Enhancing Reversible Data Hiding Technique in Encrypted Images
Shital B. Tiwaskar and Gajendra Singh Chandel
Volume 1: Issue 1, Revised on – 30 March 2020, pp 5-10
Author's Information
Shital B. Tiwaskar1
Corresponding Author
1Department of Computer Science and Engineering, Shri Satya Sai Institute Of Science & Technology, Sehore (M.P), India.
sheetaltiwaskar@gmail.com
Gajendra Singh Chandel2
2Department of Computer Science and Engineering, Shri Satya Sai Institute Of Science & Technology, Sehore (M.P), India.
Abstract:-
Since several years, the protection of multimedia data is becoming very important. The protection of this multi- media data can be done with encryption or data hiding algorithms. Recently, more and more attention is paid to reversible data hiding (RDH) in encrypted images, since it maintains the excellent property that the original cover can be losslessly recovered after embedded data is extracted while protecting the image content’s confidentiality. In this paper, we propose a novel method by reserving memory space before encryption with a traditional RDH technique, and thus it is easy for the data hider to reversibly embed data in the image. The proposed method can achieve real reversibility, that is, data extraction and image recovery are free of any error. A new idea is to apply reversible data hiding algorithms on encrypted images by wishing to remove the embedded data before the image decryption. Recent reversible data hiding methods have been proposed with high capacity, but these methods are not applicable on encrypted images. The image like differential expansion, histogram shift or the combination of both the techniques. This is useful in the way that this method recovers the image with its original quality with improved PSNR ratio.Index Terms:-
Reversible data hiding, Image encoding, Image, decoding, Image compression, Data Encryption, Image Encryption, Privacy Protection, Data Extraction, Histogram shiftingREFERENCES
[1] T. Kalker and F.M.Willems, “Capacity bounds and code constructions for reversible data-hiding,” in Proc. 14th Int. Conf. Digital Signal Processing (DSP2002), 2002, pp. 71–76.[2] W. Zhang, B. Chen, and N. Yu, “Capacity-approaching codes for reversible data hiding,” in Proc 13th Information Hiding (IH’2011), LNCS 6958, 2011, pp. 255–269, RAMEPublishers-Verlag.
[3] W. Zhang, B. Chen, and N. Yu, “Improving various reversible data hiding schemes via optimal codes for binary covers,” IEEE Trans. Image Process., vol. 21, no. 6, pp. 2991–3003, Jun. 2012.
[4] J. Fridrich and M. Goljan, “Lossless data embedding for all image formats,” in Proc. SPIE Proc. Photonics West, Electronic Imaging, Security and Watermarking of Multimedia Contents, San Jose, CA, USA, Jan. 2002, vol. 4675, pp. 572–583.
[5] J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896,Aug. 2003.
[6] Z. Ni, Y. Shi, N. Ansari, and S. Wei, “Reversible data hiding,” IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354–362, Mar. 2006.
[7] D.M. Thodi and J. J. Rodriguez, “Expansion embedding techniques for reversible watermarking,” IEEE Trans. Image Process., vol. 16, no. 3, pp. 721–730, Mar. 2007.
[8] P. Tsai, Y. C. Hu, and H. L. Yeh, “Reversible image hiding scheme sing predictive coding and histogram shifting,” Signal Process., vol. 89, pp. 1129–1143, 2009.
[9] W. Liu, W. Zeng, L. Dong, and Q. Yao, “Efficient compression of encrypted rayscale images,” IEEE Trans. Image Process., vol. 19, no. 4, pp. 1097–1102, Apr. 2010.
[10] X. Zhang, “Reversible data hiding in encrypted images,” IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255–258, Apr. 2011.
[11] W. Hong, T. Chen, and H.Wu, “An improved reversible data hiding in encrypted images using side match,” IEEE Signal Process. Lett., vol. 19, no. 4, pp. 199–202, Apr. 2012.
[12] X. Zhang, “Separable reversible data hiding in encrypted image,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 826–832, Apr. 2012.
[13] Miscelaneous Gray Level Images [Online].
Available Online
To view full paper, Download here