CFP last date
20 May 2024
Reseach Article

Encrypted Reversible Data Hiding on Compressed Image

by Akshay Jain, Dipak Pawar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 69 - Number 25
Year of Publication: 2013
Authors: Akshay Jain, Dipak Pawar
10.5120/12124-8176

Akshay Jain, Dipak Pawar . Encrypted Reversible Data Hiding on Compressed Image. International Journal of Computer Applications. 69, 25 ( May 2013), 1-5. DOI=10.5120/12124-8176

@article{ 10.5120/12124-8176,
author = { Akshay Jain, Dipak Pawar },
title = { Encrypted Reversible Data Hiding on Compressed Image },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 69 },
number = { 25 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume69/number25/12124-8176/ },
doi = { 10.5120/12124-8176 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:31:14.933838+05:30
%A Akshay Jain
%A Dipak Pawar
%T Encrypted Reversible Data Hiding on Compressed Image
%J International Journal of Computer Applications
%@ 0975-8887
%V 69
%N 25
%P 1-5
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The paper presents a new approach in Image steganography. Information security is the important research field. Steganography process hides message into cover file and forms a stego file. In image steganography there is a need of method which will increase the security, reduce the distortion in the stego file and recovers the data without any loss. In the era of multimedia and internet there is need of reducing time for transmission. The proposed approach is combination of compression, data hiding technique and encryption. To make the transmission and storage of digital data faster, lossy compression is used. On the compressed image data hiding is done. The stego image is encrypted using AES to ensure user authentication. If the receiver has encryption key and data hiding key then only he can obtain the secret message. Nodes are selected randomly in data hiding stage. On the randomly selected nodes lossless LSB steganography is used.

References
  1. Abbas cheddad, "Digital image steganography : Survey analysis and current methods", signal processing 90 (2010) 727-752
  2. Babloo Saha and Shuchi Sharma, "Steganographic Techniques of Data Hiding using Digital Images", Defence Science Journal, Vol. 62, No. 1, January 2012,pp. 11-18
  3. Suryendra Kumar, "Image compression techniques for medical images: a review", IJREAS, Volume 2,Issue 2,February 2012
  4. Shaveta chutani, Himani Goyal, "LSB embedding in spatial domain –A review of improved techniques", International Journal of Computers & Technology Volume 3, No. 1, Aug 2012
  5. Chi-Kwong Chan, L. M. Cheng, "Hiding Data in images by LSB substitution", Department of Computer Engineering and Information Technology, City University of Hong kong, 11 august 2003
  6. Da-Chun Wu, "A Steganographic method for images by pixel-value differencing", Pattern Recognition Letters, December 2002
  7. H. B. Kekre, Archana Athawale, Pallavi N. Halarnkar, "Performance Evaluation of Pixel Value Differencing and Kekre's Modified Algorithm for Information Hiding in Images", International Conference on Advances in Computing, Communication and Control, pp 342-346, 2009
  8. Ling Xi, Xijian Ping, Tao Zhang, "Improved LSB Matching Steganography Resisting Histogram Attacks",IEEE,2010
  9. Hengfu Yang, Et Al. , "A High-Capacity Image Data hiding Scheme Using Adaptive LSB Substitution", Radio Engineering, Vol. 18, No 4, December 2009
  10. Abhinav Srivastava, "A Survey Report On Different Techniques Of Image Encryption", International Journal Of Emerging Technology And Advanced Engineering, 2012
  11. G. H. Karimian, B. Rashidi, and A. farmani, "A High Speed and Low Power Image Encryption with 128-Bit AES Algorithm", International Journal of Computer and Electrical Engineering, Vol. 4, No. 3, June 2012
  12. Linde, Y. , Buzo, A. , Gray R. M. , "An algorithm for vector quantizer design ",IEEE Transactions on Communications COM-28, 84–95 (1980)
  13. N. M. Nasrabadi and R. A. King, "Image coding using vector quantization: A review", IEEE Transactions on Communications, vol. 36, pp. 84-95, 1980.
  14. Gray, R. M. ,"Vector quantization", IEEE ASSP Magazine, pp. 4–29, (1984)
  15. Bang Huang," An Improved LBG Algorithm for Image Vector Quantization", IEEE, 2010
  16. Xinpeng Zhang, "Reversible data hiding in encrypted image", IEEE Signal processing letters, Vol. 18, No. 4, April 2011
  17. Morteza Bashardoost, "Enhanced LSB image Steganography method by using knight Tour algorithm, Vigenere Encryption and LZW compression", IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 2, No 1, March 2013
Index Terms

Computer Science
Information Sciences

Keywords

Vector quantization Reversible data hiding Encryption