Call for Paper - November 2022 Edition
IJCA solicits original research papers for the November 2022 Edition. Last date of manuscript submission is October 20, 2022. Read More

Result Analysis of Reversible Data Hiding in Encrypted JPEG Bitstream

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Authors:
Pooja Dwivedi, Sonulal, Deepak Mishra
10.5120/ijca2017912858

Pooja Dwivedi, Sonulal and Deepak Mishra. Result Analysis of Reversible Data Hiding in Encrypted JPEG Bitstream. International Journal of Computer Applications 158(10):18-21, January 2017. BibTeX

@article{10.5120/ijca2017912858,
	author = {Pooja Dwivedi and Sonulal and Deepak Mishra},
	title = {Result Analysis of Reversible Data Hiding in Encrypted JPEG Bitstream},
	journal = {International Journal of Computer Applications},
	issue_date = {January 2017},
	volume = {158},
	number = {10},
	month = {Jan},
	year = {2017},
	issn = {0975-8887},
	pages = {18-21},
	numpages = {4},
	url = {http://www.ijcaonline.org/archives/volume158/number10/26942-2017912858},
	doi = {10.5120/ijca2017912858},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

In this paper to identify usable bits suitable for data hiding so that the encrypted bit stream carrying secret data can be right decoded. The secret message bits area unit encoded with error correction codes to achieve a perfect data extraction and image improvement. the propose technique aims at encrypting a IMAGE bit stream into a appropriately prepared structure, and embed a secret message into the encrypted bit stream by slightly modifying the IMAGE stream. In this paper result analysis of reversible data hiding method.

References

  1. Hao-Tian Wu, Jean-Luc Dugelay and Yun-Qing Shi, \“Reversible Image Data Hiding with Contrast Enhancement”, IEEE Signal Pro. Letters, vol. 22, no. 1, pp. 81-85 Jan. 2015
  2. Xinpeng Zhang, “Reversible Data Hiding in Encrypted Image”, IEEE Signal Pro. Letters, vol. 18, no. 4, pp. 255-258 April 2011.
  3. Wei-Liang Tai, Chia-Ming Yeh, and Chin-Chen Chang, “Reversible Data Hiding Based on Histogram Modification of Pixel Differences”, IEEE Trans. on Circuits and Systems for Video Techno., vol. 19, no. 6,pp. 906-910 June 2009.
  4. Mehmet U. Celik, Gaurav Sharma, A. Murat Tekalp and Eli Saber, “Reversible DATA Hiding” IEEE ICIP pp. 157-160. 2002.
  5. Chia-Chen Lina, Wei-Liang Tai and Chin-Chen Chang “Multilevel reversible data hiding based on histogram modification of difference images” Pattern Recognition 41 pp. 3582 -- 3591 2008.
  6. Z. Ni, Y. Shi, and N. Ansari et al., “Reversible data hiding,” IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354–362, Mar.2006.
  7. D. M. Thodi and J. J. Rodriguez, “Expansion embedding techniques for reversible watermarking,” IEEE Trans. Image Process., vol. 16, no. 3, pp. 721–730, Mar. 2007.
  8. L. Luo et al., “Reversible image watermarking using interpolation technique,” IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 187–193,Mar. 2010.
  9. X. L. Li, B. Yang, and T. Y. Zeng, “Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection,” IEEE Trans. Image Process., vol. 20, no. 12, pp. 3524–3533, Dec.2011.
  10. X. Zhang, “Reversible data hiding with optimal value transfer,” IEEE Trans. Multimedia, vol. 15, no. 2, pp. 316–325, 2013.
  11. W. Zhang, B. Chen, and N. Yu, “Improving various reversible data hiding schemes via optimal codes for binary covers,” IEEE Trans. Image Process., vol. 21, no. 6, pp. 2991–3003, Jun. 2012.
  12. N. Memon and P. W. Wong, “A buyer-seller watermarking protocol,” IEEE Trans. Image Process., vol. 10, no. 4, pp. 643–649, Apr. 2001.
  13. M. Deng, T. Bianchi, A. Piva, and B. Preneel, “An efficient buyer-seller watermarking protocol based on composite signal representation,” in Proc. 11th ACM Workshop Multimedia and Security, 2009, pp. 9–18.
  14. S. Lian, Z. Liu, Z. Ren, and H. Wang, “Commutative encryption and watermarking in video compression,” IEEE Trans. Circuits Syst. Video Technol., vol. 17, no. 6, pp. 774–778, Jun. 2007.
  15. X. Zhang, “Reversible data hiding in encrypted images,” IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255–258, Apr. 2011.

Keywords

Encrypted image, image recovery, information hiding, JPEG, reversible data hiding

Learn about the IJCA article correction policy and process
Dealing with any form of infringement.
‘Peer Review – A Critical Inquiry’ by David Shatz
Directly place requests for print/ hard copies of IJCA via Google Docs