CFP last date
22 April 2024
Reseach Article

A Secure Method for Data Hiding in Encrypted Image using Progressive Recovery

by Bhakti Narayan Patil, Sanyukta Bhaskar Patil, Mansi Kailash Patil, Neha Mahyavanshi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 161 - Number 13
Year of Publication: 2017
Authors: Bhakti Narayan Patil, Sanyukta Bhaskar Patil, Mansi Kailash Patil, Neha Mahyavanshi
10.5120/ijca2017913409

Bhakti Narayan Patil, Sanyukta Bhaskar Patil, Mansi Kailash Patil, Neha Mahyavanshi . A Secure Method for Data Hiding in Encrypted Image using Progressive Recovery. International Journal of Computer Applications. 161, 13 ( Mar 2017), 1-5. DOI=10.5120/ijca2017913409

@article{ 10.5120/ijca2017913409,
author = { Bhakti Narayan Patil, Sanyukta Bhaskar Patil, Mansi Kailash Patil, Neha Mahyavanshi },
title = { A Secure Method for Data Hiding in Encrypted Image using Progressive Recovery },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2017 },
volume = { 161 },
number = { 13 },
month = { Mar },
year = { 2017 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume161/number13/27327-2017913409/ },
doi = { 10.5120/ijca2017913409 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:07:22.020268+05:30
%A Bhakti Narayan Patil
%A Sanyukta Bhaskar Patil
%A Mansi Kailash Patil
%A Neha Mahyavanshi
%T A Secure Method for Data Hiding in Encrypted Image using Progressive Recovery
%J International Journal of Computer Applications
%@ 0975-8887
%V 161
%N 13
%P 1-5
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The existing paper explains reversible data hiding in encrypted images based on progressive recovery. Image processing is a method to convert an image into digital form and perform some operations on it, in order to yield an enhanced image or to extract some essential information from it. Three parties are involved in the framework, including the content owner, the data-hider, and the recipient. The owner encrypts the original image using an algorithm i.e. stream cipher . The method proposes stream cipher algorithm such as the AES (Advanced Encryption Standard)and uploads cipher text to the server. The data-hider on the server divides the encrypted image into three channels and respectively insert different amount of additional bits into each channel to generate a marked encrypted image. On the recipient side, additional message can be extracted from the marked encrypted image, and error free image can be recovered. Reversible data hiding is a technique used to recover original content it can be perfectly restored after extraction of the hidden message.

References
  1. N. F. Johnson and S. Jajodia, “Exploring steganography: theunseen,” Computer, vol. 31, no. 2, pp. 26-34, 1998.
  2. N. Provos and P. Honeyman, “Hide and seek: an introduction tosteganography,” Security & Privacy, IEEE, vol. 1, no. 3, pp. 32-44, 2003.
  3. F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding-a survey,” Proceedings of the IEEE, vol. 87, no. 7, pp. 1062- 1078, 1999
  4. H. Otori and S. Kuriyama, “Data-embeddable texture synthesis,” in Proc. of the 8th International Symposium on Smart Graphics, Kyoto, Japan,
  5. H. Otori and S. Kuriyama, “Texture synthesis for mobile data communications,” IEEE Comput.Graph. Appl., vol. 29, no. 6, pp. 74- 81
  6. A. Efros and T. K. Leung, “Texture synthesis by non-parametric sampling”, in Proceedings of 7th IEEE International Conference on Computer Vision, pp. 1033–1038, Sep. 1999.
  7. Efros and T. K. Leung, “Texture synthesis by non- parametric sampling”, in Proceedings of 7th IEEE International Conference on Computer Vision, pp. 1033– 1038, Sep. 1999.
  8. L. Liang, C. Liu, Y.-Q.Xu, B. Guo, and H.-Y. Shum, “Real-time texture synthesis by patch-based sampling”, ACM Transactions on Graph Theory, vol. 20, no. 3, pp. 127–150, May 2001.
  9. Efros and W. T. Freeman, “Image quilting for texture synthesis and transfer”, in Proceedings of 28th Annual Conference on Computer Graph. Interaction Technology, pp. 341–346, Sep. 2011.
  10. Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEETrans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354- 362, 2006.
  11. C. W. Honsinger, P. Jones, M. Rabbani, and J. C. Stoffel, “Lossless Recovery of an Original Image Containing Embedded Data,” U.S. Patent 6 278 791 B1, Aug. 21, 2001
  12. Zhicheng Ni, Yun-Qing Shi, Nirwan Ansari, and Wei Su , Reversible Data Hiding , IEEE Transactions On Circuits And Systems For Video Technology, Vol. 16, No. 3, March 2006
  13. Chuan Qin , Chin-ChenChang , Yen-ChangChen , Efficient reversible datahiding for VQ-compressed images based on index mapping mechanism , Signal Processing 2687–2695 , 2013.
  14. N.M. Nasrabadi,R.King,Image coding using vector quantization a review,IEEETransactionsonCommunications 36 957–971 , 1988.
  15. C.C. Chang,W.C.Wu,Fast planar-oriented ripple search algorithm for hyperspace VQ codebook,IEEE Transactionson Image Processing 16(6) 1538–1547 ,2007.
  16. Qin, Chuan, Chin-Chen Chang, and Yen-Chang Chen. "Efficient reversible data hiding for VQ-compressed images based on index mapping mechanism", Signal Processing, 2013.
  17. Wien Hong ,Tung-ShouChen , Mei-ChenWua , An improved human visual system based reversible data hiding method using adaptive histogram modification ,Optics Communications 291 87–97 , 2013
  18. Hong, Wien, Tung-Shou Chen, and Mei-Chen Wu. "An improved human visual system based reversible data hiding method using adaptive histogram modification", Optics Communications, 2013.
  19. FeiPeng, XiaolongLi, BinYang, Adaptive reversible data hiding scheme based on integer transform. Signal Processing (2012) 54–62.
Index Terms

Computer Science
Information Sciences

Keywords

Encryption Decryption Reversible Data hiding scrambling intrascrambling AES algorithm