Separable Encrypted Data Embedding in Encrypted Image with Large Data Embedding Capacity

Authors

  • Sonawane S Department of Computer Engineering, KKWIEER, Nasik, University of Pune, Maharashtra, India
  • Shahane NM Associate Professor, Dept. of Computer Engineering, KKWIEER, Nasik, University of Pune, Maharashtra, India.

Keywords:

BPCS (Bit Plane Complexity Segmentation), Data Embedding, Hybrid cryptography, Image recovery

Abstract

This paper proposes a novel scheme of separable encrypted data embedding in encrypted image with large data embedding capacity. An image encrypts using cryptography algorithm and secret data encrypts using hybrid cryptography. Then, the encrypted secret data can be successfully embedded in the encrypted cover image using Modified BPCS steganography. An encrypted image containing encrypted data is sent. At the receiver side, with an encrypted image containing embedded encrypted data, if a receiver has the data hiding key and data encryption key then he is only able to extract the encrypted and encrypted data is decrypted by data encryption key. If the receiver has an image encryption key then he can decrypt the image and get an image similar to the original one. If the receiver has the image encryption key also data-hiding key then he is able to recover the original image but extract the encrypted data. If the receiver has the image encryption key, data hiding key, and data encryption key then he can recovered the image and extract the encrypted data after that encrypted data is decrypted to obtain a data similar to original data without any error. Separation activity is achieved according to available key/keys. A large data can embed data by using Modified BPCS steganography.

References

M. Johnson, P. Ishwar, V. M. Prabhakaran, D. Schonberg, and K. Ramchandran, “On compressing encrypted data,” IEEE Trans. Signal Process., vol. 52, no. 10, pp. 2992–3006, Oct. 2004.

W. Liu, W. Zeng, L. Dong, and Q. Yao, “Efficient compression of encrypted grayscale images,” IEEE Trans. Image Process., vol. 19, no. 4, pp. 1097–1102, Apr. 2010.

X. Zhang, “Lossy compression and iterative reconstruction for encrypted image,” IEEE Trans. Inform. Forensics Security, vol. 6, no. 1, pp. 53–58, Feb. 2011.

N. Memon and P. W. Wong, “A buyer-seller watermarking protocol,” IEEE Trans. Image Process, vol. 10, no. 4, pp. 643–649, Apr. 2001.

M. S. Sutaone, M.V. Khandare, “Image Based Steganography Using LSB Insertion Technique”, Wireless, Mobile and Multimedia Networks, IET International Conference, pp-146 – 151, Jan-2008.

J. Tian, “Reversible data embedding using a difference expansion,”IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896, Aug. 2003.

Gandharba Swain, Saroj Kumar Lenka, “A Hybrid Approach to Steganography Embedding at Darkest and Brightest Pixels”,Proceedings of the International Conference on Communication and Computational Intelligence – 2010, pp.529-534, Dec. 2010.

Han-ling Zhange, Guang-zhi GENG, Cai-qiongXiong, “Image Steganography using Pixel-Value Differencing”, Second International Symposium on Electronic Commerce and Security, pp-109 – 112, 2009.

X. Zhang, “Reversible data hiding in encrypted image,” IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255–258, Apr. 2011.

Xinpeng Zhang, “Separable Reversible Data Hiding in Encrypted Image,” IEEE Trans. on Inform. Forensics and Security, vol. 7, no. 2, Apr. 2012.

S. Bansod, V. Mane, L. Ragha, “Modified BPCS steganography using Hybrid Cryptography for Improving Data embedding Capacity, “International Conference on Communication, Information & Computing Technology (ICCICT) Mumbai, India, Oct. 19-20, 2012.

Z. Wang and A. C. Bovik, “A universal image quality index,” IEEE Signal Process. Lett., vol. 9, no. 1, pp. 81–84, Jan. 2002.

Nisha, S. Kumar, “Image Quality Assessment Techniques,”IJARCSSE, Vol. 3, Issue 7, Jul 2013.

Downloads

Published

2024-02-26

How to Cite

Sonawane, S. S., & Shahane, N. M. (2024). Separable Encrypted Data Embedding in Encrypted Image with Large Data Embedding Capacity. COMPUSOFT: An International Journal of Advanced Computer Technology, 3(06), 873–878. Retrieved from https://ijact.in/index.php/j/article/view/155

Issue

Section

Original Research Article

Similar Articles

<< < 26 27 28 29 30 31 32 33 34 35 > >> 

You may also start an advanced similarity search for this article.