Distinct Revocable Data Hiding In Ciphered Image

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 6

Abstract

 Abstract: This scheme proposes a secure and authenticated reversible data hiding in cipher images.Nowadays, we pay more attention to reversible data hiding in encrypted images, as the original cover can bereversibly recovered after embedded data is retrieved. In the first phase, the content owner encrypts the originalimage using an encryption key. Then, a data hider compresses the least significant bits (LSB’s) of the encryptedimage using a data hiding key to create space to store some additional data. Then, if a receiver has the datahiding key, he can extract the additional data from the encrypted image though he is unaware of the imagecontent. If the receiver has the encryption key with him, then he can decrypt the data to obtain an image similarto the original image. If the receiver has both, the data hiding key as well as the encryption key, then he can extract the additional data as well as he can recover the original content.

Authors and Affiliations

Anamika Patil , Pooja Bafna , Mona Pounikar , Pranjal Badgujar

Keywords

Related Articles

 Improvising Data Locality and Availability in Hbase Ecosystem

 Abstract: In this paper, we try to represent the importance of data locality with the HBase architecture. HBase has a dynamic master slave architecture but the emphasis on data locality, i.e. getting the logic or p...

 Improving Data Storage Security in Cloud Computing UsingElliptic Curve Cryptography

Abstract: Companies tends towards more availability, less cost, managed risk, agility- all of which areproviding by cloud computing. The cloud computing is a way to deliver IT services on demand and pay perusage, and it...

 Software Engineering Process in Web Application Development

 Abstract: The methods used for the development of conventional software engineering models cannot be useddirectly for the development of web based applications. This paper identifies and analyses the variousadaptat...

Image Retrieval using Sparse Codewords with Cryptography for Enhanced Security

Now days face image of people is the interesting area of users. Most of the time images are in digital form. Thus, content-based face image retrieval is a technique which facilitates for many emerging applications.In thi...

 Numerical Solution of unsteady gravity flow of power-law fluids through a porous medium

Abstract: In this paper, we present a numerical study of the rheological behaviour effect of non-Newtonian, power-law fluids on the unsteady gravity flow through a porous medium. The governing equations are derived&...

Download PDF file
  • EP ID EP147782
  • DOI -
  • Views 85
  • Downloads 0

How To Cite

Anamika Patil, Pooja Bafna, Mona Pounikar, Pranjal Badgujar (2014).  Distinct Revocable Data Hiding In Ciphered Image. IOSR Journals (IOSR Journal of Computer Engineering), 16(6), 14-20. https://europub.co.uk/articles/-A-147782