In-dependable Data hiding in an Encrypted Image using FCM-DH Algorithm

Abstract

In this paper, a data mining technique, Fuzzy C Means Clustering (FCM) based data hiding algorithm (FCM-DH) is used to divide pixels into classes or clusters from the encrypted image. Clustering of pixels in an encrypted image is considered in the proposed approach for creating a space to accommodate data. Before applying the FCM-DH, a content owner prepares a cover image by encrypting the pixels of an image with encryption key. Then, group the pixels to compress the least significant bits of the encrypted image using a proposed FCM-DH technique with data-hiding key and form a partition matrix to create space to accommodate data. With a received cover image containing hidden data, if the receiver can extract the data with data-hiding key or decrypt the cover image with encryption key to obtain original image independently. If the receiver applying both the datahiding key and the encryption key, then extract the data and recover the original image without any error by exploiting the spatial correlation in natural image.

Authors and Affiliations

S Janani, S Poorani

Keywords

Related Articles

Pulse Triggered Flip-Flop Design With Conditional Pulse Enhancement

In this paper a new technique is proposed based on the comparison between Conventional Transistorized Flip-flop and Data transition Look ahead D flip flop here we are checking the working of CDMFF and the conventiona...

Characterization of Accelerometer for Defense Application

The speed of the motor is typically measured in RPM (revolutions per minute). This can be obtained in many ways. A strobe light (stroboscope) is one of the apparatuses to quantify RPM. Another strategy can utilize op...

Investigating the user profile of potential users of e-government in Yemen

Understanding the citizens’ needs by e-government decision makers offers great opportunities to make communication more effective and efficient, to infer and predict citizens’ behaviour and to even influence behaviou...

Novel Iris Recognition Techniques using Energy Compaction and Partial Energies of Transformed Iris Images with Cosine-Kekre and CosineHartley Hybrid Wavelet Transforms

The paper presents novel Iris Recognition technique using Energy Compaction and Partial Energies of transformed iris images with the Hybrid wavelet transform namely ‘Cosine-Kekre’ and ‘Cosine-Hartley’ Hybrid wavelet...

Perception Based On Its Incline And Pier Using Centroid Delineation Pitch Of Leaf

With the aim of elaborating a mobile application, accessible to anyone and with educational purposes, wepresent a method for tree species identification that relies on dedicated algorithms and explicit botanyinspired...

Download PDF file
  • EP ID EP27834
  • DOI -
  • Views 235
  • Downloads 0

How To Cite

S Janani, S Poorani (2014). In-dependable Data hiding in an Encrypted Image using FCM-DH Algorithm. International Journal of Research in Computer and Communication Technology, 3(2), -. https://europub.co.uk/articles/-A-27834