CFP last date
20 January 2025
Reseach Article

Result Analysis of Reversible Data Hiding in Encrypted JPEG Bitstream

by Pooja Dwivedi, Sonulal, Deepak Mishra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 158 - Number 10
Year of Publication: 2017
Authors: Pooja Dwivedi, Sonulal, Deepak Mishra
10.5120/ijca2017912858

Pooja Dwivedi, Sonulal, Deepak Mishra . Result Analysis of Reversible Data Hiding in Encrypted JPEG Bitstream. International Journal of Computer Applications. 158, 10 ( Jan 2017), 18-21. DOI=10.5120/ijca2017912858

@article{ 10.5120/ijca2017912858,
author = { Pooja Dwivedi, Sonulal, Deepak Mishra },
title = { Result Analysis of Reversible Data Hiding in Encrypted JPEG Bitstream },
journal = { International Journal of Computer Applications },
issue_date = { Jan 2017 },
volume = { 158 },
number = { 10 },
month = { Jan },
year = { 2017 },
issn = { 0975-8887 },
pages = { 18-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume158/number10/26942-2017912858/ },
doi = { 10.5120/ijca2017912858 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:04:26.300518+05:30
%A Pooja Dwivedi
%A Sonulal
%A Deepak Mishra
%T Result Analysis of Reversible Data Hiding in Encrypted JPEG Bitstream
%J International Journal of Computer Applications
%@ 0975-8887
%V 158
%N 10
%P 18-21
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper to identify usable bits suitable for data hiding so that the encrypted bit stream carrying secret data can be right decoded. The secret message bits area unit encoded with error correction codes to achieve a perfect data extraction and image improvement. the propose technique aims at encrypting a IMAGE bit stream into a appropriately prepared structure, and embed a secret message into the encrypted bit stream by slightly modifying the IMAGE stream. In this paper result analysis of reversible data hiding method.

References
  1. Hao-Tian Wu, Jean-Luc Dugelay and Yun-Qing Shi, \“Reversible Image Data Hiding with Contrast Enhancement”, IEEE Signal Pro. Letters, vol. 22, no. 1, pp. 81-85 Jan. 2015
  2. Xinpeng Zhang, “Reversible Data Hiding in Encrypted Image”, IEEE Signal Pro. Letters, vol. 18, no. 4, pp. 255-258 April 2011.
  3. Wei-Liang Tai, Chia-Ming Yeh, and Chin-Chen Chang, “Reversible Data Hiding Based on Histogram Modification of Pixel Differences”, IEEE Trans. on Circuits and Systems for Video Techno., vol. 19, no. 6,pp. 906-910 June 2009.
  4. Mehmet U. Celik, Gaurav Sharma, A. Murat Tekalp and Eli Saber, “Reversible DATA Hiding” IEEE ICIP pp. 157-160. 2002.
  5. Chia-Chen Lina, Wei-Liang Tai and Chin-Chen Chang “Multilevel reversible data hiding based on histogram modification of difference images” Pattern Recognition 41 pp. 3582 -- 3591 2008.
  6. Z. Ni, Y. Shi, and N. Ansari et al., “Reversible data hiding,” IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354–362, Mar.2006.
  7. D. M. Thodi and J. J. Rodriguez, “Expansion embedding techniques for reversible watermarking,” IEEE Trans. Image Process., vol. 16, no. 3, pp. 721–730, Mar. 2007.
  8. L. Luo et al., “Reversible image watermarking using interpolation technique,” IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 187–193,Mar. 2010.
  9. X. L. Li, B. Yang, and T. Y. Zeng, “Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection,” IEEE Trans. Image Process., vol. 20, no. 12, pp. 3524–3533, Dec.2011.
  10. X. Zhang, “Reversible data hiding with optimal value transfer,” IEEE Trans. Multimedia, vol. 15, no. 2, pp. 316–325, 2013.
  11. W. Zhang, B. Chen, and N. Yu, “Improving various reversible data hiding schemes via optimal codes for binary covers,” IEEE Trans. Image Process., vol. 21, no. 6, pp. 2991–3003, Jun. 2012.
  12. N. Memon and P. W. Wong, “A buyer-seller watermarking protocol,” IEEE Trans. Image Process., vol. 10, no. 4, pp. 643–649, Apr. 2001.
  13. M. Deng, T. Bianchi, A. Piva, and B. Preneel, “An efficient buyer-seller watermarking protocol based on composite signal representation,” in Proc. 11th ACM Workshop Multimedia and Security, 2009, pp. 9–18.
  14. S. Lian, Z. Liu, Z. Ren, and H. Wang, “Commutative encryption and watermarking in video compression,” IEEE Trans. Circuits Syst. Video Technol., vol. 17, no. 6, pp. 774–778, Jun. 2007.
  15. X. Zhang, “Reversible data hiding in encrypted images,” IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255–258, Apr. 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Encrypted image image recovery information hiding JPEG reversible data hiding