Open Access   Article Go Back

Reversible Data Hiding using RIT, AES and UES Frame Work

Akanksha Bansal1 , Manoj Ramiya2 , Nirupma Tiwari3

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-10 , Page no. 211-215, Oct-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i10.211215

Online published on Oct 31, 2018

Copyright © Akanksha Bansal, Manoj Ramiya, Nirupma Tiwari . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Akanksha Bansal, Manoj Ramiya, Nirupma Tiwari, “Reversible Data Hiding using RIT, AES and UES Frame Work,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.211-215, 2018.

MLA Style Citation: Akanksha Bansal, Manoj Ramiya, Nirupma Tiwari "Reversible Data Hiding using RIT, AES and UES Frame Work." International Journal of Computer Sciences and Engineering 6.10 (2018): 211-215.

APA Style Citation: Akanksha Bansal, Manoj Ramiya, Nirupma Tiwari, (2018). Reversible Data Hiding using RIT, AES and UES Frame Work. International Journal of Computer Sciences and Engineering, 6(10), 211-215.

BibTex Style Citation:
@article{Bansal_2018,
author = {Akanksha Bansal, Manoj Ramiya, Nirupma Tiwari},
title = {Reversible Data Hiding using RIT, AES and UES Frame Work},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2018},
volume = {6},
Issue = {10},
month = {10},
year = {2018},
issn = {2347-2693},
pages = {211-215},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3007},
doi = {https://doi.org/10.26438/ijcse/v6i10.211215}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i10.211215}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3007
TI - Reversible Data Hiding using RIT, AES and UES Frame Work
T2 - International Journal of Computer Sciences and Engineering
AU - Akanksha Bansal, Manoj Ramiya, Nirupma Tiwari
PY - 2018
DA - 2018/10/31
PB - IJCSE, Indore, INDIA
SP - 211-215
IS - 10
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
358 250 downloads 231 downloads
  
  
           

Abstract

Image Steganography is an emerging field in computer science. There is a need of secured data transmission system to protect the data and maintain the privacy. This work is based on multilevel security method. The reversible data hiding has been implemented using a robust method. The secret image is encrypted using Reversible Image transformation, followed by AES (Advanced Encryption Standard) algorithm and finally the UES( Unified Encryption and Scrambling) is applied for data embedding into the carrier image. The secret key is also added to the encrypted image and it further makes the frame work more robust. The frame work is simulated using MATLAB and the statistical results like PSNR, MSQE and SSIM confirm the proposition.

Key-Words / Index Term

AES, UES, public channel, , image encryption, reversible image transformation, privacy protection, imperceptible , secret key, stego, public channel, scrambling, PSNR, MSQE, SSIM

References

[1] K. Hwang, D. Li, “Trusted cloud computing with secure resources and data coloring,” IEEE Internet Computing, vol. 14, no. 5, pp. 14-22, Sept.-Oct. 2010.
[2] F. Bao, R. H. Deng, B. C. Ooi, et al., “Tailored reversible watermarking schemes for authentication of electronic clinical atlas,” IEEE Trans. on Information Technology in Biomedicine, vol. 9, no. 4, pp. 554-563, Dec. 2005.
[3] F. Willems, D. Maas, and T. Kalker, “Semantic lossless source coding,” 42nd Annual Allerton Conference on Communication, Control and Computing, Monticello, Illinois, USA, pp. 1411-1418, 2004.
[4] W. Zhang, X. Hu, N. Yu, et al. “Recursive histogram modification: establishing equivalency between reversible data hiding and lossless data compression,” IEEE Trans. on Image Processing, vol. 22, no. 7, pp. 2775-2785, Jul. 2013.
[5] V. Sachnev, H. J. Kim, J. Nam, S. Suresh, and Y. Q. Shi, “Reversible watermarking algorithm using sorting and prediction,” IEEE Trans. on Circuits and Systems for Video Technology, vol.19, no.7, pp. 989-999, Jul. 2009.
[6] B.ou, X. Li, Y. Zhao, R. Ni, Y. Shi, “Pairwise prediction-error expansion for efficient reversible data hiding,” IEEE Trans. on Image Processing, vol. 22, no.12, pp. 5010-5021, Dec. 2013.
[7] Ioan-CatalinDragoi, DinuColtuc, “Local-prediction-based difference expansion reversible watermarking,” IEEE Trans. on Image Processing, vol. 23, no. 4, pp. 1779-1790, Apr. 2014.
[8] Z. Ni, Y. Shi, N. Ansari, and S. Wei, “Reversible data hiding,” IEEE Trans. on Circuits and Systems for Video Technology, vol. 16, no. 3, pp. 354-362, Mar. 2006.
[9] J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. on Circuits and Systems for Video Technology, vol. 13, no.8, pp. 890-896, Aug. 2003.
[10] X. Hu, W. Zhang, X. Li, N. Yu, “Minimum rate prediction and optimized histograms modification for reversible data hiding,” IEEE Trans. on Information Forensics and Security, vol. 10, no. 3, 653-664, Mar. 2015.
[11] X. Cao, L. Du, X. Wei, et al., “High capacity reversible data hiding in encrypted images by patch-level sparse representation,” IEEE Trans. on Cybernetics, vol. 46, no. 5, pp. 1132-1143, May. 2016.
[12] S. Yu, C. Wang and K. Ren, “Achieving secure, scalable, and finegrained data access control in cloud computing,” IEEE Proceeding of INFOCOM 2010, pp. 1-9, Mar. 2010.
[13] I. Lai and Wen. Tsai,“Secret-fragment-visible mosaic image-a new computer art and its application to information hiding,” IEEE Trans. on Information Forensics and Security, vol. 6, no. 3, pp. 936-945, Sept. 2011.
[14] Y. Lee and W. Tsai,“A new secure image transmission technique via secret-fragment-visible mosaic images by nearly reversible color transformation,” IEEE Trans. on Circuits and Systems for Video Technology, vol. 24, no. 4, pp. 695-703, Apr. 2014.
[15] BossBase image database, [Online]. Available: http://agents.fel.cvut.cz/stegodata/RAWS