CFP last date
20 May 2024
Reseach Article

Hiding Data into Reserve Space before Image Encryption using Blowfish Algorithm

by Pradnya P. Mandlik, Samruddhi S. Mhatre, Samiksha M. Niwal, Priti Mithari
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 140 - Number 10
Year of Publication: 2016
Authors: Pradnya P. Mandlik, Samruddhi S. Mhatre, Samiksha M. Niwal, Priti Mithari
10.5120/ijca2016909474

Pradnya P. Mandlik, Samruddhi S. Mhatre, Samiksha M. Niwal, Priti Mithari . Hiding Data into Reserve Space before Image Encryption using Blowfish Algorithm. International Journal of Computer Applications. 140, 10 ( April 2016), 34-38. DOI=10.5120/ijca2016909474

@article{ 10.5120/ijca2016909474,
author = { Pradnya P. Mandlik, Samruddhi S. Mhatre, Samiksha M. Niwal, Priti Mithari },
title = { Hiding Data into Reserve Space before Image Encryption using Blowfish Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { April 2016 },
volume = { 140 },
number = { 10 },
month = { April },
year = { 2016 },
issn = { 0975-8887 },
pages = { 34-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume140/number10/24633-2016909474/ },
doi = { 10.5120/ijca2016909474 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:41:58.020458+05:30
%A Pradnya P. Mandlik
%A Samruddhi S. Mhatre
%A Samiksha M. Niwal
%A Priti Mithari
%T Hiding Data into Reserve Space before Image Encryption using Blowfish Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 140
%N 10
%P 34-38
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Nowadays, with the fast development of information technology more images and data are available on the internet. Hence there is a need to have some kind of authentication to that datawith increase in technology. This paper is about encryption and decryption of images using a private-key block cipher called 64-bits. Blowfish designed to increase security and to improve performance. This algorithm will be used as a variable key size up to 448 bits. The reversible data hiding (RDH) in encrypted images, is most powerful technology than others. Reversible Data Hiding (RDH) maintains the tremendous property that is the original content can be losslessly recover after embedding data. Reversible Data hiding phenomena is defined as a scheme that allows complete and visionless restoration of the original host data. All existing method of embedded data by reversible vacating room from the encrypted images which may have some faults on the data extraction or image restorations. The reversible data hiding is also known as the new watermarking technique which is used to derive an image by embedding some data on it as a watermark. A novel method is proposed by reserving room for embedding data before encryption of an image takes place with the available RDH algorithm and methods. Now the authentic person can secrete the data definitely on the image to provide authentication. Reversible technique is in the sense extraction of the original input image.

References
  1. PradnyaMandlik, SamruddhiMhatre, Samiksha Niwal, “Reversible data hiding using encryption and data hiding Technique” IEEE Trans. On information forensic and security,September 2015.
  2. Kede Ma, Weiming Zhang, XeianfengZhao,”Reversible data hiding in encrypted images by reserving room before encryption” IEEE Trans. On information forensic and security,March 2013.
  3. T. Kalker and F.M.Willems, “Capacity bounds and code constructions for reversible data-hiding,” Digital Signal Processing(2002), 2002.
  4. W. Zhang, B. Chen, and N. Yu, Improving various reversible data hiding schemes via optimal codes for binary covers," IEEE Trans. Image Process, 2012.
  5. J. Fridrich and M. Goljan, “Lossless data embedding for all image formats,” in Proc. SPIE Proc. Photonics West, Electronic Imaging, Security and Watermarking of Multimedia Contents, San Jose, CA, USA, Jan. 2002, vol. 4675, pp. 572–583.
  6. W. Zhang, B. Chen, and N. Yu, Capacity-approaching codes for reversible data hiding," in Proc 13th Information Hiding (IH'2011), LNCS 6958, 2011, pp. 255-269, Springer-Verlag.
  7. L.Luoet al., “Reversible image watermarking using interpolation technique,” IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 187–193, Mar. 2010.
  8. D.M. Thodi and J. J. Rodriguez, “Expansion embedding techniques for reversible watermarking,” IEEE Trans. Image Process., vol. 16, no. 3, pp. 721–730, Mar. 2007.
  9. Xinpeng Zhang, “Reversible Data Hiding in Encrypted Image”, IEEE Signal Processing Letters, vol.18, No.4, April 2011.
  10. Z. Ni, Y. Shi, N. Ansari, and S. Wei, “Reversible data hiding,” IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354–362, Mar.2006.
  11. Xiaolong Li, Bin Yang and Tie yongZeng, “Efficient Reversible Watermarking Based on Adaptive Prediction-Error Expansion and Pixel Selection”, IEEE Transaction on Image Processing, Dec 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Block Cipher Cryptography Feistel Network Cryptography Data Hiding Steganography Watermarking.