Open Access   Article Go Back

Reversible Data Hiding in Encrypted Images

Narendra P1 , N. Ganesh Kumar Reddy2 , N.Ramakrishna 3 , O.Harikrishnareddy 4 , Shashikala N5

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-14 , Page no. 252-255, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si14.252255

Online published on May 15, 2019

Copyright © Narendra P, N. Ganesh Kumar Reddy, N.Ramakrishna, O.Harikrishnareddy, Shashikala N . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Narendra P, N. Ganesh Kumar Reddy, N.Ramakrishna, O.Harikrishnareddy, Shashikala N, “Reversible Data Hiding in Encrypted Images,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.14, pp.252-255, 2019.

MLA Style Citation: Narendra P, N. Ganesh Kumar Reddy, N.Ramakrishna, O.Harikrishnareddy, Shashikala N "Reversible Data Hiding in Encrypted Images." International Journal of Computer Sciences and Engineering 07.14 (2019): 252-255.

APA Style Citation: Narendra P, N. Ganesh Kumar Reddy, N.Ramakrishna, O.Harikrishnareddy, Shashikala N, (2019). Reversible Data Hiding in Encrypted Images. International Journal of Computer Sciences and Engineering, 07(14), 252-255.

BibTex Style Citation:
@article{P_2019,
author = {Narendra P, N. Ganesh Kumar Reddy, N.Ramakrishna, O.Harikrishnareddy, Shashikala N},
title = {Reversible Data Hiding in Encrypted Images},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {07},
Issue = {14},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {252-255},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1131},
doi = {https://doi.org/10.26438/ijcse/v7i14.252255}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i14.252255}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1131
TI - Reversible Data Hiding in Encrypted Images
T2 - International Journal of Computer Sciences and Engineering
AU - Narendra P, N. Ganesh Kumar Reddy, N.Ramakrishna, O.Harikrishnareddy, Shashikala N
PY - 2019
DA - 2019/05/15
PB - IJCSE, Indore, INDIA
SP - 252-255
IS - 14
VL - 07
SN - 2347-2693
ER -

           

Abstract

Reversible information concealing in scrambled pictures has achieved more consideration as of late in research network. Security assurance of extra information alluring for crime scene investigation. In this paper, another technique for reversible information stowing away in scrambled pictures. Our strategy embraces the methodology of holding adequate space for the extra information before encoding the spread picture. First we recognize reasonable squares for concealing information from different pieces of the picture. Before scrambling the picture, at least one LSB-plane of these squares are upheld up into residual pieces of the picture utilizing a high-performing customary RDH strategy that chips away at decoded pictures. In the wake of scrambling the picture, those least significant bits are utilized to conceal extra information. Recuperation of unique spread picture and blunder free extraction of extra information is ensured dependably. Also, the proposed technique is straightforward and instinctive. Tentatively outcomes demonstrate that our technique outflanks the cutting edge strategies for reversible information covering up in scrambled pictures.

Key-Words / Index Term

Reversibledatahiding;interpolation;encryption;histogram;reservation

References

[1] L. Zhou, V. Varadharajan, M. Hitchens, Achieving secure role-based access control on encrypted data in cloud storage, IEEE Trans. Inf. Forensics Secur. vol. 8, no.12, pp.1947– 1960, 2013.
[2] H. Wang, S. Wang, Cyber warfare-steganography vs. steganalysis, Commun. ACM, vol. 47, no. 10, pp. 76–82, 2004.
[3] F.A.P. Petitcolas, R.J. Anderson, M.G. Kuhn, Information hiding-a survey, Proc. IEEE, vol. 87, no. 7, pp.1062–1078, 1999.
[4] J. Fridrich, D. Soukal, Matrix embedding for large payloads, IEEE Trans. Inf. Secur. Forensics, vol. 1, no. 3, pp. 390–394, 2006.
[5] C. Munuera, Steganography and error-correcting codes, Signal Process. vol. 87, no. 6, pp. 1528–1533, 2007.
[6] J. Mielikainen, LSB matching revisited, IEEE Signal Process. Lett. vol. 13, no. 5, pp. 285–287, 2006. [7]. X. Zhang, S. Wang, Efficient steganographic embedding by exploiting modification direction, IEEE Commun. Lett. vol. 10, no. 11, pp. 781–783, 2006.
[7] J. Tian, Reversible data embedding using a difference expansion, IEEE Trans. Circuits Syst. Video Technol. vol. 13, no. 8, pp. 890–896, 2003.