique and its Application },
journal = { International Journal of Computer Applications },
issue_date = { November 2015 },
volume = { 129 },
number = { 16 },
month = { November },
year = { 2015 },
issn = { 0975-8887 },
pages = { 44-57 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume129/number16/23161-2015907006/ },
doi = { 10.5120/ijca2015907006 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:23:38.303715+05:30
%A Khan Amrin Naaz
%A Imdad Rizvi
%A M.M. Kadam
%T Performance Analysis on Different Images using Reversible Data Hiding Technique and its Application
%J International Journal of Computer Applications
%@ 0975-8887
%V 129
%N 16
%P 44-57
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Communicating securely is what everyone wants. Earlier it was simply data hiding then reversible data hiding and currently its encrypted data hiding reversibly. Introducing new challenge is always as important as keeping it unreachable to the hacker. In proposed work security is enhanced by encrypting data and then embedding the encrypted form of data. Reserve Room before encryption gives an added advantage for enough space for data hiding. Haar wavelet is best suitable wavelet amongst other wavelet like symlet, bior, coiflet and contourlet, when the input image is encrypted image rather than a plain image. The quality of image has been evaluated by performance analysis like MSE, PSNR and hiding capacity on different types of color images and results were compared. Minimum errors with high SNR rate at various data hiding capacity were seen.

References
  1. A.M. Alattar. 2004. Reversible watermark using difference expansion of quads. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, 3, (May 2004), 377–380,4pagesDOI:http://dx.doi.org/10.1109/ICASSP.2004.1326560
  2. J. Tian. 2003. Reversible data embedding using a difference expansion. IEEE Transactions on Circuits and Systems for Video Technology 13 (8), (August2003), 890–896,7pagesDOI:http://dx.doi.org 10.1109/TCSVT.2003.815962
  3. Princy Raj and sreekumar k. 2014. A Survey on Reversible Data Hiding in Encrypted images. International Journal of Computer Science and Information Technologies, 5 (6),(2014),77487751.http://www.ijcsit.com/docs/Volume%205/vol5issue06/ijcsit20140506187.pdf
  4. Sukhdeep kaur and manshi shukla. 2014. Reversible Data Hiding and its Method: A Survey. International Journal of Computer Science and Mobile Computing, 3 (5), (May 2014), 821-826. http://ijcsmc.com/docs/papers/May2014/V3I5201499a60.pdf
  5. M. Arslan, S.A. Malik and A. Khan. 2012. Intelligent reversible watermarking in integer wavelet domain for medical images. Journal of Systems and Software 85(4), (April 2012)) 883–894.DOI:http://dx.doi.org/10.1016/j.jss.2011.11.005
  6. M.U. Celik, G. Sharma, A.M. Tekalp and E. Saber. 2005. Lossless generalized-LSB data embedding. IEEE Transactions on Image Processing 14 (2), (Feb 2005), 253–266.DOI:http://dx.doi.org /10.1109/TIP.2004.840686
  7. Masoud Nosrati, Ronak Karimi and Hojat Allah Hasanvand. 2012. Spatial and Transform Domains RDH Methods. World Applied Programming, 2(6), (June 2012), 373-376, ISSN: 2222-2510 ©2011 WAP journal. www.waprogramming.com.http://waprogramming.com/papers/50af8125c1b596.75214390.pdf
  8. X. Zhang. 2011. Reversible data hiding in encrypted image. IEEE Signal Process. Lett., 18(4), (Feb 2011), 255–258.DOI:http://dx.doi.org /10.1109/LSP.2011.2114651
  9. Akash Kumar Mandal, Chandra Parakash and Mrs. Archana Tiwari. 2012. Performance Evaluation of Cryptographic Algorithms: DES and AES. IEEE Trans. on Electrical, Electronics and Computer Science, (March 2012), 1-5.DOI:http://dx.doi.org /10.1109/SCEECS.2012.6184991
  10. P. Tsai, Y. C. Hu, and H. L. Yeh. 2009. Reversible image hiding scheme using predictive coding and histogram shifting. In Signal Process, 89(6), (June 2009), 1129–1143.DOI:http://dx.doi.org /10.1016/j.sigpro.2008.12.017
  11. Kede Ma, Weiming Zhang and Xianfeng Zhao. 2013. Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans. Inf. Forensics Security, 8(3), (March 2013), 553-562.DOI:http://dx.doi.org/10.1016/j.sigpro.2013.06.023
  12. T. Kalker and F.M.Willems. 2002. Capacity bounds and code constructions for reversible data-hiding. In Proc. 14th Int. Conf. Digital Signal Processing (DSP2002), 71–76.DOI: http://dx.doi.org/10.1106/icdsp.2002.1027818
  13. J. Fridrich and M. Goljan. 2002. Lossless data embedding for all image formats. In Proc. SPIE Proc. Photonics West, Electronic Imaging, Security and Watermarking of Multimedia Contents, San Jose, CA, USA,4675,572–583.DOI:http://dx.doi.org /10.1117/12.465317
  14. W. Zhang, B. Chen, and N. Yu. 2011. Capacity-approaching codes for reversible data hiding. In Proc 13th Information Hiding (IH’2011), LNCS 6958, 2011, Springer-Verlag, 255–269.DOI:http://dx.doi.org /10.1007/978-3-642-24178-9_18
  15. Sushil Kumar and S.K. Mutttoo. 2011. Steganography based on contourlet transform. (IJCSIS) International journal of computer science and information security, 9(6), 215-220.
  16. Sushil Kumar and S.K. Mutttoo. 2013. Image Steganography based on wavelet families. Journal of Computer Engineering and Information Technology, 2(2), 1000105.DOI:http://dx.doi.org/10.4172/2324-9307.1000105
  17. Muhammad Arsalan, Sana Ambreen Malik and Asifullah Khan. 2012. Intelligent reversible watermarking in integer wavelet domain for medical images. The Journal of Systems and Software 85, 883– 894.DOI:http://dx.doi.org /doi:10.1016/j.jss.2011.11.005.
Index Terms

Computer Science
Information Sciences

Keywords

Reversible data hiding chaos encryption LSB replacement RSA key encryption Haar Wavelet transform LWT PSNR etc..