CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

A Data Embedding Scheme using Encrypted Images

by Athira M A, Sreebala P, Vipin Krishnan C V
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 107 - Number 3
Year of Publication: 2014
Authors: Athira M A, Sreebala P, Vipin Krishnan C V

Athira M A, Sreebala P, Vipin Krishnan C V . A Data Embedding Scheme using Encrypted Images. International Journal of Computer Applications. 107, 3 ( December 2014), 24-29. DOI=10.5120/18733-9975

@article{ 10.5120/18733-9975,
author = { Athira M A, Sreebala P, Vipin Krishnan C V },
title = { A Data Embedding Scheme using Encrypted Images },
journal = { International Journal of Computer Applications },
issue_date = { December 2014 },
volume = { 107 },
number = { 3 },
month = { December },
year = { 2014 },
issn = { 0975-8887 },
pages = { 24-29 },
numpages = {9},
url = { },
doi = { 10.5120/18733-9975 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-06T22:40:06.757588+05:30
%A Athira M A
%A Sreebala P
%A Vipin Krishnan C V
%T A Data Embedding Scheme using Encrypted Images
%J International Journal of Computer Applications
%@ 0975-8887
%V 107
%N 3
%P 24-29
%D 2014
%I Foundation of Computer Science (FCS), NY, USA

The use of computer networks for data transmission has created the need of security. Transmission of images is a daily routine and it is necessary to find an efficient way to transmit them over networks. This work describes the concept of Separable Reversible data hiding technique. When it is desired to send the confidential data over an insecure channel, it mustbe encrypted as well as compress the cover data and then embed the data into that cover data. Also it is important that the data hiding should be reversible in nature, and should be suitable for the encryption/decryption domain. In the Modified System, a content owner encrypts the original uncompressed image using an encryption key to produce an encrypted image. The data hider can hide the data in the encrypted image compressing the least significant bits of the encrypted image to obtain the space to hide the data by using data hiding key. The data can be retrieved at the receiver side using the data hiding key without the need for decrypting the image. But, the encrypted image will remain unchanged till it is decrypted using the encryption key,to reveal the original image content. The receiver who has both the encryption and data hidings keys can access the data embedded as well as the original image.

  1. XinpengZhang(2011), Reversible Data Hiding in Encrypted Image, IEEE SIGNAL PROCESSING LETTERS, VOL. 18, NO. 4
  2. VinitAgham and TareekPattewar, A survey on seperable reversible data hiding technique, IMACST: VOLUME 4 NUMBER 1 MAY 2013
  3. ZaidoonKh. AL-Ani, A. A. Zaidan, B. B. Zaidan and Hamdan. O. Alanazi (2010), Overview: Main Fundamentals for Steganography, JOURNAL OF COMPUTING, VOLUME 2, ISSUE 3.
  4. Firas A. Jassim (2013), A Novel Steganography Algorithm for Hiding Text in Image using Five Modulus Method, International Journal of Computer Applications,Volume 72 No. 17
  5. Deepthi Barbara Nickolas, Sindhuja. Ba, Sivasankar. A (2013), Enhance-ment of Data Hiding Process in Encrypted Image Using Advanced Encryption Standard, International Journal of Current Engineering and Technology, Vol. 3, No. 2
  6. Majdi Al-Qdah (2013), Fast and Secure Image Hiding Scheme Based on Cryptographic Techniques, Journal of Emerging Trends in Computing and Information Sciences, Vol. 4, No. 2
  7. Vivek Jain1, Lokesh Kumar2, , Madhur Mohan Sharma3, Mohd Sadiq4, Kshitiz Rastogi5(2012), PUBLIC-KEY STEGANOGRAPHY BASED ON MODIFIED LSB METHOD, Students of CSE department, IMS Engineering College,
  8. Eugene T Lin and Edward J. delp,A Review of data hiding in dig-italimges,Video and Image processing Laboratory (VIPER) School of Electrical and computer Engineering purde university West lafayette,IndianaS
  9. Chi-Kwong Chan, L. M. Cheng(2003), Hiding data in images by simple LSB substitution, Department of Computer Engineering and Information Technology, City University of Hong Kong, Hong Kong
  10. Jun Tian(2003), Reversible Data Embedding Using a Difference Expan-sion, IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY,VOL. 13, NO. 8
  11. Aman Kumar, Dr. SudeshJakhar, Mr. Sunil Makkar (2012), International Journal of Advanced Research in Computer Science and Software Engineering,vol. 2, issue 7 .
Index Terms

Computer Science
Information Sciences


Reversible Data hiding Image Encryption Data Embedding Data hiding Data extraction Decryption