Open Access   Article Go Back

Distinct Revocable Data Hiding In Ciphered Image

Anamika Patil1 , Pooja Bafna2 , Mona Pounikar3 , Pranjal Badgujar4

Section:Research Paper, Product Type: Journal Paper
Volume-2 , Issue-11 , Page no. 90-94, Nov-2014

Online published on Nov 30, 2014

Copyright © Anamika Patil, Pooja Bafna, Mona Pounikar , Pranjal Badgujar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Anamika Patil, Pooja Bafna, Mona Pounikar , Pranjal Badgujar, “Distinct Revocable Data Hiding In Ciphered Image,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.11, pp.90-94, 2014.

MLA Style Citation: Anamika Patil, Pooja Bafna, Mona Pounikar , Pranjal Badgujar "Distinct Revocable Data Hiding In Ciphered Image." International Journal of Computer Sciences and Engineering 2.11 (2014): 90-94.

APA Style Citation: Anamika Patil, Pooja Bafna, Mona Pounikar , Pranjal Badgujar, (2014). Distinct Revocable Data Hiding In Ciphered Image. International Journal of Computer Sciences and Engineering, 2(11), 90-94.

BibTex Style Citation:
@article{Patil_2014,
author = {Anamika Patil, Pooja Bafna, Mona Pounikar , Pranjal Badgujar},
title = {Distinct Revocable Data Hiding In Ciphered Image},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2014},
volume = {2},
Issue = {11},
month = {11},
year = {2014},
issn = {2347-2693},
pages = {90-94},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=310},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=310
TI - Distinct Revocable Data Hiding In Ciphered Image
T2 - International Journal of Computer Sciences and Engineering
AU - Anamika Patil, Pooja Bafna, Mona Pounikar , Pranjal Badgujar
PY - 2014
DA - 2014/11/30
PB - IJCSE, Indore, INDIA
SP - 90-94
IS - 11
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
3745 3375 downloads 3546 downloads
  
  
           

Abstract

The rapid development of data transmission through internet made it easy to send the data at faster rate to the destination. This work proposes a scheme for distinct revocable data hiding in ciphered images. At first, a content owner encrypts the original image with help of the encryption key. Then, the LSB of the encrypted image are compressed using a data-hiding key by the data hider to create a space to include some data. If a receiver has the data-hiding key, the additional data can be retrieved easily. And if the receiver has the encryption key, he can easily decrypt the received data to get the image similar to the original one, but cannot obtain the data. In case if the receiver has both the data-hiding key as well as the encryption key, he can obtain the data and regain the original image content. Hence, in order to transfer the data securely to the destination without any modifications, there are many techniques like cryptography and about the various steganographic algorithms like Least Significant Bit (LSB) algorithm.

Key-Words / Index Term

Data hiding; Crptography; Steganography

References

[1] Study On Separable Reversible Data Hiding In Encrypted Image, International Journal Of Advancements In Research & Technology, Volume 2, Issue 12, December-2013 223 ISSN 2278-7763.
[2] Xinpeng Zhang, Separable Reversible Data Hiding In Encrypted Image, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 2, APRIL 2012.
[3] Kede Ma, Weiming Zhang, Xianfeng Zhao, Member, IEEE, Nenghai Yu, And Fenghua Li, Reversible Data Hiding In Encrypted Images By Reserving Room Before Encryption, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 3, MARCH 2013.
[4] Lalit Dhande, Priya Khune, Vinod Deore, Dnyaneshwar Gawade, Hide Inside-Separable Reversible Data Hiding In Encrypted Image, International Journal Of Innovative Technology And Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-3, Issue-9, February 2014.
[5] Jun Tian, Reversible Data Embedding Using A Difference Expansion, IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 13, NO. 8, AUGUST.
[6] M. Johnson, P. Ishwar, V. M. Prabhakaran, D. Schonberg, And K.Ramchandran, On Compressing Encrypted Data,” IEEE Trans. Signal Process, Vol. 52, No. 10, Pp. 2992–3006, Oct. 2004.
[7] C.-C. Chang, C.-C. Lin, And Y.-H. Chen, Reversible Data-Embedding Scheme Using Differences Between Original And Predicted Pixel Values, IET Inform. Security, Vol. 2, No. 2, Pp. 35–46, 2008.
[8] Kede Ma, Weiming Zhang, Reversible Data Hiding In Encrypted Images By Reserving Room Before Encryption, IEEE Trans. VOL. 8, No. 3, Mar 2013.