Reversible Data Hiding In Encrypted Images by Reserving Room before Encryption
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 3
Abstract
Reversible data hiding (RDH) in images is a technique, by which the original cover can be lossless recovered after the embedded message is extracted. This important technique is widely used in medical imagery, military imagery and law forensics, where no distortion of the original cover is allowed. Recently, more and more attention is paid to reversible data hiding (RDH) in encrypted images, since it maintains the excellent property that the original cover can be lossless recovered after embedded data is extracted while protecting the image content’s confidentiality. All previous methods embed data by reversibly vacating room from the encrypted images, which may be subject to some errors on data extraction and/or image restoration. In this paper, we propose a novel method by reserving room before encryption with a traditional RDH algorithm, and thus it is easy for the data hider to reversibly embed data in the encrypted image. The proposed method can achieve real reversibility, that is, data extraction and image recovery are free of any error. Experiments show that this novel method can embed more than 10 times as large payloads for the same image quality as the previous methods.
Authors and Affiliations
Veena N Bhat, Navin Y
Implementation of Enhanced NOC Router
VLSI innovation has enhanced in incorporating many cores on a single chip, but association between them is critical. NoC has appeared to be solution for this. In this paper, a novel router which is main part of on-chip...
A Three Way Visual Cryptography & its Application in biometric Security : A Review
Visual cryptography provides secured digital transmission which is used only for one time. The original images can be reuse by using this scheme. It is effortless and uncomplicated technique to execute the secret image...
Lagrangian Decomposition Approach Based Voltage Security Constrained Unit Commitment
As the electrical industry increases many problems arises in controlling the generating units. Unit commitment decides which unit to operate during a certain period time. The objective of the unit commitment is to find...
A survey of cooperative blackhole attack in mobile ad hoc networks
A MANET is an infrastructure less network that consists of mobile nodes that communicate with each other over wireless links. In the absence of a fixed infrastructure, nodes have to cooperate with each other in order to...
An Open Framework for Foundational Security and Public Verification for Secure Audit Logs
Data handling and Security in cloud goes through a dynamic and complex hierarchical service chain. Secure Logging is a service that helps to maintain and store the log records more securely in the server operating in cl...