Call for Paper - August 2022 Edition
IJCA solicits original research papers for the August 2022 Edition. Last date of manuscript submission is July 20, 2022. Read More

An Approach Towards Separable Lossy Data Hiding

Print
PDF
IJCA Proceedings on National Conference on Emerging Trends in Computer Technology
© 2014 by IJCA Journal
NCETCT - Number 2
Year of Publication: 2014
Authors:
Vinit Agham
Tareekpattewar

Vinit Agham and Tareekpattewar. Article: An Approach Towards Separable Lossy Data Hiding. IJCA Proceedings on National Conference on Emerging Trends in Computer Technology NCETCT(2):8-11, December 2014. Full text available. BibTeX

@article{key:article,
	author = {Vinit Agham and Tareekpattewar},
	title = {Article: An Approach Towards Separable Lossy Data Hiding},
	journal = {IJCA Proceedings on National Conference on Emerging Trends in Computer Technology},
	year = {2014},
	volume = {NCETCT},
	number = {2},
	pages = {8-11},
	month = {December},
	note = {Full text available}
}

Abstract

Communication over the internet is facing some problems such as data security, copyright control, authentication etc. Here we introduce a novel scheme for separable data hiding when lossy image used as a cover media. This paper illustrates the various objectives of implementing separable lossy data hiding technique. The system is consists of three steps in the first step encryption of the cover image using an encryption key. Then, a data-hider hides the message image (secure data) into encrypted cover image using a data-hiding key. The third step is to extract the message image and recover the original image. The actions i. e. extracting the message image and recover the original images are depends upon which key the receiver has. There is separation of these two actions according to availability of keys. The scheme's key feature is the way of getting lossy image after decryption and data extraction processes. Here we are concentrating on using RGB-LSB method for data embedding and finally verifies the performance of using RGB-LSB method in terms of data capacity as well as image quality.

References

  • Ni Z. , Shi Y-Q, Ansari N. and Su W. , 2006 . Reversible data hiding. IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, no. 3, pp. 354-362.
  • Johnson M. , Ishwar P. , Prabhakaran V. M. , Schonberg D. , and Ramchandran K. , 2004. On compressing encrypted data. IEEE Transactions on Signal Processing, vol. 52, no. 10, pp. 2992-3006.
  • Zhang X. , 2011. Lossy compression and iterative reconstruction for encrypted image. IEEE Transactions on Information and Forensics Security, vol. 6, no. 1, pp. 53-58.
  • Celik M. U. , Sharma G. , Tekalp A. M. and Saber E. , 2005. Lossless generalized-LSB data embedding. IEEE Transactions on Image Processing, vol. 14, no. 2, pp. 253-266.
  • Kundur D. and Karthik K. , 2004. Video fingerprinting and encryption principles for digital rights management. Proceedings IEEE, vol. 92, no. 6, pp. 918-932.
  • Tian J. , 2003. Reversible data embedding using a difference expansion. IEEE Transactions on Circuits and Systems for Video Technology,vol. 13, no. 8. pp. 890-896.
  • Das J. V. and Ganesh K. , 2012. Data Hiding Using a Novel Reversible Method forEncrypted Image. International Journal of Advanced Research in Technology, vol. 2, Issue 5.
  • Zhang X. , 2012. Separable Reversible Data Hiding in Encrypted Image. IEEE transactions on information forensics and security, vol. 7, no. 2, pp. 826-832.
  • Gangwar A. and Shrivastava V. , 2013. Improved RGB -LSB Steganography Using Secret Key. International Journal of Computer Trends and Technology, vol. 4, Issue 2, pp. 85-89.
  • Shi Y. Q. , 2005. Reversible data hiding. Springer-Verlag Berlin Heidelberg, pp. 1-12.
  • Yadav D. , Singhal V. and Bandil D. , 2012. Reversible data hiding techniques. International Journal of Electronics and Computer Science Engineering, vol. 1, no. 2, pp. 380-383.
  • Zhaoa Z. , Luoc H, Lu Z. -M. andPan J. -S. , 2011. Reversible data hiding based on multilevel histogram modification and sequential recovery. International Journal of Electronics and Communications, pp. 814-826.