Open Access   Article Go Back

Extracting Hidden Data from Encrypted Images Using IWT

Nitin Shelake1 , S. R. Durugkar2

Section:Survey Paper, Product Type: Journal Paper
Volume-3 , Issue-5 , Page no. 219-222, May-2015

Online published on May 30, 2015

Copyright © Nitin Shelake , S. R. Durugkar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Nitin Shelake , S. R. Durugkar , “Extracting Hidden Data from Encrypted Images Using IWT,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.219-222, 2015.

MLA Style Citation: Nitin Shelake , S. R. Durugkar "Extracting Hidden Data from Encrypted Images Using IWT." International Journal of Computer Sciences and Engineering 3.5 (2015): 219-222.

APA Style Citation: Nitin Shelake , S. R. Durugkar , (2015). Extracting Hidden Data from Encrypted Images Using IWT. International Journal of Computer Sciences and Engineering, 3(5), 219-222.

BibTex Style Citation:
@article{Shelake_2015,
author = {Nitin Shelake , S. R. Durugkar },
title = {Extracting Hidden Data from Encrypted Images Using IWT},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2015},
volume = {3},
Issue = {5},
month = {5},
year = {2015},
issn = {2347-2693},
pages = {219-222},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=507},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=507
TI - Extracting Hidden Data from Encrypted Images Using IWT
T2 - International Journal of Computer Sciences and Engineering
AU - Nitin Shelake , S. R. Durugkar
PY - 2015
DA - 2015/05/30
PB - IJCSE, Indore, INDIA
SP - 219-222
IS - 5
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2328 2278 downloads 2481 downloads
  
  
           

Abstract

Reversible data hiding technique in which the hidden data property is maintained even after processing on the image. The original cover image remains same after processing on the embedded image, original data is obtained. The image is used to embed additional information in the encrypted images, applies in many fields of security which can be recoverable with original media and the hided data without loss. Some previous methods embed data reversible vacating room from the encrypted images, which matter to error on data extraction and/or image restoration. This system proposes a reversible data hiding technique which work is separable; the receiver can extract embedded data. If a system for lossless compression of images applies a recover step, this step must map integer input values to integer output values. This can be achieved using the integer wavelet transform. This proposed system can achieve the excellent reversibility, that is, data extraction and same image quality. This system is better to handle secret communication in open environment like internet

Key-Words / Index Term

Reversible Data Hiding, Image Encryption, Data Protection, Integer wavelength Transform

References

[1] Kede Ma, Weiming Zhang, “Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption” IEEE Transactions On Information Forensics And Security, Vol. 8, No. 3, March 2013
[2] Zhicheng Ni, Yun-Qing Shi, “Reversible Data Hiding” IEEE Transactions On Circuits And Systems For Video Technology, March 2006.
[3] J. Fridrich and M. Goljan, “Lossless dataembedding for all image formats,”in Proc. SPIE Proc. Photonics West, Electronic Imaging, Security and Watermarking of Multimedia Contents, San Jose, CA, USA,Jan. 2002,
[4] Mohammad Ali Alavianmehr, Mehdi Rezaei Mohammad Sadesgh Helfroush, “A Semi-Fragile Lossless Data Hiding Scheme Based on Multi-level Histogram Shift in Image Integer Wavelet Transform Domain.
[5]P. Tsai, Y. C. Hu, and H. L. Yeh, “Reversible image hiding scheme Using predictive coding and histogram shifting,” Signal Process. Vol. 89, 2009.
[6] X. Zhang, “Reversible data hiding in encrypted images,” IEEE Signal Process. Let’s., vol. 18, no. 4, Apr. 2011.
[7] J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896, Aug. 2003.
[8] W. Hong, T. Chen, and H.Wu, “An improved reversible data hiding in Encrypted images using side match,” IEEE Signal Process. Lett., vol. 19, no. 4, pp. 199–202, Apr. 2012.
[9] X. Zhang, “Separable reversible data hiding in encrypted image,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 826–832, Apr. 2012.
[10] W. Du and M. J. Attalla, “Privacy-preserving cooperative scientific computations,” in Proc. 14th IEEE Computer Security Foundations Workshop, Nova Scotia, Canada, Jun. 11–13, 2001, pp. 273–282.
[11] J. Tian, “Wavelet-based reversible watermarking for authentication,” in Security and Watermarking of Multimedia Contents IV—Proc. SPIE, E. J. Delp III and P. W. Wong, Eds., Jan. 2002, vol. 4675, pp. 679– 690.
[12] M. Fujiyoshi and H. Kiya, “Reversible Information hiding and its Application to image authentication,” in Multimedia Information Hiding Technologies and Methodologies for Controlling Data, K. Kondo, Ed.IGI Global, Oct. 2012, pp.238–257.
[13] Xuan, G., Zhu, J., Chen, J., Shi, Y. Q., Ni, Z., Su, W.: Distortion less Data Hiding Based on Integer Wavelet Transform. In: IEE Electronics Letters, December (2002) 1646-1648.
[14] Calderbank, A. R., Daubechies, I., and Sweldens, W., Yeo, B.-L.: Wavelet Transforms that Map Integers to Integers. In: Applied and Computational Harmonic Analysis, July (1998) 332–369.
[15] W. Bender, D. Gruhl, N. Morioto and A. Lu, “Techniques for data hiding,” International Business Machines Corporation System Journal, vol.35, pp. 13-336, 1996.