Separable Encrypted Data Embedding in Encrypted Image with Large Data Embedding Capacity
Keywords:
BPCS (Bit Plane Complexity Segmentation), Data Embedding, Hybrid cryptography, Image recoveryAbstract
This paper proposes a novel scheme of separable encrypted data embedding in encrypted image with large data embedding capacity. An image encrypts using cryptography algorithm and secret data encrypts using hybrid cryptography. Then, the encrypted secret data can be successfully embedded in the encrypted cover image using Modified BPCS steganography. An encrypted image containing encrypted data is sent. At the receiver side, with an encrypted image containing embedded encrypted data, if a receiver has the data hiding key and data encryption key then he is only able to extract the encrypted and encrypted data is decrypted by data encryption key. If the receiver has an image encryption key then he can decrypt the image and get an image similar to the original one. If the receiver has the image encryption key also data-hiding key then he is able to recover the original image but extract the encrypted data. If the receiver has the image encryption key, data hiding key, and data encryption key then he can recovered the image and extract the encrypted data after that encrypted data is decrypted to obtain a data similar to original data without any error. Separation activity is achieved according to available key/keys. A large data can embed data by using Modified BPCS steganography.
References
M. Johnson, P. Ishwar, V. M. Prabhakaran, D. Schonberg, and K. Ramchandran, “On compressing encrypted data,” IEEE Trans. Signal Process., vol. 52, no. 10, pp. 2992–3006, Oct. 2004.
W. Liu, W. Zeng, L. Dong, and Q. Yao, “Efficient compression of encrypted grayscale images,” IEEE Trans. Image Process., vol. 19, no. 4, pp. 1097–1102, Apr. 2010.
X. Zhang, “Lossy compression and iterative reconstruction for encrypted image,” IEEE Trans. Inform. Forensics Security, vol. 6, no. 1, pp. 53–58, Feb. 2011.
N. Memon and P. W. Wong, “A buyer-seller watermarking protocol,” IEEE Trans. Image Process, vol. 10, no. 4, pp. 643–649, Apr. 2001.
M. S. Sutaone, M.V. Khandare, “Image Based Steganography Using LSB Insertion Technique”, Wireless, Mobile and Multimedia Networks, IET International Conference, pp-146 – 151, Jan-2008.
J. Tian, “Reversible data embedding using a difference expansion,”IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896, Aug. 2003.
Gandharba Swain, Saroj Kumar Lenka, “A Hybrid Approach to Steganography Embedding at Darkest and Brightest Pixels”,Proceedings of the International Conference on Communication and Computational Intelligence – 2010, pp.529-534, Dec. 2010.
Han-ling Zhange, Guang-zhi GENG, Cai-qiongXiong, “Image Steganography using Pixel-Value Differencing”, Second International Symposium on Electronic Commerce and Security, pp-109 – 112, 2009.
X. Zhang, “Reversible data hiding in encrypted image,” IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255–258, Apr. 2011.
Xinpeng Zhang, “Separable Reversible Data Hiding in Encrypted Image,” IEEE Trans. on Inform. Forensics and Security, vol. 7, no. 2, Apr. 2012.
S. Bansod, V. Mane, L. Ragha, “Modified BPCS steganography using Hybrid Cryptography for Improving Data embedding Capacity, “International Conference on Communication, Information & Computing Technology (ICCICT) Mumbai, India, Oct. 19-20, 2012.
Z. Wang and A. C. Bovik, “A universal image quality index,” IEEE Signal Process. Lett., vol. 9, no. 1, pp. 81–84, Jan. 2002.
Nisha, S. Kumar, “Image Quality Assessment Techniques,”IJARCSSE, Vol. 3, Issue 7, Jul 2013.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2014 COMPUSOFT: An International Journal of Advanced Computer Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.
©2023. COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY by COMPUSOFT PUBLICATION is licensed under a Creative Commons Attribution 4.0 International License. Based on a work at COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY. Permissions beyond the scope of this license may be available at Creative Commons Attribution 4.0 International Public License.