A Novel Encryption and Extended Dynamic Histogram Shifting Modulation for Reversible Data Hiding in Encrypted Image

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 7, Issue 2

Abstract

Recently, progressive interest is paid to reversible data hiding (RDH) in encrypted images, since it preserves the original cover can be recovered without any loss after embedded data is extracted to protect the con?dentiality of image content’s.Earlier method used“vacate room after Encryption” in which data can be embedded by reversibly vacating room from the encrypted images. This might cause errors while data extraction or image restoration. However this provides less PSNR value when embedding messages in Images. To address this problem, a proposed method uses Extended Dynamic Histogram Shifting Modulation (EDHS) can be done on the image content by the content owner. This method shifts the pixels of histogram based on prediction errors and its neighborhood pixels. The data can be embedded based on the space provided by the proposed histogram shifting method. After reserving space for data hiding by self reversible embedding using EDHS, Image can be encrypted by using proposed novel encryption method. Finally the receiver can restore the image and extract data by using encryption key and data hiding key. Experimental result provides greater PSNR value when compare with the existing work.

Authors and Affiliations

K. Latha , M. Sundarambal

Keywords

Related Articles

A Novel Encryption and Extended Dynamic Histogram Shifting Modulation for Reversible Data Hiding in Encrypted Image

Recently, progressive interest is paid to reversible data hiding (RDH) in encrypted images, since it preserves the original cover can be recovered without any loss after embedded data is extracted to protect the con?den...

Multi-User License Authentication and Validation System to Protect Against Man in the Middle Attack

Multi-user Software Authentication plays a vital role to authenticate and access software’s through online. Multi-user means multiple users are trying to access the software after purchasing through online with specified...

A Survey on an Effective Defense Mechanism against Reactive Jamming Attacks in WSN

A Wireless Sensor Network (WSN) is a self-configure network of sensor nodes communicate among themselves using radio signals and deployed in quantity to sense, monitor and to understand the physical world. A jammer is an...

Information Security and Risk Management for Banking System

Risk management provides an effective approach for measuring the security, but existing risk management approaches come with major shortcomings such as the demand for a very detailed knowledge about the IT security spher...

Control Algorithm for Adaptive Front Light Systems

During the night driving, the reaction time of a human driver go into a compromise due to inadequate peripheral vision or lack of color and depth perception. The conventional headlamps of any automotive vehicle are insuf...

Download PDF file
  • EP ID EP94177
  • DOI -
  • Views 89
  • Downloads 0

How To Cite

K. Latha, M. Sundarambal (2014). A Novel Encryption and Extended Dynamic Histogram Shifting Modulation for Reversible Data Hiding in Encrypted Image. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 7(2), 115-118. https://europub.co.uk/articles/-A-94177