Study of Reversible Data Hiding in Encrypted Images

  • Authors

    • Pornima Suryawanshi
    • Vanita Mane
    • Puja Padiya
    2018-12-19
    https://doi.org/10.14419/ijet.v7i4.41.24295
  • Data Extraction, Image Encryption, Image Recovery, Reversible Data Hiding, , SVM
  • In our daily life we outsource the multimedia files such as images, videos etc. to the cloud server.  So this data need to be stored securely. This security is obtained by using different encryption techniques. The study shows that Reserving Room Before Encryption is much better than the Vacating Room After Encryption. Because Reserving Room Before Encryption gives the better image quality and large payload capacity than Vacating Room After Encryption. But RRBE is having some security isues which is limitation of this method. To overcome this problem Reversible Image Transformation (RIT) based framework is used which is client free framework. In this framework the encrypted image is stored in the form of plaintext.  So it will avoid the attention of curious cloud. This paper focuses on different RDH methods.

     

     

     
  • References

    1. [1] http://fourier.eng.hmc.edu/e161/lectures/e161ch1.pdf.

      [2] Shilpa Sreekumar, Vincy Salam, Advanced Reversible Data Hiding With Encrypted Data, International Journal of Engineering Trends and Technology (IJETT) Volume 13 Number 7 Jul 2014.

      [3] https://www.mepits.com/project/337/Project-Ideas/Unified-Data-Embedding-and-Scrambling-Scheme:–Matlab-based-project

      [4] http://what-when-how.com/introduction-to-video-and-imageprocessing/point-processing-introduction-to-video-and-imageprocessing- part-4/

      [5] V. Sachnev, H. J. Kim, J. Nam, S. Suresh, and Y. Q. Shi, Reversible watermarking algorithm using sorting and prediction, IEEE Trans. on Circuits and Systems for Video Technology, vol.19, no.7, pp. 989- 999, Jul. 2009.

      [6] B.ou, X. Li, Y. Zhao, R. Ni, Y. Shi, Pairwise prediction-error

      expansion for efficient reversible data hiding, IEEE Trans. on Image Processing, vol. 22, no.12, pp. 5010-5021, Dec. 2013.

      [7] Ioan-Catalin Dragoi, Dinu Coltuc, Local-prediction-based difference expansion reversible watermarking, IEEE Trans. on Image Processing, vol. 23, no. 4, pp. 1779-1790, Apr. 2014.

      [8] Z. Ni, Y. Shi, N. Ansari, and S. Wei, Reversible data hiding, IEEE Trans. on Circuits and Systems for Video Technology, vol. 16, no. 3, pp. 354-362, Mar. 2006.

      [9] J. Tian, Reversible data embedding using a difference expansion, IEEE Trans. on Circuits and Systems for Video Technology, vol. 13, no.8, pp. 890-896, Aug. 2003.

      [10] X. Hu, W. Zhang, X. Li, N. Yu, Minimum rate prediction and optimized histograms modification for reversible data hiding, IEEE Trans. on Information Forensics and Security, vol. 10, no. 3, 653- 664, Mar. 2015.

      [11] X. Hu, W. Zhang, X. Hu, N. Yu, X. Zhao, F. Li, Fast estimation of optimal marked-signal distribution for reversible data hiding, IEEE Trans. on Information Forensics and Security, vol. 8, no. 5, pp. 779-788, May. 2013.

      [12] W. Zhang, X. Hu, N. Yu, Optimal transition probability of reversible data hiding for general distortion metrics and its applications, IEEE Trans. on Image Processing, vol. 24, no. 1, pp. 294-304, Jan. 2015.

      [13] K. Ma, W. Zhang, X. Zhao, N. Yu, F. Li, Reversible data hiding in encrypted images by reserving room before encryption, IEEE Trans. on Information Forensics and Security, vol. 8, no. 3, pp. 553-562, Mar. 2013.

      [14] M. Johnson, P. Ishwar, V. M. Prabhakaran, D. Schonberg, and K. Ramchandran, On compressing encrypted data, IEEE Trans. On Signal Processing, vol. 52, no. 10, pp. 2992-3006, Oct. 2004.

      [15] W. Liu, W. Zeng, L. Dong, and Q. Yao, Efficient compression of encrypted grayscale images, IEEE Trans. on Image Processing, vol. 19, no. 4, pp. 1097-1102, Apr. 2010.

      [16] X. Zhang, Reversible data hiding in encrypted images, IEEE Signal Processing Letters, vol. 18, no. 4, pp. 255-258, Apr. 2011.

      [17] W. Hong, T. Chen, H. Wu, An improved reversible data hiding in encrypted images using side match, IEEE Signal Processing Letters, vol. 19, no. 4, pp. 199-202, Apr. 2012.

      [18] J. Zhou, W. Sun, L. Dong, et al., Secure reversible image data hiding over encrypted domain via key modulation, IEEE Trans. on Circuits and Systems for Video Technology, vol. 26, no. 3, pp. 441-452, Mar. 2016.

      [19] X. Zhang, Separable reversible data hiding in encrypted image, IEEE Trans. on Information Forensics and Security, vol. 7, no. 2, pp. 826-832, Apr. 2012.

      [20] Z. Qian, and X. Zhang, Reversible data hiding in encrypted image with distributed source encoding, IEEE Trans. on Circuits and Systems for Video Technology, vol. 26, no. 4, pp. 636-646, Apr. 2016.

      [21] W. Zhang, K. Ma and N. Yu, Reversibility improved data hiding in encrypted images, Signal Processing, vol. 94, pp. 118-127, Jan. 2014.

      [22] X. Cao, L. Du, X. Wei, et al., High capacity reversible data hiding in encrypted images by patch-level sparse representation, IEEE Trans. on Cybernetics, vol. 46, no. 5, pp. 1132-1143, May. 2016.

      [23] Weiming Zhang, Hui Wang, Dongdong Hou, Nenghai Yu et al., Reversible Data Hiding in Encrypted Images by Reversible Image Transformation, IEEE Trans. on Multimedia, 2016.

      [24] B.ou, X. Li, Y. Zhao, R. Ni, Y. Shi, Pairwise prediction-error expansion for efficient reversible data hiding, IEEE Trans. on Image Processing, vol. 22, no.12, pp. 5010-5021, Dec. 2013.

      [25] Y. Lee and W. Tsai,A new secure image transmission technique via secret-fragment-visible mosaic images by nearly reversible color transformation, IEEE Trans. on Circuits and Systems for Video

  • Downloads

  • How to Cite

    Suryawanshi, P., Mane, V., & Padiya, P. (2018). Study of Reversible Data Hiding in Encrypted Images. International Journal of Engineering & Technology, 7(4.41), 42-46. https://doi.org/10.14419/ijet.v7i4.41.24295