CFP last date
20 August 2024
Call for Paper
September Edition
IJCA solicits high quality original research papers for the upcoming September edition of the journal. The last date of research paper submission is 20 August 2024

Submit your paper
Know more
Reseach Article

Encryption Protected Reversible Data Hiding for Secret Communication

Published on May 2015 by Sowmyashree, Sanjay Sharma
International Conference and Workshop on Emerging Trends in Technology
Foundation of Computer Science USA
ICWET2015 - Number 1
May 2015
Authors: Sowmyashree, Sanjay Sharma

Sowmyashree, Sanjay Sharma . Encryption Protected Reversible Data Hiding for Secret Communication. International Conference and Workshop on Emerging Trends in Technology. ICWET2015, 1 (May 2015), 20-26.

author = { Sowmyashree, Sanjay Sharma },
title = { Encryption Protected Reversible Data Hiding for Secret Communication },
journal = { International Conference and Workshop on Emerging Trends in Technology },
issue_date = { May 2015 },
volume = { ICWET2015 },
number = { 1 },
month = { May },
year = { 2015 },
issn = 0975-8887,
pages = { 20-26 },
numpages = 7,
url = { /proceedings/icwet2015/number1/20934-5014/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Proceeding Article
%1 International Conference and Workshop on Emerging Trends in Technology
%A Sowmyashree
%A Sanjay Sharma
%T Encryption Protected Reversible Data Hiding for Secret Communication
%J International Conference and Workshop on Emerging Trends in Technology
%@ 0975-8887
%V ICWET2015
%N 1
%P 20-26
%D 2015
%I International Journal of Computer Applications

Security has become an important issue with the proliferation of digital communication. Multimedia sources such as images plays an important role in security of data communication. Data hiding technique can be used to implant secret data in host images where existence of data is undisclosed which reduces chances of unauthorized access. Some applications containing legal considerations require recovery of the cover image after extraction of secret data where reversible data hiding comes into view. Limitations of existing data hiding schemes in terms of robustness against digital attacks are major obstacles in the security of hidden data. Content protection scheme that integrates both encryption and data hiding for its protection and authentication will provide major protection against security attacks. This paper presents an efficient spatial domain reversible data hiding technique and also proposes implementation of image encryption upon reversible data hiding technique to protect the stego-image against attacks during communication. Histogram shifting based reversible data hiding technique results significant embedding capacity and achieve good reversibility property of images. Proposed approach guarantees PSNR 48db or more for most of the images like crowded, semi crowded and textured images.

