Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper

-

November Edition 2021

International Journal of Applied Information Systems solicits high quality original research papers for the November 2021 Edition of the journal. The last date of research paper submission is October 15, 2021.

Vacating Room before Encrypting of Image for Reversible Data Hiding

Sayli P. Raut, Kiran A. Bhandari. Published in Image Processing

International Journal of Applied Information Systems
Year of Publication: 2016
Publisher: Foundation of Computer Science (FCS), NY, USA
Authors: Sayli P. Raut, Kiran A. Bhandari
10.5120/ijais2016451589
Download full text
  1. Sayli P Raut and Kiran A Bhandari. Vacating Room before Encrypting of Image for Reversible Data Hiding. International Journal of Applied Information Systems 11(3):46-49, August 2016. URL, DOI BibTeX

    @article{10.5120/ijais2016451589,
    	author = "Sayli P. Raut and Kiran A. Bhandari",
    	title = "Vacating Room before Encrypting of Image for Reversible Data Hiding",
    	journal = "International Journal of Applied Information Systems",
    	issue_date = "August 2016",
    	volume = 11,
    	number = 3,
    	month = "Aug",
    	year = 2016,
    	issn = "2249-0868",
    	pages = "46-49",
    	numpages = 4,
    	url = "http://www.ijais.org/archives/volume11/number3/930-2016451589",
    	doi = "10.5120/ijais2016451589",
    	publisher = "Foundation of Computer Science (FCS), NY, USA",
    	address = "New York, USA"
    }
    

Abstract

Data confidentiality and integrity have become most important aspect of this communication world. Where, cryptography involves both encryption and embedding of data, the main aspects to keep the data integrity and confidentiality intact. Encryption domain has more importance in data hiding. Data concealing can be done through any channels like audio, video, image etc. and send to receiver. Receiver will acquire data from the media where it embeds data. Data hiding can be done for sending highly classified data. For which Reversible Data Hiding is becoming more popular. Reversible data hiding is an approach by which the original image can be recovered without any loss when the data embbeded in it is extracted. This paper focuses on main approaches of RDH i.e. Vacating Room after Encryption and Vacating Room before Encryption and compares the performance of same on the basis of various RDH techniques.

Reference

  1. T. Kalker and F.M.Willems, “Capacity bounds and code constructions for reversible data-hiding,” in Proc. 14th Int. Conf. Digital Signal Processing (DSP2002), 2002, pp. 71–76.
  2. W. Zhang, B. Chen, and N. Yu, “Capacity-approaching codes for reversible data hiding,” in Proc 13th Information Hiding (IH’2011), LNCS 6958, 2011, pp. 255–269, Springer-Verlag.
  3. W. Zhang, B. Chen, and N. Yu, “Improving various reversible data hiding schemes via optimal codes for binary covers,” IEEE Trans.Image Process., vol. 21, no. 6, pp. 2991–3003, Jun. 2012.
  4. D. Slepian and J. K. Wolf, “Noiseless coding of correlated information sources,” IEEE Trans. Inform. Theory, vol. IT-19, pp. 471–480, July 1973.
  5. T. M. Cover and J. A. Thomas, Elements of Information Theory. New York: Wiley, 1991
  6. W. Liu, W. Zeng, L. Dong, et al. “Efficient compression of encrypted grayscale images,” IEEE Trans. on Image Processing, vol. 19, no. 4, pp. 1097-1102, 2010.
  7. W. E. Ryan, “An introduction to LDPC codes,” in CRC Handbook for Coding and Signal Processing for Recoding Systems (B. Vasic, ed.), CRC Press, 2004.
  8. K. Ma, W. Zhang, et al. “Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption,” IEEE Trans. Inf. Forensics Security, vol. 8, no. 3, 553-562, 2013
  9. W. Puech, M. Chaumont and O. Strauss, “A reversible data hiding method for encrypted images,” Proc. SPIE 6819, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, 68191E, Feb. 26, 2008, doi:10.1117/12.766754
  10. X. Zhang, “Separable reversible data hiding in encrypted image,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 826–832, Apr. 2012.
  11. X. Zhang, “Reversible data hiding in encrypted images,” IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255–258, Apr. 2011.
  12. W. Hong, T. Chen, and H. Wu, “An improved reversible data hiding in encrypted images using side match,” IEEE Signal Process. Lett., vol. 19, no. 4, pp. 199–202, Apr. 2012.
  13. Z. Qian, X. Han and X. Zhang, “Separable Reversible Data hiding in Encrypted Images by n-nary Histogram Modification,” 3rd International Conference on Multimedia Technology (ICMT 2013), pp. 869-876, Guangzhou, China, 2013.
  14. K. Ma, W. Zhang, et al. “Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption,” IEEE Trans. Inf. Forensics Security, vol. 8, no. 3, 553-562, 2013.
  15. W. Zhang, K. Ma and N. Yu, “Reversibility improved data hiding in encrypted images,” Signal Processing, vol. 94, pp. 118–127, 2014.

Keywords

Cryptography, Encryption, Decryption, Reversible Data Hiding, Data Embedding