CFP last date
15 May 2024
Call for Paper
June Edition
IJAIS solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 15 May 2024

Submit your paper
Know more
Reseach Article

Vacating Room before Encrypting of Image for Reversible Data Hiding

by Sayli P. Raut, Kiran A. Bhandari
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 11 - Number 3
Year of Publication: 2016
Authors: Sayli P. Raut, Kiran A. Bhandari
10.5120/ijais2016451589

Sayli P. Raut, Kiran A. Bhandari . Vacating Room before Encrypting of Image for Reversible Data Hiding. International Journal of Applied Information Systems. 11, 3 ( Aug 2016), 46-49. DOI=10.5120/ijais2016451589

@article{ 10.5120/ijais2016451589,
author = { Sayli P. Raut, Kiran A. Bhandari },
title = { Vacating Room before Encrypting of Image for Reversible Data Hiding },
journal = { International Journal of Applied Information Systems },
issue_date = { Aug 2016 },
volume = { 11 },
number = { 3 },
month = { Aug },
year = { 2016 },
issn = { 2249-0868 },
pages = { 46-49 },
numpages = {9},
url = { https://www.ijais.org/archives/volume11/number3/930-2016451589/ },
doi = { 10.5120/ijais2016451589 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T19:03:59.785414+05:30
%A Sayli P. Raut
%A Kiran A. Bhandari
%T Vacating Room before Encrypting of Image for Reversible Data Hiding
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 11
%N 3
%P 46-49
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Data confidentiality and integrity have become most important aspect of this communication world. Where, cryptography involves both encryption and embedding of data, the main aspects to keep the data integrity and confidentiality intact. Encryption domain has more importance in data hiding. Data concealing can be done through any channels like audio, video, image etc. and send to receiver. Receiver will acquire data from the media where it embeds data. Data hiding can be done for sending highly classified data. For which Reversible Data Hiding is becoming more popular. Reversible data hiding is an approach by which the original image can be recovered without any loss when the data embbeded in it is extracted. This paper focuses on main approaches of RDH i.e. Vacating Room after Encryption and Vacating Room before Encryption and compares the performance of same on the basis of various RDH techniques.

References
  1. T. Kalker and F.M.Willems, “Capacity bounds and code constructions for reversible data-hiding,” in Proc. 14th Int. Conf. Digital Signal Processing (DSP2002), 2002, pp. 71–76.
  2. W. Zhang, B. Chen, and N. Yu, “Capacity-approaching codes for reversible data hiding,” in Proc 13th Information Hiding (IH’2011), LNCS 6958, 2011, pp. 255–269, Springer-Verlag.
  3. W. Zhang, B. Chen, and N. Yu, “Improving various reversible data hiding schemes via optimal codes for binary covers,” IEEE Trans.Image Process., vol. 21, no. 6, pp. 2991–3003, Jun. 2012.
  4. D. Slepian and J. K. Wolf, “Noiseless coding of correlated information sources,” IEEE Trans. Inform. Theory, vol. IT-19, pp. 471–480, July 1973.
  5. T. M. Cover and J. A. Thomas, Elements of Information Theory. New York: Wiley, 1991
  6. W. Liu, W. Zeng, L. Dong, et al. “Efficient compression of encrypted grayscale images,” IEEE Trans. on Image Processing, vol. 19, no. 4, pp. 1097-1102, 2010.
  7. W. E. Ryan, “An introduction to LDPC codes,” in CRC Handbook for Coding and Signal Processing for Recoding Systems (B. Vasic, ed.), CRC Press, 2004.
  8. K. Ma, W. Zhang, et al. “Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption,” IEEE Trans. Inf. Forensics Security, vol. 8, no. 3, 553-562, 2013
  9. W. Puech, M. Chaumont and O. Strauss, “A reversible data hiding method for encrypted images,” Proc. SPIE 6819, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, 68191E, Feb. 26, 2008, doi:10.1117/12.766754
  10. X. Zhang, “Separable reversible data hiding in encrypted image,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 826–832, Apr. 2012.
  11. X. Zhang, “Reversible data hiding in encrypted images,” IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255–258, Apr. 2011.
  12. W. Hong, T. Chen, and H. Wu, “An improved reversible data hiding in encrypted images using side match,” IEEE Signal Process. Lett., vol. 19, no. 4, pp. 199–202, Apr. 2012.
  13. Z. Qian, X. Han and X. Zhang, “Separable Reversible Data hiding in Encrypted Images by n-nary Histogram Modification,” 3rd International Conference on Multimedia Technology (ICMT 2013), pp. 869-876, Guangzhou, China, 2013.
  14. K. Ma, W. Zhang, et al. “Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption,” IEEE Trans. Inf. Forensics Security, vol. 8, no. 3, 553-562, 2013.
  15. W. Zhang, K. Ma and N. Yu, “Reversibility improved data hiding in encrypted images,” Signal Processing, vol. 94, pp. 118–127, 2014.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Encryption Decryption Reversible Data Hiding Data Embedding