Separable Reversible Data Hiding in an Encrypted Image
Journal Title: Wireless Communication Technology - Year 2018, Vol 2, Issue 2
Abstract
Since times immemorial, security of data to maintain its confidentiality, proper access control, integrity and availability has been a major issue in data communication. Today images and data transfer in mobile phone communication, e-commerce, Pay-TV, sending private e-mails, transmitting financial information and touches on many aspects of daily lives. We wanted to develop a scheme in which the data embedded in an image and the image itself would be secured from any unauthorized access. This scheme would also be a merit in military and medical services. This paper proposed a scheme for separable reversible data hiding technique in an encrypted image. The original image was encrypted using an encryption key. Then, a data-hider hides the data using the data-hiding key. With an encrypted image containing additional data, if a receiver has the data-hiding key, it can extract the additional data though it does not know the image content and if it has the encryption key, it can decrypt the received data to obtain an image similar to the original one, but cannot extract the additional data. If the receiver has both the key it can extract the additional data and recover the original content without any error by exploiting. This results in the security of data and image privacy.
Authors and Affiliations
Jaimini Solanki, Faizal Patel, Vivek Rajguru, Ankit Saxena
Bridge monitoring utilizing handheld devices
Natural Frequencies of structures is an elegant intrinsic property that is essential for many Civil Structural applications, as Structural Health Monitoring and Simulation Modeling. The physically tangible relation betwe...
Octaband antenna for mobile applications
An octaband micro strip antenna is designed that integrates the current wireless technologies with some of the older and upcoming technologies of the mobile communication. It provides backward compatibility to the techno...
Single Fault tolerance Method for Protection Data Flow in the MPLS Network
This paper presents efficient methods for rerouting traffic in the Multiprotocol Label Switching (MPLS) network, when a fault occurs in the working link. The proposed methods have been designed to handle single fault bas...
Recognition of Vehicle Number Plate Using Image Processing Technique
The video surveillance system is preferred for security monitoring, however, the detection of moving object is a challenging part. In areas where parking space is allotted to a particular vehicle, the wrongly parked vehi...
Application of Wireless LAN Localization Technology
This article mainly describes the formation of various types of wireless LAN, as the current wireless LAN (Wireless LAN) technology can be very convenient to wireless network equipment and mobile devices, people can acce...