International Journal of Engineering
Trends and Technology

Research Article | Open Access | Download PDF

Volume 13 | Number 3 | Year 2014 | Article Id. IJETT-V13P262 | DOI : https://doi.org/10.14445/22315381/IJETT-V13P262

Advanced Reversible Data Hiding With Encrypted Data


Shilpa Sreekumar , Vincy Salam

Citation :

Shilpa Sreekumar , Vincy Salam, "Advanced Reversible Data Hiding With Encrypted Data," International Journal of Engineering Trends and Technology (IJETT), vol. 13, no. 3, pp. 310-313, 2014. Crossref, https://doi.org/10.14445/22315381/IJETT-V13P262

Abstract

The advanced RDH work focuses on both data encryption and image encryption which makes it more secure and free of errors. All previous methods embed data without encrypting the data which may subject to errors on the data extraction or image recovery. The proposed work provides a novel RDH scheme in which both data and image can be encrypted and extracted reversibly without any errors. In the proposed work, data extraction and image recovery are free of any errors. The PSNR is significantly improved in the proposed work. This advanced work also performs data hiding in videos.


Keywords

AES algorithm, Blowfish algorithm, Data embedding

References

[1] Kede Ma, Weiming Zhang, Xianfeng Zhao, Member, IEEE, NenghaiYu, and Fenghua Li"Reversible Data Hiding in Encrypted Images byReserving Room Before Encryption" ieee transactions on information forensics and security, vol. 8, no. 3, march 2013.
[2] M. Goljan, J. Fridrich, and R. Du, “Distortion-free data embedding,” in Proc. 4th Int. Workshop on Information Hiding, Lecture Notes in Computer Science, 2001, vol. 2137, pp. 27–41.
[3] M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, “Lossless generalized- LSB data embedding,” IEEE Trans. Image Process., vol. 14, no. 2, pp. 253–266, Feb. 2005.
[4] J. Fridrich, M. Goljan, and R. Du, “Lossless data embedding for all image formats,” in Proc. Security and Watermarking of Multimedia Contents IV, Proc. SPIE, 2002, vol. 4675, pp. 572–583.
[5] J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896, Aug. 2003
[6] A. M. Alattar, “Reversible watermark using the difference expansion of a generalized integer transform,” IEEE Trans. Image Process., vol. 13, no. 8, pp. 1147–1156, Aug. 2004.
[7] Ratinder Kaur, V. K. Banga "Image Security using Encryption based Algorithm" International Conference on Trends in Electrical, ElectronicsandPowerEngineering (ICTEEP`2012) July 15-16, 2012 Singapore.
[8] Pia Singh Prof. Karamjeet Singh "Image encryption and decryption using blowfish algorithm in matlab" International Journal of Scientific & Engineering Research, Volume 4,Issue 7, July- 2013 150 ISSN 2229-5518.
[9] Prachi V. Powar , Prof. S.S.Agrawal "Design of digital video watermarking scheme using matlab simulink"PRACHI V POWAR* et al ISSN: 2319 1163 Volume: 2 Issue: 5 826 - 830 IJRET, MAY 2013.


Time: 0.0013 sec Memory: 32 KB
Current: 1.87 MB
Peak: 4 MB