CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Survey on Separable Reversible Data Hiding in Encrypted Images

Published on February 2015 by Mithu Varghese, Teenu S Jhon
Advanced Computing and Communication Techniques for High Performance Applications
Foundation of Computer Science USA
ICACCTHPA2014 - Number 1
February 2015
Authors: Mithu Varghese, Teenu S Jhon
79d37c3c-8521-4162-82ab-d29928379292

Mithu Varghese, Teenu S Jhon . A Survey on Separable Reversible Data Hiding in Encrypted Images. Advanced Computing and Communication Techniques for High Performance Applications. ICACCTHPA2014, 1 (February 2015), 30-34.

@article{
author = { Mithu Varghese, Teenu S Jhon },
title = { A Survey on Separable Reversible Data Hiding in Encrypted Images },
journal = { Advanced Computing and Communication Techniques for High Performance Applications },
issue_date = { February 2015 },
volume = { ICACCTHPA2014 },
number = { 1 },
month = { February },
year = { 2015 },
issn = 0975-8887,
pages = { 30-34 },
numpages = 5,
url = { /proceedings/icaccthpa2014/number1/19433-6009/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Advanced Computing and Communication Techniques for High Performance Applications
%A Mithu Varghese
%A Teenu S Jhon
%T A Survey on Separable Reversible Data Hiding in Encrypted Images
%J Advanced Computing and Communication Techniques for High Performance Applications
%@ 0975-8887
%V ICACCTHPA2014
%N 1
%P 30-34
%D 2015
%I International Journal of Computer Applications
Abstract

Data security and data integrity are the two challenging areas for research. So many research is progressing on the field like internet security. The requirement of secure transmission of data is important in our life. The transmission should be more secure when channel/network is too noisy/fraudulent. Image transmission is one of the application that must be securely transmitted over the fraudulence network. Secure transmission of image is required in various fields like medical/telemedicine, military etc. When it is desired to send the confidential important secure data over an insecure and bandwidth-constrained channel it is customary to encrypt as well as compress the cover data and then embed the confidential/important/secure data into that cover data. For achieving this facility there are various data hiding techniques, compression techniques, encryption/ decryption techniques available. Here is a review on different data hiding techniques in encrypted image.

References
  1. J. Tian,(2003) "Reversible data embedding using a difference expansion", IEEE Trans. Circuits Syst. Video Technol, vol. 13, no. 8, pp. 890-896.
  2. Sergio vicente d. pamboukian1 and hae yong kim,(2011) "reversible data hiding and reversible authentication watermarking for binary images"
  3. Zhenfei Zhao (2011), Reversible data hiding based on multilevel histogram modification and sequential recovery," Int. J. Electron. Commun. (AEÜ) 65 814– 826
  4. Zhicheng Ni Yun-Qing Shi, Nirwan Ansari, and Wei Su (2011) , "Reversible data hiding," IEEE Trans. Circuits Syst. Video Technol, vol. 16, no. 3, Mar 2006,pp. 354-362.
  5. Chia-Chen Lin, Pei-Feng Shiu, "DCT-based Reversible Data Hiding Scheme" , JOURNAL OF SOFTWARE, VOL. 5, NO. 2, FEBRUARY 2010
  6. Ching-Yu Yanga,Wu-Chih Hua and Chih-Hung Lin, "Reversible Data Hiding by Coe?cient-bias Algorithm", Journal of Information Hiding and Multimedia Signal Processing, Volume 1, Number 2, April 2010.
  7. X. Zhang,(2011) "Reversible data hiding in encrypted image," IEEE Signal Process. Lett. , vol. 18, no. 4, pp. 255–258.
  8. Xinpeng Zhang, (2013) "Separable Reversible Data Hiding in Encrypted Imag", IEEE transactions on information forensics and security, vol. 7, NO. 2, APRIL 2012.
  9. T. Bianchi, A . Piva and M Barni "On the implementation of the discrete Fourier transform in the encrypted domain"IEEE Trans. Inform Forensics security,vol. 4,no 1,pp,86-97,feb. 2009
  10. Vinit Agham and Tareek Pattewar, A Survey on Separable Reversible Data Hiding techniques", IMACST: VOLUME 4 NUMBER 1 MAY 2013
  11. M. Deng, T. Bianchi, A. Piva, and B. Preneel, "An efficient buyer-seller watermarking protocol based on composite signal representation," inProc. 11th ACM Workshop Multimedia and Security, 2009, pp. 9–18.
  12. S. Lian, Z. Liu, Z. Ren, and H. Wang, "Commutative encryption andwatermarking in video compression," IEEE Trans. Circuits Syst. VideoTechnol. , vol. 17, no. 6, pp. 774–778, Jun. 2007.
  13. M. Cancellaro, F. Battisti, M. Carli, G. Boato, F. G. B. Natale, andA. Neri, "A commutative digital image watermarking and encryptionmethod in the tree structured Haar transform domain," Signal Processing:Image Commun. , vol. 26, no. 1, pp. 1–12, 2011.
  14. D. Kundur and K. Karthik, "Video fingerprinting and en4ryption principlesfor digital rights management," Proceedings IEEE, vol. 92, no. 6, pp. 918–932, Jun. 2004.
  15. X. Zhang, "Reversible data hiding in encrypted image," IEEE SignalProcess. Lett. , vol. 18, no. 4, pp. 255–258, Apr. 2011.
  16. J. Tian, "Reversible data embedding using a difference expansion,"IEEE Trans. Circuits Syst. Video Technol. , vol. 13, no. 8, pp. 890–896,Aug. 2003.
  17. Z. Ni, Y. -Q. Shi, N. Ansari, and W. Su, "Reversible data hiding," IEEETrans. Circuits Syst. Video Technol. , vol. 16, no. 3, pp. 354–362, Mar. 2006.
  18. M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, "Lossless generalized-LSB data embedding," IEEE Trans. Image Process. , vol. 14, no. 2, pp. 253–266, Feb. 2005.
  19. W. Hong, T. -S. Chen, Y. -P. Chang, and C. -W. Shiu, "A high capacityreversible data hiding scheme using orthogonal projection and predictionerror modification," Signal Process. , vol. 90, pp. 2911–2922, 2010.
  20. C. -C. Chang, C. -C. Lin, and Y. -H. Chen, "Reversible data-embeddingscheme using differences between original and predicted pixel values,"IET Inform. Security, vol. 2, no. 2, pp. 35–46, 2008.
  21. A. Mayache, T. Eude, and H. Cherifi, "A comparison of image qualitymodels and metrics based on human visual sensitivity," in Proc. Int. Conf. Image Processing (ICIP'98), Chicago, IL, 1998, vol. 3, pp. 409–413.
  22. Z. Wang and A. C. Bovik, "A universal image quality index," IEEESignal Process. Lett. , vol. 9, no. 1, pp. 81–84, Jan. 2002.
Index Terms

Computer Science
Information Sciences

Keywords

Digital Images Reversible Data Hiding Separable Reversible Data Hiding.