Sheltered Reversible Image information Hiding Over Encoded Domain Via Key Modulation

Authors(2) :-Balaji R, K. Sunitha

This work proposes a novel reversible image data hiding (RIDH) conspire over scrambled space. The information implanting is accomplished through an open key tweak component, in which access to the mystery encryption key isn't required. The data embedding is achieved through a public key modulation mechanism, in which access to the secret encryption key is not needed. At the decoder side, a powerful two-class SVM classifier is designed to distinguish encrypted and non-encrypted image patches, allowing us to jointly decode the embedded message and the original image signal. Compared with the state-of-the-arts, the proposed approach provides higher embedding capacity, and is able to perfectly reconstruct the original image as well as the embedded message. Contrasted and the condition of human expressions, the proposed approach gives higher installing limit, and can impeccably recreate the first picture and additionally the implanted message. Broad trial comes about are given to approve the unrivaled execution of our plan. Extensive experimental results are provided to validate the superior performance of our scheme.

Authors and Affiliations

Balaji R
Department of MCA, Mother Theresa Institute of Computer Applications, Palamaner, India
K. Sunitha
Department of MCA, Mother Theresa Institute of Computer Applications, Palamaner, India

Reversible image data hiding (RIDH), signal processing over encrypted domain, feature extraction, SVM

  1. M. U. Celik, G. Sharma, A. Tekalp, and E. Saber,"Lossless generalized lsb data embedding," IEEE Trans. Image Process., vol. 14, no. 2, pp.253266, 2005.
  2. M. U. Celik, G. Sharma, and A. M. Tekalp,"Lossless watermarking for image authentication: a new framework and an implementation," IEEE Trans. Image Process., vol. 15, no. 4, pp. 1042-1049, 2006.
  3. Z. Ni, Y. Shi, N. Ansari, and W. Su,"Reversible data hiding," IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354-362, 2006.
  4. X. Li, W. Zhang, X. Gui, and B. Yang,"A novel reversible data hiding scheme based on two-dimensional difference-histogram modification," IEEE Trans. Inf. Forensics Secur, vol. 8, no. 7, pp. 1091-1100, 2013.
  5. C. Qin, C.-C. Chang, Y.-H. Huang, and L.-T. Liao,"An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism," IEEE Trans. Circuits Syst. Video Technol., vol. 23, no. 7, pp. 1109-1118, 2013.
  6. W. L. Tai, C. M. Yeh, and C. C. Chang,"Reversible data hiding based on histogram modification of pixel differences," IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 6, pp. 906-910, 2009.
  7. J. Tian,"Reversible data embedding using a difference expansion," IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890-896, 2003.
  8. Y. Hu, H. K. Lee, and J. Li,"De-based reversible data hiding with improved overflow location map," IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 2, pp. 250-260, 2009.
  9. X. Li, B. Yang, and T. Zeng,"Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection," IEEE Trans. Image Process., vol. 20, no. 12, pp. 3524-3533, 2011.
  10. X. Zhang,"Reversible data hiding with optimal value transfer," IEEE Trans. Multimedia, vol. 15, no. 2, pp. 316-325, 2013.
  11. T. Bianchi, A. Piva, and M. Barni,"On the implementation of the discrete fourier transform in the encrypted domain," IEEE Trans. Inf. Forensics Secur., vol. 4, no. 1, pp. 86-97, 2009.
  12. T. Bianchi, A. Piva, and M. Barni,"Composite signal representation for fast and storage-efficient processing of encrypted signals," IEEE Trans. Inf. Forensics Secur., vol. 5, no. 1, pp. 180-187, 2010.
  13. M. Barni, F. P., R. Lazzeretti, A.-R. Sadeghi, and T. Schneider,"Privacypreserving ecg classification with branching programs and neural networks," IEEE Trans. Inf. Forensics Secur., vol. 6, no. 2, pp. 452-468, 2011.
  14. Z. Erkin, T. Veugen, T. Toft, and R. Lagendijk,"Generating private recommendations efficiently using homomorphic encryption and data packing," IEEE Trans. Inf. Forensics Secur., vol. 7, no. 3, pp. 1053-1066, 2012.
  15. M. Chandramouli, R. Iorga and S. Chokhani,"Cryptographic key management issues and challenges in cloud services," NIST Report 7956, pp. 1-31, 2013.

Publication Details

Published in : Volume 4 | Issue 2 | March-April 2018
Date of Publication : 2018-03-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 443-447
Manuscript Number : CSEIT184118
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Balaji R, K. Sunitha, "Sheltered Reversible Image information Hiding Over Encoded Domain Via Key Modulation", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 2, pp.443-447, March-April-2018. |          | BibTeX | RIS | CSV

Article Preview