Separable Reversible Data Hiding in an Encrypted Image
Journal Title: Wireless Communication Technology - Year 2018, Vol 2, Issue 2
Abstract
Since times immemorial, security of data to maintain its confidentiality, proper access control, integrity and availability has been a major issue in data communication. Today images and data transfer in mobile phone communication, e-commerce, Pay-TV, sending private e-mails, transmitting financial information and touches on many aspects of daily lives. We wanted to develop a scheme in which the data embedded in an image and the image itself would be secured from any unauthorized access. This scheme would also be a merit in military and medical services. This paper proposed a scheme for separable reversible data hiding technique in an encrypted image. The original image was encrypted using an encryption key. Then, a data-hider hides the data using the data-hiding key. With an encrypted image containing additional data, if a receiver has the data-hiding key, it can extract the additional data though it does not know the image content and if it has the encryption key, it can decrypt the received data to obtain an image similar to the original one, but cannot extract the additional data. If the receiver has both the key it can extract the additional data and recover the original content without any error by exploiting. This results in the security of data and image privacy.
Authors and Affiliations
Jaimini Solanki, Faizal Patel, Vivek Rajguru, Ankit Saxena
A Detailed Study on LDPC Encoding Techniques
This survey deals with LDPC encoding techniques. Different types of error detection and correction codes have been studied. BHC codes, Turbo code, LDPC Codes, Hamming codes are some of the vast classes of codes. Low Deco...
Octaband antenna for mobile applications
An octaband micro strip antenna is designed that integrates the current wireless technologies with some of the older and upcoming technologies of the mobile communication. It provides backward compatibility to the techno...
Application of Smart Antenna in TD - SCDMA
With the rapid development of global communications business, future personal communication wireless mobile communication technology has aroused great concern. Way to eliminate the impact of co-channel interference (CCI)...
Multimodal biometric authentication
In the present era of information technology, there is a need to implement authentication and authorization techniques for security of resources. There are number of ways to prove authentication and authorization. But...
Choose the Appropriate Cluster Head for Decrease Energy Consume in Wireless Sensor Networks Based on Gravitational Emulation Local Search Algorithm
New Wireless Sensor Networks (WSN), is the new generation of real-time embedded systems with limited computation, energy and storage which have variety usage, especially when that is not possible using traditional networ...