Embedded Reversibility Data in an Encrypted Photograph: A Case Study

Habeeb Noori Jumaah
International Journal of Computational and Electronic Aspects in Engineering
Volume 5: Issue 3, September 2024, pp 73-79


Author's Information
Habeeb Noori Jumaah 1 
Corresponding Author
1University of Telafer, Tal Afar, Iraq
habeebnoori32@gmail.com

Research Paper -- Peer Research Papered
First online on – 30 September 2024

Open Access article under Creative Commons License

Cite this article –Habeeb Noori Jumaah “Embedded Reversibility Data in an Encrypted Photograph: A Case Study”, International Journal of Computational and Electronic Aspects in Engineering, RAME Publishers, vol. 5, Issue 3, pp. 73-79, 2024.
https://doi.org/10.26706/ijceae.5.3.20240801


Abstract:-
Multimedia data protection has grown in importance over the past few years. Data concealing methods or encryption can be used to accomplish this. Data compression is required to minimize transmission time; however, combining data compression, encryption, and data concealing in one step presents a new difficulty. Few methods for combining picture compression and encryption have been put forth. Currently, data embedding in encrypted pictures is a hurdle. Standard data hiding strategies are inapplicable for encrypted images as their entropy is maximum since the embedding stage is regarded as noise. This research provides a new approach to reversible data embedding in encrypted photos that preserves picture quality while guaranteeing data security. Three primary stages make up the proposed scheme: data embedding, picture recovery/extraction, and image encryption. The suggested method achieves good picture quality and low computing complexity while retaining strong security characteristics, as shown by the experimental findings. This method works especially well for applications like digital forensics, medical imaging, and secure communications that need to hide data securely and reversibly.
Index Terms:-
Image encryption; Recovery of Photograph; Reversible data hiding
REFERENCES
  1. C.-Y. Weng and C.-H. Yang, “Reversible data hiding in encrypted image using multiple data-hiders sharing algorithm,” Entropy, vol. 25, no. 2, p. 209, 2023.

  2. W. Zhang, K. Ma, and N. Yu, “Reversibility improved data hiding in encrypted images,” Signal Processing, vol. 94, pp. 118–127, 2014.

  3. W. Puech, M. Chaumont, and O. Strauss, “A reversible data hiding method for encrypted images,” in Security, forensics, steganography, and watermarking of multimedia contents X, 2008, vol. 6819, pp. 534–542.

  4. Y. Qiu, Q. Ying, X. Lin, Y. Zhang, and Z. Qian, “Reversible data hiding in encrypted images with dual data embedding,” IEEE Access, vol. 8, pp. 23209–23220, 2020.

  5. Z. Fu, X. Chai, Z. Tang, X. He, Z. Gan, and G. Cao, “Adaptive embedding combining LBE and IBBE for high-capacity reversible data hiding in encrypted images,” Signal Processing, vol. 216, p. 109299, 2024.

  6. Q. Feng, L. Leng, C.-C. Chang, J.-H. Horng, and M. Wu, “Reversible data hiding in encrypted images with extended parametric binary tree labeling,” Applied Sciences, vol. 13, no. 4, p. 2458, 2023.

  7. C. Yu, X. Zhang, X. Zhang, G. Li, and Z. Tang, “Reversible data hiding with hierarchical embedding for encrypted images,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 32, no. 2, pp. 451–466, 2021.

  8. P. Puteaux and W. Puech, “A recursive reversible data hiding in encrypted images method with a very high payload,” IEEE Transactions on Multimedia, vol. 23, pp. 636–650, 2020.

  9. Q.-H. Le, N.-H. Nguyen, and V.-A. Pham, “High-performance RDH in encrypted images using optimal linear predictor and bit-plane compression of sub-images,” Multimedia Tools and Applications, pp. 1–36, 2024.

  10. W. Zhang, H. Wang, D. Hou, and N. Yu, “Reversible data hiding in encrypted images by reversible image transformation,” IEEE Transactions on multimedia, vol. 18, no. 8, pp. 1469–1479, 2016.

  11. K. Ma, W. Zhang, X. Zhao, N. Yu, and F. Li, “Reversible data hiding in encrypted images by reserving room before encryption,” IEEE Transactions on information forensics and security, vol. 8, no. 3, pp. 553–562, 2013.

  12. W. Hong, T.-S. Chen, and H.-Y. Wu, “An improved reversible data hiding in encrypted images using side match,” IEEE signal processing letters, vol. 19, no. 4, pp. 199–202, 2012.

  13. M. Li, D. Xiao, A. Kulsoom, and Y. Zhang, “Improved reversible data hiding for encrypted images using full embedding strategy,” Electronics Letters, vol. 51, no. 9, pp. 690–691, 2015.

  14. Z. Qian and X. Zhang, “Reversible Data Hiding in Encrypted Images With Distributed Source Encoding,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 26, no. 4, pp. 636–646, 2016.

  15. Davis S Cherian “Image Caption Generator Using CNN and LSTM”, International Journal of Computational and Electronic Aspects in Engineering, RAME Publishers, vol. 3, Issue 2, pp. 26-31, 2022.

  16. Arya Ravindran, Anand Lokapure, Dr. Aisha Fernandes “A Survey on Underwater Image Processing Techniques ”, International Journal of Computational and Electronic Aspects in Engineering, RAME Publishers, vol. 3, Issue 2, pp. 18-25, 2022.

  17. Shital B. Tiwaskar and Gajendra Singh Chandel, “Enhancing Reversible Data Hiding Technique in Encrypted Images”, International Journal of Computational and Electronics Aspects in Engineering, RAME Publishers, vol. 1, issue 1, pp. 5-10, 2014, Revised in 2020.

  18. Faris Sattar Hadi “Image Compression Process Using Fractional Fourier Transform and Wavelets Techniques”, International Journal of Computational and Electronic Aspects in Engineering, RAME Publishers, vol. 5, Issue 1, pp. 25-29, 2024.

  19. Mohammed Fareed Mahdi “The Role of IT in Transforming Traditional Education to Digital Learning”, International Journal of Computational and Electronic Aspects in Engineering, RAME Publishers, vol. 4, Issue 4, pp. 134-147, 2023.

  20. To view full paper, Download here


Publishing with