Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption

Authors

  • Dr. K.V.V Kumar  Associate.Professor, Department of ECE, Universal College of Engineering and Technology, Dokiparru, Guntur (DT), Andhra Pradesh, India.
  • K. Lavanya  B. Tech Students, Department of ECE, Universal College of Engineering and Technology, Dokiparru, Guntur (DT), Andhra Pradesh, India
  • P. Maria Kumar  B. Tech Students, Department of ECE, Universal College of Engineering and Technology, Dokiparru, Guntur (DT), Andhra Pradesh, India
  • M. Katyayani  B. Tech Students, Department of ECE, Universal College of Engineering and Technology, Dokiparru, Guntur (DT), Andhra Pradesh, India
  • T. Vinay Kumar  B. Tech Students, Department of ECE, Universal College of Engineering and Technology, Dokiparru, Guntur (DT), Andhra Pradesh, India
  • T. A.Rawindra Reddy  B. Tech Students, Department of ECE, Universal College of Engineering and Technology, Dokiparru, Guntur (DT), Andhra Pradesh, India

Keywords:

Image Encryption, Image Recovery, Reversible Data Hiding.

Abstract

(RDH) in encrypted images, since it maintains the excellent property that the original cover can be loss less recovered after embedded data is extracted while protecting the image content’s confidentiality. All previous methods embed data by reversibly vacating room. Recently, more and more attention is paid to reversible data hiding from the encrypted images, which may be subject to some errors on data extraction and/or image restoration. In this report, we propose a novel method by reserving room before encryption with a traditional RDH algorithm, and thus it is easy for the data hider to reversibly embed data in the encrypted image. The proposed method can achieve real reversibility, that is, data extraction and image recovery are free of any error. Experiments show that this novel method can embed more than 10 times as large payloads for the same image quality as the previous methods, such as for PSNR dB.

References

  1. Siva Janakiraman, Pixel Bit Manipulation for Encoded Hiding -An Inherent stego, 2012 IEEE,978-1-4577.
  2. Bruice Schneier, Applied Cryptography Protocols, Algorithm and Source Code in C. 2nd ed. Wiley India edition, 2007.
  3. C.K. Chan, L.M. Chen, Hiding data in images by simple LSB substitution, Pattern Recognition. 37 (3) (2004) 469–474.
  4. Abbas Cheddad, Joan Condell, Kevin Curran and Paul Mc Kevitt Digital Image Steganography: Survey and Analysis of Current Methods.
  5. Hiding data in images by simple LSB substitution Chi-Kwong Chan, L.M. Cheng Department of Computer Engineering and Information Technology, City University of Hong Kong, Hong Kong Received 17 May 2002; received in revised form 11 July 2003; accepted 11 August 2003.
  6. Information Hiding Using Least Significant Bit Steganography and Cryptography Shailender Gupta Department of Electrical & Electronics Engineering, MCAUST.
  7. Marvel, L., M., Boncelet Jr., C.G. & Retter, ”Spread Spectrum Steganography”, IEEE Transactions on Image Processing, 1999.
  8. Waugh & Wang, S,”Cyber Warfare: Steganography vs Stegoanalysis”, Communications of the AC M, 47:10, October 2004.
  9. Stefan Katznbeisser, Fabien. A., P. Petitcolas editors, Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, Boston.London,2000.
  10. Jamil T., ”Steganography: The art of Hiding Information is Plain Sight”, IEEE Potentials,18:01,1999.
  11. B. Pfitzmann ,”Information Hiding Terminology,” proc. First Int’l Workshop Information Hiding, Lecturer Notes in Computer Science No.1,174,Spring –Verlag,Berlin,1996,pp.347-356.
  12. Yean- Kuhn Lea and Ling-Hew Cheng, ”High capacity steganographic model” ,IEEE Proc.Visual Image Signal Process.,Vol.147,No.3,June 2000.
  13. Ross J.Anderson, Fabien A.P.Petitcols, on The limits of steganography, IEEE Journal of Selected Areas in Communication, 16(4);474-481,May 1998.
  14. M.Ashourian, R.C. Mainland Y.H.Ho, Dithered Quantization for Image Data Hiding In DCT domain, Proc.of IST2003.
  15. C.C.lin, P.F.Shiu, High Capacity Data hiding scheme for DCT-based images. Journal of Information Hiding and Multimedia Signal Processing.

Downloads

Published

2020-04-30

Issue

Section

Research Articles

How to Cite

[1]
Dr. K.V.V Kumar, K. Lavanya, P. Maria Kumar, M. Katyayani, T. Vinay Kumar, T. A.Rawindra Reddy, " Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 6, Issue 2, pp.100-110, March-April-2020.