Reversible Data Hiding In Encrypted Images Using Improved Encryption Technique

Authors

  • Chelliah B Assistant Professor, SRM University, Chennai
  • Jagadeesan J Head of the Department, SRM University, Chennai
  • Mathur S Research Scholar, SRM University, Chennai
  • Dutta S Research Scholar, SRM University, Chennai

Keywords:

Image Encryption, Image encryption key, Stream Cipher, RC4 algorithm, Data Encryption Key, Self Embedding, Data Hiding Key, Image Decryption, Data Decryption

Abstract

Recently more and more attention is paid to reversible data hiding (RDH) in encrypted images, since it maintains the excellent property that the original cover can be loss lessly recovered after embedded data is extracted while protecting the image content‟s confidentiality. All previous methods embed data by reversibly vacating room from the encrypted images, which may be some errors on data extraction and/or image restoration. In this paper we propose a different scheme which attains real reversibility by reserving room before encryption with a traditional RDH algorithm, and then encrypting the data and embedding the data in the encrypted image, which is encrypted using a new proposed algorithm. The proposed method can achieve real reversibility that is data extraction and image recoveries are free of any error.

References

Kede Ma, Weiming Zhang, Xianfeng Zhao, Nenghai Yu, and Fenghua Li ,” Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption” IEEE Transaction on Information Forensics And Security , Vol. 8, NO. 3, March 2013.

Parag Kadam, Akash Kandhare, Mangesh Nawale and Mukesh Patil,”Separable Reversible Encrypted Data Hiding in Encrypted Image Using AES algorithm and Lossy Technique” Proceedings of the 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME) February 21-22.

Rintu Jose and Gincy Abraham, “A Separable Reversible Data Hiding in Encrypted Image with Improved Performance” International

Conference on Microelectronics, Communication and Renewable Energy (ICMiCR-2013).

Masaaki FUJIYOSHI “Separable Reversible Data Hiding in Encrypted Image with Histogram Permutation” Department of Information and Communication Systems, Tokyo Metropolitan University 6–6 Asahigaoka, Hino-shi, Tokyo 191–0065, Japan.

Xinpeng Zhang “Reversible Data Hiding in Encrypted Image” IEEE Signal Processing Letters , Vol. 18, NO. 4, April 2011

Xinpeng Zhang “Separable Reversible Data Hiding in Encrypted Image” IEEE Transaction on Information Forensics And Security, VOL. 7, NO. 2, APRIL 2012

S. Imaculate Rosaline and C. Rengarajaswamy ” Reversible Data Hiding Technique for Stream Ciphered and Wavelet Compressed Image”Proceedings of the International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME) February 21-22, 2013

X. L. Li, B. Yang, and T. Y. Zeng, “Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection,”

IEEE Trans. Image Process., vol. 20, no. 12, pp. 3524–3533, Dec. 2011.

P. Tsai, Y. C. Hu, and H. L. Yeh, “Reversible image hiding scheme using predictive coding and histogram shifting,” Signal Process., vol.

, pp. 1129–1143, 2009.

L. Luo et al., “Reversible imagewatermarking using interpolation technique,” IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 187–

, Mar. 2010

V. Sachnev, H. J. Kim, J. Nam, S. Suresh, and Y.-Q. Shi, “Reversible watermarking algorithm using sorting and prediction,” IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 7, pp. 989–999, Jul. 2009.

A. J. Menezes, P. C. van Oorschot, and S. A Vanstone, Handbook of Applied Cryptography. Boca Raton, FL, USA: CRC, 1996.

K. Hwang and D. Li, “Trusted cloud computing with secure resources and data coloring,” IEEE Internet Comput., vol. 14, no. 5, pp. 14–22, Sep./Oct. 2010.

M. Johnson, P. Ishwar, V. M. Prabhakaran, D. Schonberg, and K.Ramchandran, “On compressing encrypted data,” IEEE Trans. Signal Process., vol. 52, no. 10, pp. 2992–3006, Oct. 2004.

W. Liu, W. Zeng, L. Dong, and Q. Yao,“Efficient compression of encrypted grayscale images,” IEEE Trans. Image Process., vol. 19,

no. 4,pp. 1097–1102, Apr. 2010.

X. Zhang, “Reversible data hiding in encrypted images,” IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255–258, Apr. 2011.

W. Hong, T. Chen, and H.Wu, “An improved reversible data hiding in encrypted images using side match,” IEEE Signal Process. Lett.,

vol.19, no. 4, pp. 199–202, Apr. 2012.

X. Zhang, “Separable reversible data hiding in encrypted image,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 826–832, Apr. 2012.

Downloads

Published

2024-02-26

How to Cite

Chelliah, B. J., Jagadeesan, J., Mathur, S., & Dutta, S. (2024). Reversible Data Hiding In Encrypted Images Using Improved Encryption Technique. COMPUSOFT: An International Journal of Advanced Computer Technology, 3(03), 638–645. Retrieved from https://ijact.in/index.php/j/article/view/115

Issue

Section

Original Research Article

Similar Articles

<< < 4 5 6 7 8 9 10 11 12 13 > >> 

You may also start an advanced similarity search for this article.