CFP last date
20 December 2024
Reseach Article

An Approach Towards Separable Lossy Data Hiding

Published on December 2014 by Vinit Agham, Tareekpattewar
National Conference on Emerging Trends in Computer Technology
Foundation of Computer Science USA
NCETCT - Number 2
December 2014
Authors: Vinit Agham, Tareekpattewar
bb8d6738-7732-4c76-a80f-a0de88ed5459

Vinit Agham, Tareekpattewar . An Approach Towards Separable Lossy Data Hiding. National Conference on Emerging Trends in Computer Technology. NCETCT, 2 (December 2014), 8-11.

@article{
author = { Vinit Agham, Tareekpattewar },
title = { An Approach Towards Separable Lossy Data Hiding },
journal = { National Conference on Emerging Trends in Computer Technology },
issue_date = { December 2014 },
volume = { NCETCT },
number = { 2 },
month = { December },
year = { 2014 },
issn = 0975-8887,
pages = { 8-11 },
numpages = 4,
url = { /proceedings/ncetct/number2/19086-4020/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Emerging Trends in Computer Technology
%A Vinit Agham
%A Tareekpattewar
%T An Approach Towards Separable Lossy Data Hiding
%J National Conference on Emerging Trends in Computer Technology
%@ 0975-8887
%V NCETCT
%N 2
%P 8-11
%D 2014
%I International Journal of Computer Applications
Abstract

Communication over the internet is facing some problems such as data security, copyright control, authentication etc. Here we introduce a novel scheme for separable data hiding when lossy image used as a cover media. This paper illustrates the various objectives of implementing separable lossy data hiding technique. The system is consists of three steps in the first step encryption of the cover image using an encryption key. Then, a data-hider hides the message image (secure data) into encrypted cover image using a data-hiding key. The third step is to extract the message image and recover the original image. The actions i. e. extracting the message image and recover the original images are depends upon which key the receiver has. There is separation of these two actions according to availability of keys. The scheme's key feature is the way of getting lossy image after decryption and data extraction processes. Here we are concentrating on using RGB-LSB method for data embedding and finally verifies the performance of using RGB-LSB method in terms of data capacity as well as image quality.

References
  1. Ni Z. , Shi Y-Q, Ansari N. and Su W. , 2006 . Reversible data hiding. IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, no. 3, pp. 354-362.
  2. Johnson M. , Ishwar P. , Prabhakaran V. M. , Schonberg D. , and Ramchandran K. , 2004. On compressing encrypted data. IEEE Transactions on Signal Processing, vol. 52, no. 10, pp. 2992-3006.
  3. Zhang X. , 2011. Lossy compression and iterative reconstruction for encrypted image. IEEE Transactions on Information and Forensics Security, vol. 6, no. 1, pp. 53-58.
  4. Celik M. U. , Sharma G. , Tekalp A. M. and Saber E. , 2005. Lossless generalized-LSB data embedding. IEEE Transactions on Image Processing, vol. 14, no. 2, pp. 253-266.
  5. Kundur D. and Karthik K. , 2004. Video fingerprinting and encryption principles for digital rights management. Proceedings IEEE, vol. 92, no. 6, pp. 918-932.
  6. Tian J. , 2003. Reversible data embedding using a difference expansion. IEEE Transactions on Circuits and Systems for Video Technology,vol. 13, no. 8. pp. 890-896.
  7. Das J. V. and Ganesh K. , 2012. Data Hiding Using a Novel Reversible Method forEncrypted Image. International Journal of Advanced Research in Technology, vol. 2, Issue 5.
  8. Zhang X. , 2012. Separable Reversible Data Hiding in Encrypted Image. IEEE transactions on information forensics and security, vol. 7, no. 2, pp. 826-832.
  9. Gangwar A. and Shrivastava V. , 2013. Improved RGB -LSB Steganography Using Secret Key. International Journal of Computer Trends and Technology, vol. 4, Issue 2, pp. 85-89.
  10. Shi Y. Q. , 2005. Reversible data hiding. Springer-Verlag Berlin Heidelberg, pp. 1-12.
  11. Yadav D. , Singhal V. and Bandil D. , 2012. Reversible data hiding techniques. International Journal of Electronics and Computer Science Engineering, vol. 1, no. 2, pp. 380-383.
  12. Zhaoa Z. , Luoc H, Lu Z. -M. andPan J. -S. , 2011. Reversible data hiding based on multilevel histogram modification and sequential recovery. International Journal of Electronics and Communications, pp. 814-826.
Index Terms

Computer Science
Information Sciences

Keywords

Image Encryption Rgb-lsb Image Recovery Reversible Data Hiding Lossy Image Encryption Key Data-hiding Key