Open Access   Article Go Back

Protection Reversible Data Hiding in Encrypted Images by Distributing Memory before Encryption

Sonali Jambhulkar1 , Priyanka Dudhe2

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-12 , Page no. 145-147, May-2019

Online published on May 12, 2019

Copyright © Sonali Jambhulkar, Priyanka Dudhe . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Sonali Jambhulkar, Priyanka Dudhe, “Protection Reversible Data Hiding in Encrypted Images by Distributing Memory before Encryption,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.12, pp.145-147, 2019.

MLA Style Citation: Sonali Jambhulkar, Priyanka Dudhe "Protection Reversible Data Hiding in Encrypted Images by Distributing Memory before Encryption." International Journal of Computer Sciences and Engineering 07.12 (2019): 145-147.

APA Style Citation: Sonali Jambhulkar, Priyanka Dudhe, (2019). Protection Reversible Data Hiding in Encrypted Images by Distributing Memory before Encryption. International Journal of Computer Sciences and Engineering, 07(12), 145-147.

BibTex Style Citation:
@article{Jambhulkar_2019,
author = {Sonali Jambhulkar, Priyanka Dudhe},
title = {Protection Reversible Data Hiding in Encrypted Images by Distributing Memory before Encryption},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {07},
Issue = {12},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {145-147},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1065},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1065
TI - Protection Reversible Data Hiding in Encrypted Images by Distributing Memory before Encryption
T2 - International Journal of Computer Sciences and Engineering
AU - Sonali Jambhulkar, Priyanka Dudhe
PY - 2019
DA - 2019/05/12
PB - IJCSE, Indore, INDIA
SP - 145-147
IS - 12
VL - 07
SN - 2347-2693
ER -

           

Abstract

Electronic image and data inserting framework have number of critical interactive media applications. Now a days, consideration is paid to reversible data hiding (RDH) in encoded images is more, since it maintains the highest quality property that the original cover can be losslessly recovered after inserted data is extracted while securing the image content’s confidentiality. RDH is a technology used to hide data inside image for high security and can fully recover the original image and private data . All earlier methods fixed data by reversibly vacating room from the encrypted images, which may result to some errors on data extraction and/or image restoration. In this paper, we put forward another method in which we simply encrypt an image without its header by using our new technique. Hence it is easy for the data hider to reversibly fixed data in the encrypted image. The projected technique can achieve real reversibility, that is, data extraction and image recovery are free of any error.

Key-Words / Index Term

Encryption, Decryption and Reversible Data hiding

References

[1] T. Kalker and F.M.Willems, “Capacity bounds and code constructions for reversible data-hiding,” in Proc. 14th Int. Conf. Digital Signal Processing (DSP2002), 2002, pp. 71–76.
[2] W. Zhang, B. Chen, and N. Yu, “Capacity-approaching codes for reversible data hiding,” in Proc 13th Information Hiding (IH’2011),LNCS 6958, 2011, pp. 255–269, Springer-Verlag.
[3] W. Zhang, B. Chen, and N. Yu, “Improving various reversible data hiding schemes via optimal codes for binary covers,” IEEE Trans.
[4] J. Fridrich and M. Goljan, “Lossless data embedding for all image formats,” in Proc. SPIE Proc. Photonics West, Electronic Imaging, Security and Watermarking of Multimedia Contents, San Jose, CA, USA, Jan. 2002, vol. 4675, pp. 572–583.
[5] Z. Ni, Y. Shi, N. Ansari, and S. Wei, “Reversible data hiding,” IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354–362, Mar. 2006.
[6] X. Zhang, “Reversible data hiding in encrypted images,” IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255–258, Apr. 2011.
[7] W. Hong, T. Chen, and H.Wu, “An improved reversible data hiding in encrypted images using side match,” IEEE Signal Process. Lett., vol. 19, no. 4, pp. 199–202, Apr. 2012.
[8] X. Zhang, “Separable reversible data hiding in encrypted image,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 826–832, Apr. 2012.
[9] M. Johnson, P. Ishwar, V. M. Prabhakaran, D. Schonberg, and K. Ramchandran, “On compressing encrypted data,” IEEE Trans. Signal Process., vol. 52, no. 10, pp. 2992–3006, Oct. 2004. 562 IEEE Transactions On Information Forensics And Security, Vol. 8, No. 3, March 2013
[10] W. Liu, W. Zeng, L. Dong, and Q. Yao, “Efficient compression of encrypted grayscale images,” IEEE Trans. Image Process., vol. 19, no. 4, pp. 1097–1102, Apr. 2010
[11] Miscelaneous Gray Level Images [Online]. Availabe:http://decsai.ugr.es/cvg/dbimagenes/g512.php