CFP last date
20 December 2024
Reseach Article

Secure Image of Reversible Data Hiding and Deep Learning Algorithms for Image Reconstruction

by Somya Jain, Rahul Sahu
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 174 - Number 12
Year of Publication: 2021
Authors: Somya Jain, Rahul Sahu
10.5120/ijca2021920996

Somya Jain, Rahul Sahu . Secure Image of Reversible Data Hiding and Deep Learning Algorithms for Image Reconstruction. International Journal of Computer Applications. 174, 12 ( Jan 2021), 13-16. DOI=10.5120/ijca2021920996

@article{ 10.5120/ijca2021920996,
author = { Somya Jain, Rahul Sahu },
title = { Secure Image of Reversible Data Hiding and Deep Learning Algorithms for Image Reconstruction },
journal = { International Journal of Computer Applications },
issue_date = { Jan 2021 },
volume = { 174 },
number = { 12 },
month = { Jan },
year = { 2021 },
issn = { 0975-8887 },
pages = { 13-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume174/number12/31729-2021920996/ },
doi = { 10.5120/ijca2021920996 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:21:54.288537+05:30
%A Somya Jain
%A Rahul Sahu
%T Secure Image of Reversible Data Hiding and Deep Learning Algorithms for Image Reconstruction
%J International Journal of Computer Applications
%@ 0975-8887
%V 174
%N 12
%P 13-16
%D 2021
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is one of the powerful techniques in data hiding. It is the branch of secret communication where the cover image is recovered after the embedded data is extracted from the stego image. One of the applications of steganography is Reversible Data hiding (RDH) and deep learning. RDH is the method in which original cover can be losslessly recovered after the embedded message is extracted. Deep learning models are well known as deep black boxes in which the process from the input to the output is very complex, and thus the deep learning model for information hiding is almost impossible for opponents to reconstruct. An attempt has been made to present a Threshold Based Reversible Data Hiding (TBRDH) and deep learning by creating space before encryption and different metric parameters like mean square error, PSNR, SSIM, NAE and NCC are calculated for the cover image and reconstructed image.

References
  1. Chang CC, Lin MH, Hu YC. "A fast and secure image hiding scheme based on LSB substitution". International Journal of Pattern Recognition and Artificial Intelligence. Vol 16 No 4, Jun 2002, PP.399-416.
  2. Wang ZH, Kieu TD, Chang CC, Li MC. "A novel information concealing method based on exploiting modification direction". Journal of Information Hiding and Multimedia Signal Processing. Vol 1 No 1, Jan 2010, PP.1-9.
  3. Zhang J, Zhang D. "Detection of LSB matching steganography in decompressed images". IEEE Signal Processing Letters. Vol 17 No 2, Feb 2010, PP.141-144.
  4. Hong W, Chen TS. "A novel data embedding method using adaptive pixel pair matching". IEEE transactions on information forensics and security. Vol 7 No 1, Feb 2012, PP.176-84.
  5. Sharmila B, Shanthakumari R. Efficient Adaptive Steganography for color images based on LSBMR algorithm. ICTACT Journal on image and video processing. Vol 2 No 3, Feb 2012, PP.387-392.
  6. Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW. "A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image". Multimedia Tools and Applications. Vol 75 No 22, Nov 2016, PP.14867-93.
  7. Tsai YY, Tsai DS, Liu CL. "Reversible data hiding scheme based on neighboring pixel differences". Digital Signal Processing. Vol 23 No 3, May 2013, PP.919-927.
  8. Peng F, Li X, Yang B. "Improved PVO-based reversible data hiding". Digital Signal Processing. Vol 25, Feb 2014, PP.255-265.
  9. Jung KH, Yoo KY. "Data hiding method using image interpolation". Computer Standards & Interfaces. Vol 31 No 2, Feb 2009, PP.465-470.
  10. Avci E, Tuncer T, Avci D. "A Novel Reversible Data Hiding Algorithm Based on Probabilistic XOR Secret Sharing in Wavelet Transform Domain". Arabian Journal for Science and Engineering. Vol 41 No 8, Aug 2016, PP.3153-3161.
  11. Q. Wang, W. Zeng, and J. Tian, “A compressive sensing based secure watermark detection and privacy preserving storage framework,” IEEE Transactions on Image Processing, vol. 23, no. 3, pp. 1317–1328, 2014.
  12. B. Zhao, W. D. Kou, H. Li, L. Dang, and J. Zhang, “Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol,” Information Sciences, vol. 180, no. 23, pp. 4672–4684, 2010.
  13. A. V. Subramanyam, S. Emmanuel, and M. S. Kankanhalli, “Robust watermarking of compressed and encrypted JPEG2000 images,” IEEE Transactions on Multimedia, vol. 14, no. 3, pp. 703–716, 2012.
  14. T. Bianchi and A. Piva, “Secure watermarking for multimedia content protection: a review of its benefits and open issues,” IEEE Signal ProcessingMagazine, vol. 30, no. 2, pp. 87–96, 2013.
  15. J. Guo, P. Zheng, and J. Huang, “Secure watermarking scheme against watermark attacks in the encrypted domain,” Journal of Visual Communication and Image Representation, vol. 30, pp. 125–135, 2015.
  16. H. Liu, D. Xiao, R. Zhang, Y. Zhang, and S. Bai, “Robust and hierarchical watermarking of encrypted images based on Compressive Sensing,” Signal Processing: Image Communication, vol. 45, pp. 41–51, 2016.
  17. D. Xu, R. Wang, and Y. Q. Shi, “Data hiding in encrypted H.264/AVC video streams by codeword substitution,” IEEE Transactions on Information Forensics and Security, vol. 9, no. 4, pp. 596–606, 2014.
Index Terms

Computer Science
Information Sciences

Keywords

Reversible Data Image Reconstruction Secure Image PSNR SSIM