Reversible Data Hiding using RIT, AES and UES Frame Work
Akanksha Bansal1 , Manoj Ramiya2 , Nirupma Tiwari3
Section:Research Paper, Product Type: Journal Paper
Volume-6 ,
Issue-10 , Page no. 211-215, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.211215
Online published on Oct 31, 2018
Copyright © Akanksha Bansal, Manoj Ramiya, Nirupma Tiwari . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Akanksha Bansal, Manoj Ramiya, Nirupma Tiwari, “Reversible Data Hiding using RIT, AES and UES Frame Work,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.211-215, 2018.
MLA Style Citation: Akanksha Bansal, Manoj Ramiya, Nirupma Tiwari "Reversible Data Hiding using RIT, AES and UES Frame Work." International Journal of Computer Sciences and Engineering 6.10 (2018): 211-215.
APA Style Citation: Akanksha Bansal, Manoj Ramiya, Nirupma Tiwari, (2018). Reversible Data Hiding using RIT, AES and UES Frame Work. International Journal of Computer Sciences and Engineering, 6(10), 211-215.
BibTex Style Citation:
@article{Bansal_2018,
author = {Akanksha Bansal, Manoj Ramiya, Nirupma Tiwari},
title = {Reversible Data Hiding using RIT, AES and UES Frame Work},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2018},
volume = {6},
Issue = {10},
month = {10},
year = {2018},
issn = {2347-2693},
pages = {211-215},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3007},
doi = {https://doi.org/10.26438/ijcse/v6i10.211215}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i10.211215}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3007
TI - Reversible Data Hiding using RIT, AES and UES Frame Work
T2 - International Journal of Computer Sciences and Engineering
AU - Akanksha Bansal, Manoj Ramiya, Nirupma Tiwari
PY - 2018
DA - 2018/10/31
PB - IJCSE, Indore, INDIA
SP - 211-215
IS - 10
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
385 | 266 downloads | 250 downloads |
Abstract
Image Steganography is an emerging field in computer science. There is a need of secured data transmission system to protect the data and maintain the privacy. This work is based on multilevel security method. The reversible data hiding has been implemented using a robust method. The secret image is encrypted using Reversible Image transformation, followed by AES (Advanced Encryption Standard) algorithm and finally the UES( Unified Encryption and Scrambling) is applied for data embedding into the carrier image. The secret key is also added to the encrypted image and it further makes the frame work more robust. The frame work is simulated using MATLAB and the statistical results like PSNR, MSQE and SSIM confirm the proposition.
Key-Words / Index Term
AES, UES, public channel, , image encryption, reversible image transformation, privacy protection, imperceptible , secret key, stego, public channel, scrambling, PSNR, MSQE, SSIM
References
[1] K. Hwang, D. Li, “Trusted cloud computing with secure resources and data coloring,” IEEE Internet Computing, vol. 14, no. 5, pp. 14-22, Sept.-Oct. 2010.
[2] F. Bao, R. H. Deng, B. C. Ooi, et al., “Tailored reversible watermarking schemes for authentication of electronic clinical atlas,” IEEE Trans. on Information Technology in Biomedicine, vol. 9, no. 4, pp. 554-563, Dec. 2005.
[3] F. Willems, D. Maas, and T. Kalker, “Semantic lossless source coding,” 42nd Annual Allerton Conference on Communication, Control and Computing, Monticello, Illinois, USA, pp. 1411-1418, 2004.
[4] W. Zhang, X. Hu, N. Yu, et al. “Recursive histogram modification: establishing equivalency between reversible data hiding and lossless data compression,” IEEE Trans. on Image Processing, vol. 22, no. 7, pp. 2775-2785, Jul. 2013.
[5] V. Sachnev, H. J. Kim, J. Nam, S. Suresh, and Y. Q. Shi, “Reversible watermarking algorithm using sorting and prediction,” IEEE Trans. on Circuits and Systems for Video Technology, vol.19, no.7, pp. 989-999, Jul. 2009.
[6] B.ou, X. Li, Y. Zhao, R. Ni, Y. Shi, “Pairwise prediction-error expansion for efficient reversible data hiding,” IEEE Trans. on Image Processing, vol. 22, no.12, pp. 5010-5021, Dec. 2013.
[7] Ioan-CatalinDragoi, DinuColtuc, “Local-prediction-based difference expansion reversible watermarking,” IEEE Trans. on Image Processing, vol. 23, no. 4, pp. 1779-1790, Apr. 2014.
[8] Z. Ni, Y. Shi, N. Ansari, and S. Wei, “Reversible data hiding,” IEEE Trans. on Circuits and Systems for Video Technology, vol. 16, no. 3, pp. 354-362, Mar. 2006.
[9] J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. on Circuits and Systems for Video Technology, vol. 13, no.8, pp. 890-896, Aug. 2003.
[10] X. Hu, W. Zhang, X. Li, N. Yu, “Minimum rate prediction and optimized histograms modification for reversible data hiding,” IEEE Trans. on Information Forensics and Security, vol. 10, no. 3, 653-664, Mar. 2015.
[11] X. Cao, L. Du, X. Wei, et al., “High capacity reversible data hiding in encrypted images by patch-level sparse representation,” IEEE Trans. on Cybernetics, vol. 46, no. 5, pp. 1132-1143, May. 2016.
[12] S. Yu, C. Wang and K. Ren, “Achieving secure, scalable, and finegrained data access control in cloud computing,” IEEE Proceeding of INFOCOM 2010, pp. 1-9, Mar. 2010.
[13] I. Lai and Wen. Tsai,“Secret-fragment-visible mosaic image-a new computer art and its application to information hiding,” IEEE Trans. on Information Forensics and Security, vol. 6, no. 3, pp. 936-945, Sept. 2011.
[14] Y. Lee and W. Tsai,“A new secure image transmission technique via secret-fragment-visible mosaic images by nearly reversible color transformation,” IEEE Trans. on Circuits and Systems for Video Technology, vol. 24, no. 4, pp. 695-703, Apr. 2014.
[15] BossBase image database, [Online]. Available: http://agents.fel.cvut.cz/stegodata/RAWS