Reversible Encrypted Data Concealment In Encrypted Images By Reserving Room For Data Protection
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 11
Abstract
This paper proposes a novel scheme for separate reversible data hiding in encrypted images. In the first phase, a content owner encrypts using an encryption key the original image. Then, a data-hider may compress the least significant bits of the encrypted image using a data-hiding key to create a sparse space to accommodate some additional data. With an encrypted image containing additional data, if a receiver has the data-hiding key, he can extract the additional data though he does not know the image content. If the receiver has the encryption key, he can decrypt the received data to obtain an image similar to the original one, but cannot extract the additional data. If the receiver has both the data-hiding and the encryption key, he can extract the additional data and recover the original content without any error by exploiting the spatial correlation in natural image when the amount of additional data is not too large.
Authors and Affiliations
Bhagyashri S. Jatte, Asst. Prof. A. S. Deshpande
Design and Numerical Studies on Clamping Fixture for Machining an Automotive Pump Body
the paper discusses the design and analysis of a clamping fixture for a vertical machining centre (VMC) to machine an automotive pump body. Recent increase in competition, many industries has revisited their strategy to...
Ant Colony Optimization Based Delay Aware Routing Protocol (ACO-DARP) For Wireless Sensor Network
Today’s wireless networks urge to provide communication in most delay reduced manner. This research work aims to propose a routing protocol ACO-DARP, which is more aware about the delay. Route optimization is performed...
Optimal Multi- Level Thresholding for Color Image Using Kapur’s Entropy and Bacterial Foraging Algorithm
This paper presents, a multi-thresholding approach for a class of 481 x 321 sized standard colour test images using Kapur’s entropy function and Bacterial Foraging Optimization (BFO) optimization algorithm. In this work...
Bank Security System using GSM Technology with Arm 7 Processor
In this paper an advanced design system has been proposed to control the electrical devices in industries, homes and banks by using GSM technology. A GSM modem provides the communication interface. It transmits the prot...
slugAn Analytical Analysis of Stream Cipher and Block cipher Algorithms
Cryptography is an art or science to provid e security for sharing of information over the internet. Cryptography changes the format of original text into another format that is not easy to understand by unwanted user...