Call for Paper - July 2023 Edition
IJCA solicits original research papers for the July 2023 Edition. Last date of manuscript submission is June 20, 2023. Read More

Encryption Protected Reversible Data Hiding for Secret Communication

IJCA Proceedings on International Conference and Workshop on Emerging Trends in Technology
© 2015 by IJCA Journal
ICWET 2015 - Number 1
Year of Publication: 2015
Sanjay Sharma

Sowmyashree and Sanjay Sharma. Article: Encryption Protected Reversible Data Hiding for Secret Communication. IJCA Proceedings on International Conference and Workshop on Emerging Trends in Technology ICWET 2015(1):20-26, May 2015. Full text available. BibTeX

	author = {Sowmyashree and Sanjay Sharma},
	title = {Article: Encryption Protected Reversible Data Hiding for Secret Communication},
	journal = {IJCA Proceedings on International Conference and Workshop on Emerging Trends in Technology},
	year = {2015},
	volume = {ICWET 2015},
	number = {1},
	pages = {20-26},
	month = {May},
	note = {Full text available}


Security has become an important issue with the proliferation of digital communication. Multimedia sources such as images plays an important role in security of data communication. Data hiding technique can be used to implant secret data in host images where existence of data is undisclosed which reduces chances of unauthorized access. Some applications containing legal considerations require recovery of the cover image after extraction of secret data where reversible data hiding comes into view. Limitations of existing data hiding schemes in terms of robustness against digital attacks are major obstacles in the security of hidden data. Content protection scheme that integrates both encryption and data hiding for its protection and authentication will provide major protection against security attacks. This paper presents an efficient spatial domain reversible data hiding technique and also proposes implementation of image encryption upon reversible data hiding technique to protect the stego-image against attacks during communication. Histogram shifting based reversible data hiding technique results significant embedding capacity and achieve good reversibility property of images. Proposed approach guarantees PSNR 48db or more for most of the images like crowded, semi crowded and textured images.


  • William Ku and Chi-Hung Chi, 2004, Survey on the technological aspects of Digital Rights Management, School of Computing. National University of Singapore Science Drive 2.
  • Hafeez M. A. Malik, "Data hiding techniques for Digital rights Management of Multimedia Archives", Master Thesis, University of Illinois, Chicago, 2006
  • Z. Ni, Yun Q. Shi, N. Ansari, and W. Su, "Reversible Data Hiding," IEEE Tran. Circuits and Systems for Video Technology, vol. 16, no. 3, PP. 354-362, 2006.
  • D. R. Denslin Brabin1, Dr. J. Jebamalar Tamilselvi2," Reversible Data Hiding: A Survey, ISSN (Print) : 2320 – 9798 ISSN (Online): 2320 – 9801 International Journal of Innovative Research in Computer and Communication Engineering Vol. 1, Issue 3, 2013
  • C. W. Honsinger, P. W. Jones, M. Rabbani, and J. C. Stoffel, "Lossless recovery of an original image containing embedded data," US Pat. #6,278,791, 2001.
  • J. Fridrich, M. Goljan, and R. Du, "Lossless data embeddingnew paradigm in digital watermarking," EURASIP Journ. Appl. Sig. Proc. , vol. 2002, no. 02, pp. 185–196, 2002.
  • J. Tian, "Wavelet-based reversible watermarking for authentication," Proc. of SPIE Sec. and Watermarking of Multimedia Cont. IV, vol. 4675, no. 74, 2002.
  • Ms. G. S. Sravanthi , Mrs. B. Sunitha Devi , S. M. Riyazoddin & M. Janga Reddy, "A Spatial Domain Image Steganography Technique Based on Plane Bit Substitution Method", Global Journal of Computer Science and Technology Graphics & Vision, Volume 12 Issue 15 Version 1. 0 , Online ISSN: 0975-4172 & Print ISSN: 0975-4350, 2012
  • J. Tian , "Reversible Data Embedding Using a Difference Expansion, IEEE Tran. Circuits and Systems for Video Technology, vol. 13, issue 8, pp. 890-896. 2003
  • Chin-Chen Chang, Wei-Liang Tai and Chia-Chen Lin (2006). A Reversible Data Hiding Scheme Based On Side Match Vector Quantization, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 16, No. 10.
  • Hsien-Wen Tseng*, Chi-Pin Hsieh, "Prediction-based reversible data hiding", Information Sciences, Elsevier, ISSN: 2460–2469, 2009
  • L. Luo, Z. Chen, M. Chen, X. Zeng, and Z. Xiong,"Reversible image watermarking using interpolation technique," IEEE Trans. on Information Forensics and Security, vol. 5, no. 1, pp. 187–193, 2010.
  • Yung-Chen Chou and Huang-Ching Li, "High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting", Journal of Electronic Science and Technology, VOL. 11, NO. 1, 2013
  • Ching-Te Wang, Ching-Lin Wang, Lin-Chun Li, Sheng-You Guo," The Image High Capacity and Reversible Data Hiding Technique Based on Pixel Frequency of Block", IEEE, 978-1-4577-2119-9/12, 2011
  • E. Varsaki, V. Fotopoulos, A. N. Skodras, "A reversible data hiding technique embedding in the image histogram "Hellenic Open University Journal of Informatics, Technical Report HOU-CS-TR-2006-08-GR,2007.
  • H. L. Yeh, "Prediction-Based Reversible Data Hiding," Master Thesis, Department of Computer Science and Information Management, Providence University, Taiwan, Republic of China, 2007.
  • Rajkumar Ramaswamy,Vasuki Amurugam, "Lossless data hiding based on histogram modification", The International Arab Journal of Information Technology, Vol. 9, No. 5, 2012
  • Manish kumar, Manu Bhai Jha, "GUI Based Encryption and Decryption of Image with Secure Image Steganography", International Journal of Scientific Research and Education, Volume 2, Issue 7, ISSN (e): 2321-7545, 2014
  • L. Blum, M. Blum And M. Shub, "A Simple Unpredictable Pseudo-Random Number Generator", Society For Industrial And Applied Mathematics, Siam J. Comput. , Vol. 15, No. 2,1986
  • Yue Wu, Joseph P. Noonan, Sos Agaian, Shannon Entropy based Randomness Measurement and Test for Image Encryption, Elsevier, arXiv:1103, 5520 v1[cs. CR], 2011
  • Yue Wu, Yicong Zhou, George Saveriades, SosAgaian, Joseph P. Noonan, Premkumar Natarajan, Local Shannon entropy measure with statistical tests for image randomness, Elsevier, Information Sciences, 323–342, 2013
  • A. A. Goshtasby, Similarity and Dissimilarity Measures, Advances in Computer Vision and Pattern Recognition (Springer), DOI 10. 1007/978-1-4471-2458-0_2, 2013
  • Ravi Kumar, Munish Rattan, "Analysis of Various Quality Metrics for Medical Image Processing", IJARCSSE, Volume 2, Issue 11, November 2012 ISSN: 2277 128X