CFP last date
20 December 2024
Reseach Article

Reversible Data Hiding in Enrcypted Image by Vacating Room before Encryption

by Sayli P. Raut, Kiran A. Bhandari
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 147 - Number 13
Year of Publication: 2016
Authors: Sayli P. Raut, Kiran A. Bhandari
10.5120/ijca2016911306

Sayli P. Raut, Kiran A. Bhandari . Reversible Data Hiding in Enrcypted Image by Vacating Room before Encryption. International Journal of Computer Applications. 147, 13 ( Aug 2016), 24-28. DOI=10.5120/ijca2016911306

@article{ 10.5120/ijca2016911306,
author = { Sayli P. Raut, Kiran A. Bhandari },
title = { Reversible Data Hiding in Enrcypted Image by Vacating Room before Encryption },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2016 },
volume = { 147 },
number = { 13 },
month = { Aug },
year = { 2016 },
issn = { 0975-8887 },
pages = { 24-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume147/number13/25715-2016911306/ },
doi = { 10.5120/ijca2016911306 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:51:52.425887+05:30
%A Sayli P. Raut
%A Kiran A. Bhandari
%T Reversible Data Hiding in Enrcypted Image by Vacating Room before Encryption
%J International Journal of Computer Applications
%@ 0975-8887
%V 147
%N 13
%P 24-28
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography has emerged as a very popular topic in recent years. A lot of research is being done in order to enhance the confidentiality measures. RDH i.e. Reversible Data Hiding is a step in the same direction that has been taken recently. Data confidentiality and integrity have become most important aspect of this communication world. Where, cryptography involves both encryption and embedding of data, the main aspects to keep the data integrity and confidentiality intact. Encryption domain has more importance in data hiding. Data concealing can be done through any channels like audio, video, image etc. and send to receiver. Receiver will acquire data from the media where it embeds data. Data hiding can be done for sending highly classified data. For with Reversible Data Hiding is becoming more popular. Reversible data hiding is an approach by which the original image can be recovered without any loss when the data embed in it is extracted. This paper focuses on main approaches of RDH i.e. Vacating Room after Encryption and Vacating Room before Encryption and compares the performance of same on the basis of various RDH techniques.

References
  1. Reversible Data Hiding in Encrypted Images by ReservingRoom Before Encryption Kede Ma, Weiming Zhang, Xianfeng Zhao, Member, IEEE, Nenghai Yu, and Fenghua Li MARCH 2013
  2. W. Zhang, B. Chen, and N. Yu, “Improving various reversible data hiding schemes via optimal codes for binary covers,” IEEE Trans. Image Process., vol. 21, no. 6, pp. 2991–3003, Jun. 2012.
  3. J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896, Aug. 2003.
  4. W. Zhang, B. Chen, and N. Yu, “Capacity-approaching codes for reversible data hiding,” in Proc 13th Information Hiding (IH’2011), LNCS 6958, 2011, pp. 255–269, Springer-Verlag.
  5. T. Kalker and F.M.Willems, “Capacity bounds and code constructions for reversible data-hiding,” in Proc. 14th Int. Conf. Digital Signal Processing (DSP2002), 2002, pp. 71–76.
  6. W. Zhang, B. Chen, and N. Yu, “Capacity-approaching codes for reversible data hiding,” in Proc 13th Information Hiding (IH’2011), LNCS 6958, 2011, pp. 255–269, Springer-Verlag.
  7. W. Zhang, B. Chen, and N. Yu, “Improving various reversible data hiding schemes via optimal codes for binary covers,” IEEE Trans.Image Process., vol. 21, no. 6, pp. 2991–3003, Jun. 2012.
  8. D. Slepian and J. K. Wolf, “Noiseless coding of correlated information sources,” IEEE Trans. Inform. Theory, vol. IT-19, pp. 471–480, July 1973.
  9. T. M. Cover and J. A. Thomas, Elements of Information Theory. New York: Wiley, 1991
  10. W. Liu, W. Zeng, L. Dong, et al. “Efficient compression of encrypted grayscale images,” IEEE Trans. on Image Processing, vol. 19, no. 4, pp. 1097-1102, 2010.
  11. W. E. Ryan, “An introduction to LDPC codes,” in CRC Handbook for Coding and Signal Processing for Recoding Systems (B. Vasic, ed.), CRC Press, 2004.
  12. K. Ma, W. Zhang, et al. “Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption,” IEEE Trans. Inf. Forensics Security, vol. 8, no. 3, 553-562, 2013
  13. W. Puech, M. Chaumont and O. Strauss, “A reversible data hiding method for encrypted images,” Proc. SPIE 6819, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, 68191E, Feb. 26, 2008, doi:10.1117/12.766754
  14. X. Zhang, “Separable reversible data hiding in encrypted image,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 826–832, Apr. 2012.
  15. X. Zhang, “Reversible data hiding in encrypted images,” IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255–258, Apr. 2011.
  16. W. Hong, T. Chen, and H. Wu, “An improved reversible data hiding in encrypted images using side match,” IEEE Signal Process. Lett., vol. 19, no. 4, pp. 199–202, Apr. 2012.
  17. Z. Qian, X. Han and X. Zhang, “Separable Reversible Data hiding in Encrypted Images by n-nary Histogram Modification,” 3rd International Conference on Multimedia Technology (ICMT 2013), pp. 869-876, Guangzhou, China, 2013.
  18. K. Ma, W. Zhang, et al. “Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption,” IEEE Trans. Inf. Forensics Security, vol. 8, no. 3, 553-562, 2013.
  19. W. Zhang, K. Ma and N. Yu, “Reversibility improved data hiding in encrypted images,” Signal Processing, vol. 94, pp. 118–127, 2014.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Encryption Decryption Reversible Data Hiding Data Embedding