Reversible Data Hiding In Encrypted Images Using Improved Encryption Technique
Keywords:
Image Encryption, Image encryption key, Stream Cipher, RC4 algorithm, Data Encryption Key, Self Embedding, Data Hiding Key, Image Decryption, Data DecryptionAbstract
Recently more and more attention is paid to reversible data hiding (RDH) in encrypted images, since it maintains the excellent property that the original cover can be loss lessly recovered after embedded data is extracted while protecting the image content‟s confidentiality. All previous methods embed data by reversibly vacating room from the encrypted images, which may be some errors on data extraction and/or image restoration. In this paper we propose a different scheme which attains real reversibility by reserving room before encryption with a traditional RDH algorithm, and then encrypting the data and embedding the data in the encrypted image, which is encrypted using a new proposed algorithm. The proposed method can achieve real reversibility that is data extraction and image recoveries are free of any error.
References
Kede Ma, Weiming Zhang, Xianfeng Zhao, Nenghai Yu, and Fenghua Li ,” Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption” IEEE Transaction on Information Forensics And Security , Vol. 8, NO. 3, March 2013.
Parag Kadam, Akash Kandhare, Mangesh Nawale and Mukesh Patil,”Separable Reversible Encrypted Data Hiding in Encrypted Image Using AES algorithm and Lossy Technique” Proceedings of the 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME) February 21-22.
Rintu Jose and Gincy Abraham, “A Separable Reversible Data Hiding in Encrypted Image with Improved Performance” International
Conference on Microelectronics, Communication and Renewable Energy (ICMiCR-2013).
Masaaki FUJIYOSHI “Separable Reversible Data Hiding in Encrypted Image with Histogram Permutation” Department of Information and Communication Systems, Tokyo Metropolitan University 6–6 Asahigaoka, Hino-shi, Tokyo 191–0065, Japan.
Xinpeng Zhang “Reversible Data Hiding in Encrypted Image” IEEE Signal Processing Letters , Vol. 18, NO. 4, April 2011
Xinpeng Zhang “Separable Reversible Data Hiding in Encrypted Image” IEEE Transaction on Information Forensics And Security, VOL. 7, NO. 2, APRIL 2012
S. Imaculate Rosaline and C. Rengarajaswamy ” Reversible Data Hiding Technique for Stream Ciphered and Wavelet Compressed Image”Proceedings of the International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME) February 21-22, 2013
X. L. Li, B. Yang, and T. Y. Zeng, “Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection,”
IEEE Trans. Image Process., vol. 20, no. 12, pp. 3524–3533, Dec. 2011.
P. Tsai, Y. C. Hu, and H. L. Yeh, “Reversible image hiding scheme using predictive coding and histogram shifting,” Signal Process., vol.
, pp. 1129–1143, 2009.
L. Luo et al., “Reversible imagewatermarking using interpolation technique,” IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 187–
, Mar. 2010
V. Sachnev, H. J. Kim, J. Nam, S. Suresh, and Y.-Q. Shi, “Reversible watermarking algorithm using sorting and prediction,” IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 7, pp. 989–999, Jul. 2009.
A. J. Menezes, P. C. van Oorschot, and S. A Vanstone, Handbook of Applied Cryptography. Boca Raton, FL, USA: CRC, 1996.
K. Hwang and D. Li, “Trusted cloud computing with secure resources and data coloring,” IEEE Internet Comput., vol. 14, no. 5, pp. 14–22, Sep./Oct. 2010.
M. Johnson, P. Ishwar, V. M. Prabhakaran, D. Schonberg, and K.Ramchandran, “On compressing encrypted data,” IEEE Trans. Signal Process., vol. 52, no. 10, pp. 2992–3006, Oct. 2004.
W. Liu, W. Zeng, L. Dong, and Q. Yao,“Efficient compression of encrypted grayscale images,” IEEE Trans. Image Process., vol. 19,
no. 4,pp. 1097–1102, Apr. 2010.
X. Zhang, “Reversible data hiding in encrypted images,” IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255–258, Apr. 2011.
W. Hong, T. Chen, and H.Wu, “An improved reversible data hiding in encrypted images using side match,” IEEE Signal Process. Lett.,
vol.19, no. 4, pp. 199–202, Apr. 2012.
X. Zhang, “Separable reversible data hiding in encrypted image,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 826–832, Apr. 2012.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2014 COMPUSOFT: An International Journal of Advanced Computer Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.
©2023. COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY by COMPUSOFT PUBLICATION is licensed under a Creative Commons Attribution 4.0 International License. Based on a work at COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY. Permissions beyond the scope of this license may be available at Creative Commons Attribution 4.0 International Public License.