  1. William Ku and Chi-Hung Chi, 2004, Survey on the technological aspects of Digital Rights Management, School of Computing. National University of Singapore Science Drive 2.
  2. Hafeez M. A. Malik, "Data hiding techniques for Digital rights Management of Multimedia Archives", Master Thesis, University of Illinois, Chicago, 2006
  3. Z. Ni, Yun Q. Shi, N. Ansari, and W. Su, "Reversible Data Hiding," IEEE Tran. Circuits and Systems for Video Technology, vol. 16, no. 3, PP. 354-362, 2006.
  4. D. R. Denslin Brabin1, Dr. J. Jebamalar Tamilselvi2," Reversible Data Hiding: A Survey, ISSN (Print) : 2320 – 9798 ISSN (Online): 2320 – 9801 International Journal of Innovative Research in Computer and Communication Engineering Vol. 1, Issue 3, 2013
  5. C. W. Honsinger, P. W. Jones, M. Rabbani, and J. C. Stoffel, "Lossless recovery of an original image containing embedded data," US Pat. #6,278,791, 2001.
  6. J. Fridrich, M. Goljan, and R. Du, "Lossless data embeddingnew paradigm in digital watermarking," EURASIP Journ. Appl. Sig. Proc. , vol. 2002, no. 02, pp. 185–196, 2002.
  7. J. Tian, "Wavelet-based reversible watermarking for authentication," Proc. of SPIE Sec. and Watermarking of Multimedia Cont. IV, vol. 4675, no. 74, 2002.
  8. Ms. G. S. Sravanthi , Mrs. B. Sunitha Devi , S. M. Riyazoddin & M. Janga Reddy, "A Spatial Domain Image Steganography Technique Based on Plane Bit Substitution Method", Global Journal of Computer Science and Technology Graphics & Vision, Volume 12 Issue 15 Version 1. 0 , Online ISSN: 0975-4172 & Print ISSN: 0975-4350, 2012
  9. J. Tian , "Reversible Data Embedding Using a Difference Expansion, IEEE Tran. Circuits and Systems for Video Technology, vol. 13, issue 8, pp. 890-896. 2003
  10. Chin-Chen Chang, Wei-Liang Tai and Chia-Chen Lin (2006). A Reversible Data Hiding Scheme Based On Side Match Vector Quantization, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 16, No. 10.
  11. Hsien-Wen Tseng*, Chi-Pin Hsieh, "Prediction-based reversible data hiding", Information Sciences, Elsevier, ISSN: 2460–2469, 2009
  12. L. Luo, Z. Chen, M. Chen, X. Zeng, and Z. Xiong,"Reversible image watermarking using interpolation technique," IEEE Trans. on Information Forensics and Security, vol. 5, no. 1, pp. 187–193, 2010.
  13. Yung-Chen Chou and Huang-Ching Li, "High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting", Journal of Electronic Science and Technology, VOL. 11, NO. 1, 2013
  14. Ching-Te Wang, Ching-Lin Wang, Lin-Chun Li, Sheng-You Guo," The Image High Capacity and Reversible Data Hiding Technique Based on Pixel Frequency of Block", IEEE, 978-1-4577-2119-9/12, 2011
  15. E. Varsaki, V. Fotopoulos, A. N. Skodras, "A reversible data hiding technique embedding in the image histogram "Hellenic Open University Journal of Informatics, Technical Report HOU-CS-TR-2006-08-GR,2007.
  16. H. L. Yeh, "Prediction-Based Reversible Data Hiding," Master Thesis, Department of Computer Science and Information Management, Providence University, Taiwan, Republic of China, 2007.
  17. Rajkumar Ramaswamy,Vasuki Amurugam, "Lossless data hiding based on histogram modification", The International Arab Journal of Information Technology, Vol. 9, No. 5, 2012
  18. Manish kumar, Manu Bhai Jha, "GUI Based Encryption and Decryption of Image with Secure Image Steganography", International Journal of Scientific Research and Education, Volume 2, Issue 7, ISSN (e): 2321-7545, 2014
  19. L. Blum, M. Blum And M. Shub, "A Simple Unpredictable Pseudo-Random Number Generator", Society For Industrial And Applied Mathematics, Siam J. Comput. , Vol. 15, No. 2,1986
  20. Yue Wu, Joseph P. Noonan, Sos Agaian, Shannon Entropy based Randomness Measurement and Test for Image Encryption, Elsevier, arXiv:1103, 5520 v1[cs. CR], 2011
  21. Yue Wu, Yicong Zhou, George Saveriades, SosAgaian, Joseph P. Noonan, Premkumar Natarajan, Local Shannon entropy measure with statistical tests for image randomness, Elsevier, Information Sciences, 323–342, 2013
  22. A. A. Goshtasby, Similarity and Dissimilarity Measures, Advances in Computer Vision and Pattern Recognition (Springer), DOI 10. 1007/978-1-4471-2458-0_2, 2013
  23. Ravi Kumar, Munish Rattan, "Analysis of Various Quality Metrics for Medical Image Processing", IJARCSSE, Volume 2, Issue 11, November 2012 ISSN: 2277 128X
Index Terms

Computer Science
Information Sciences


Digital Rights Management Histogram Shifting Prediction Difference Mode Value Entropy Correlation