Enhancing Reversible Data Hiding Technique in Encrypted Images

Shital B. Tiwaskar and Gajendra Singh Chandel
Volume 1: Issue 1, Revised on – 30 March 2020, pp 5-10


Author's Information
Shital B. Tiwaskar1 
Corresponding Author
1Department of Computer Science and Engineering, Shri Satya Sai Institute Of Science & Technology, Sehore (M.P), India.
sheetaltiwaskar@gmail.com

Gajendra Singh Chandel2
2Department of Computer Science and Engineering, Shri Satya Sai Institute Of Science & Technology, Sehore (M.P), India.


Research Article -- Peer Reviewed
First online on – 30 Dec 2014,      Revised on – 30 March 2020

Open Access article under Creative Commons License

Cite this article –Shital B. Tiwaskar and Gajendra Singh Chandel, “Enhancing Reversible Data Hiding Technique in Encrypted Images”, International Journal of Computational and Electronics Aspects in Engineering, RAME Publishers, vol. 1, issue 1, pp. 5-10, 2014, Revised in 2020.
https://doi.org/10.26706/ijceae.1.1.20141202


Abstract:-
Since several years, the protection of multimedia data is becoming very important. The protection of this multi- media data can be done with encryption or data hiding algorithms. Recently, more and more attention is paid to reversible data hiding (RDH) in encrypted images, since it maintains the excellent property that the original cover can be losslessly recovered after embedded data is extracted while protecting the image content’s confidentiality. In this paper, we propose a novel method by reserving memory space before encryption with a traditional RDH technique, and thus it is easy for the data hider to reversibly embed data in the image. The proposed method can achieve real reversibility, that is, data extraction and image recovery are free of any error. A new idea is to apply reversible data hiding algorithms on encrypted images by wishing to remove the embedded data before the image decryption. Recent reversible data hiding methods have been proposed with high capacity, but these methods are not applicable on encrypted images. The image like differential expansion, histogram shift or the combination of both the techniques. This is useful in the way that this method recovers the image with its original quality with improved PSNR ratio.
Index Terms:-
Reversible data hiding, Image encoding, Image, decoding, Image compression, Data Encryption, Image Encryption, Privacy Protection, Data Extraction, Histogram shifting
REFERENCES
[1] T. Kalker and F.M.Willems, “Capacity bounds and code constructions for reversible data-hiding,” in Proc. 14th Int. Conf. Digital Signal Processing (DSP2002), 2002, pp. 71–76.

[2] W. Zhang, B. Chen, and N. Yu, “Capacity-approaching codes for reversible data hiding,” in Proc 13th Information Hiding (IH’2011), LNCS 6958, 2011, pp. 255–269, RAMEPublishers-Verlag.

[3] W. Zhang, B. Chen, and N. Yu, “Improving various reversible data hiding schemes via optimal codes for binary covers,” IEEE Trans. Image Process., vol. 21, no. 6, pp. 2991–3003, Jun. 2012.

[4] J. Fridrich and M. Goljan, “Lossless data embedding for all image formats,” in Proc. SPIE Proc. Photonics West, Electronic Imaging, Security and Watermarking of Multimedia Contents, San Jose, CA, USA, Jan. 2002, vol. 4675, pp. 572–583.

[5] J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896,Aug. 2003.

[6] Z. Ni, Y. Shi, N. Ansari, and S. Wei, “Reversible data hiding,” IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354–362, Mar. 2006.

[7] D.M. Thodi and J. J. Rodriguez, “Expansion embedding techniques for reversible watermarking,” IEEE Trans. Image Process., vol. 16, no. 3, pp. 721–730, Mar. 2007.

[8] P. Tsai, Y. C. Hu, and H. L. Yeh, “Reversible image hiding scheme sing predictive coding and histogram shifting,” Signal Process., vol. 89, pp. 1129–1143, 2009.

[9] W. Liu, W. Zeng, L. Dong, and Q. Yao, “Efficient compression of encrypted rayscale images,” IEEE Trans. Image Process., vol. 19, no. 4, pp. 1097–1102, Apr. 2010.

[10] X. Zhang, “Reversible data hiding in encrypted images,” IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255–258, Apr. 2011.

[11] W. Hong, T. Chen, and H.Wu, “An improved reversible data hiding in encrypted images using side match,” IEEE Signal Process. Lett., vol. 19, no. 4, pp. 199–202, Apr. 2012.

[12] X. Zhang, “Separable reversible data hiding in encrypted image,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 826–832, Apr. 2012.

[13] Miscelaneous Gray Level Images [Online].
Available Online


To view full paper, Download here


To View Full Paper

Publishing with