Open Access   Article Go Back

Separable Reversible Data Hiding using XOR and Permutation Encryption in Image

Reysh Chandrikapure1 , Pranjal Dhore2 , Nisha Balani3

Section:Survey Paper, Product Type: Journal Paper
Volume-07 , Issue-12 , Page no. 105-110, May-2019

Online published on May 12, 2019

Copyright © Reysh Chandrikapure, Pranjal Dhore, Nisha Balani . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Reysh Chandrikapure, Pranjal Dhore, Nisha Balani, “Separable Reversible Data Hiding using XOR and Permutation Encryption in Image,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.12, pp.105-110, 2019.

MLA Style Citation: Reysh Chandrikapure, Pranjal Dhore, Nisha Balani "Separable Reversible Data Hiding using XOR and Permutation Encryption in Image." International Journal of Computer Sciences and Engineering 07.12 (2019): 105-110.

APA Style Citation: Reysh Chandrikapure, Pranjal Dhore, Nisha Balani, (2019). Separable Reversible Data Hiding using XOR and Permutation Encryption in Image. International Journal of Computer Sciences and Engineering, 07(12), 105-110.

BibTex Style Citation:
@article{Chandrikapure_2019,
author = {Reysh Chandrikapure, Pranjal Dhore, Nisha Balani},
title = {Separable Reversible Data Hiding using XOR and Permutation Encryption in Image},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {07},
Issue = {12},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {105-110},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1055},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1055
TI - Separable Reversible Data Hiding using XOR and Permutation Encryption in Image
T2 - International Journal of Computer Sciences and Engineering
AU - Reysh Chandrikapure, Pranjal Dhore, Nisha Balani
PY - 2019
DA - 2019/05/12
PB - IJCSE, Indore, INDIA
SP - 105-110
IS - 12
VL - 07
SN - 2347-2693
ER -

           

Abstract

To perk up the security as well as the quality of decrypted, recovered images, this paper proposes a classification permutation based separable-reversible data hiding in encrypted images. A classification permutation encryption in combination with the XOR-encryption is initially designed to advance the privacy of both pixel-value and pixel location. Then, each bit in the further data is embedded in the most significant bit (MSB) of the encrypted pixels which are indiscriminately chosen based on the data-hiding key in the smooth set. The quality of decrypted and recovered image can be significantly improved by exploiting the spatial correlation as the MSBs of smooth pixels are used to embed the additional data. Results of experimentation exhibit that the quality of decrypted image obtained by the proposed method is superior than to the existing methods. There is 100% probability for lossless recovery from proposed method.

Key-Words / Index Term

separable-reversible data hiding, encrypted images, RDH-EI, classification permutation.

References

[1] F. Huang, J. Huang and Y. Shi, “New framework for reversible data hiding in encrypted domain,” IEEE Trans. Inf. Forensics Security, vol. 11, no. 12, pp. 2777-2789, Dec. 2016.
[2] X. Zhang, “Reversible data hiding in encrypted image,” IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255-258, April. 2011.
[3] W. Hong, T. Chen and H. Wu, “An improved reversible data hiding in encrypted images using side match,” IEEE Signal Process. Lett., vol. 19, no. 4, pp. 199-202, April. 2012.
[4] X. Liao and C. Shu. “Reversible data hiding in encrypted images based on absolute mean difference of neighboring pixels,” J. Vis. Commun. Image Represent., vol. 28, pp. 21-27, 2015.
[5] C. Qian and X. Zhang. “Effective reversible data hiding in encrypted image with privacy protection for image content,” J. Vis. Commun. Image Represent., vol. 31, pp. 154-164, 2015.
[6] K. Ma, W. Zhang, X. Zhao, et al., “Reversible data hiding in encrypted images by reserving room before encryption,” IEEE Trans. Inf. Forensics Security, vol. 8, no. 3, pp. 553-562, Mar. 2013.
[7] D. Xu and R. Wang, “Separable and error-free reversible data hiding in encrypted images,” Signal Process. vol. 123, pp. 9-21, 2016.
[8] T. Nguyen, C. Chang and W. Chang, “High capacity reversible data hiding scheme for encrypted images,” Signal Process.: Image Commun., vol. 44, pp. 84-91, 2016.
[9] X. Zhang, “Separable reversible data hiding in encrypted image,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 826-832, April. 2012.
[10] X. Wu andW. Sun, “High-capacity reversible data hiding in encrypted images by prediction error,” Signal Process., vol. 104, pp. 387-400, 2014.
[11] F. Chen, H. He, Y. Huo, “Self-embedding watermarking scheme against JPEG compression with superior imperceptibility”, Multimed Tools Appl., DOI 10.1007/s 11042-016-3574-0, 2016.
[12] Z. Ni, Y.Q. Shi, N. Ansari, and W.Su, Reversible data hiding, IEEE Transactions on Circuits and Systems for Video Technology, Vol 16, no.3, Mar 2006, pp 354-362.
[13] Shilpa Sreekumar and Vincy Salam, Advanced Reversible Data Hiding with Encrypted Data, IJETT, Vol.13, no.7, Jul 2014, pp 310-313.
[14] VinitAgham and TareekPattewar, A Survey on Separable Reversible Data Hiding Technique, IMACST, Vol.4, no.1, May 2013, pp 9-13.
[15] M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, Reversible data hiding, International Conference on Image Processing, ISSN 1522-4880, Vol.2, Oct.2002, pp 157-160.
[16] C. W. Honsinger, P. Jones, M. Rabbani, and J. C. Stoffel, “Lossless Recoveryof an Original Image Containing Embedded Data,” U.S. Patent6 278 791 B1, Aug. 21, 2001.
[17] B. Macq and F. Deweyand, “Trusted headers for medical images” DFG VIII-D II Watermarking Workshop, Erlangen, Germany,Oct. 1999.
[18] J. Fridrich, M. Goljan, and R. Du, “Invertible authentication,”Proc.SPIE Security Watermarking Multimedia Contents, San Jose, CA, Jan.2001, pp. 197–208.
[19] M. Goljan, J. Fridrich, and R. Du, Distortion-free data embedding,Proc. 4th Inf. Hiding Workshop, Pittsburgh, PA, Apr. 2001, pp. 27–41.
[20] A. R. Calderbank, I. Daubechies, W. Sweldens, and B. Yeo, Wavelettransforms that map integers to integers,Appl. Comput. HarmonicAnal., vol. 5, no. 3, pp. 332–369, 1998.
[21] LalitDhande, PriyaKhune, VinodDeore and DnyaneshwarGawade, Hide Inside-Separable Reversible Data hiding in Encrypted Image, IJITEE, ISSN:2278-3075, Vol. 3, Issue 9, Feb 2014, pp 88-91.