Study of Reversible Data Hiding in Encrypted Images

  • Authors

    • Pornima Suryawanshi
    • Vanita Mane
    • Puja Padiya
    https://doi.org/10.14419/ijet.v7i4.41.24295

    Received date: December 18, 2018

    Accepted date: December 18, 2018

    Published date: December 19, 2018

  • Data Extraction, Image Encryption, Image Recovery, Reversible Data Hiding, , SVM
  • Abstract

    In our daily life we outsource the multimedia files such as images, videos etc. to the cloud server.  So this data need to be stored securely. This security is obtained by using different encryption techniques. The study shows that Reserving Room Before Encryption is much better than the Vacating Room After Encryption. Because Reserving Room Before Encryption gives the better image quality and large payload capacity than Vacating Room After Encryption. But RRBE is having some security isues which is limitation of this method. To overcome this problem Reversible Image Transformation (RIT) based framework is used which is client free framework. In this framework the encrypted image is stored in the form of plaintext.  So it will avoid the attention of curious cloud. This paper focuses on different RDH methods.

  • References

    1. http://fourier.eng.hmc.edu/e161/lectures/e161ch1.pdf.
    2. Shilpa Sreekumar, Vincy Salam, Advanced Reversible Data Hid-ing With Encrypted Data, International Journal of Engineering Trends and Technology (IJETT) Volume 13 Number 7 Jul 2014.
    3. https://www.mepits.com/project/337/Project-Ideas/Unified-Data-Embedding-and-Scrambling-Scheme:–Matlab-based-project
    4. http://what-when-how.com/introduction-to-video-and-imageprocessing/point-processing-introduction-to-video-and-imageprocessing- part-4/
    5. V. Sachnev, H. J. Kim, J. Nam, S. Suresh, and Y. Q. Shi, Reversible watermarking algorithm using sorting and prediction, IEEE Trans. on Circuits and Systems for Video Technology, vol.19, no.7, pp. 989- 999, Jul. 2009.
    6. B.ou, X. Li, Y. Zhao, R. Ni, Y. Shi, Pairwise prediction-error
    7. expansion for efficient reversible data hiding, IEEE Trans. on Im-age Processing, vol. 22, no.12, pp. 5010-5021, Dec. 2013.
    8. Ioan-Catalin Dragoi, Dinu Coltuc, Local-prediction-based differ-ence expansion reversible watermarking, IEEE Trans. on Image Processing, vol. 23, no. 4, pp. 1779-1790, Apr. 2014.
    9. Z. Ni, Y. Shi, N. Ansari, and S. Wei, Reversible data hiding, IEEE Trans. on Circuits and Systems for Video Technology, vol. 16, no. 3, pp. 354-362, Mar. 2006.
    10. J. Tian, Reversible data embedding using a difference expansion, IEEE Trans. on Circuits and Systems for Video Technology, vol. 13, no.8, pp. 890-896, Aug. 2003.
    11. X. Hu, W. Zhang, X. Li, N. Yu, Minimum rate prediction and op-timized histograms modification for reversible data hiding, IEEE Trans. on Information Forensics and Security, vol. 10, no. 3, 653- 664, Mar. 2015.
    12. X. Hu, W. Zhang, X. Hu, N. Yu, X. Zhao, F. Li, Fast estimation of optimal marked-signal distribution for reversible data hiding, IEEE Trans. on Information Forensics and Security, vol. 8, no. 5, pp. 779-788, May. 2013.
    13. W. Zhang, X. Hu, N. Yu, Optimal transition probability of reversi-ble data hiding for general distortion metrics and its applications, IEEE Trans. on Image Processing, vol. 24, no. 1, pp. 294-304, Jan. 2015.
    14. K. Ma, W. Zhang, X. Zhao, N. Yu, F. Li, Reversible data hiding in encrypted images by reserving room before encryption, IEEE Trans. on Information Forensics and Security, vol. 8, no. 3, pp. 553-562, Mar. 2013.
    15. M. Johnson, P. Ishwar, V. M. Prabhakaran, D. Schonberg, and K. Ramchandran, On compressing encrypted data, IEEE Trans. On Signal Processing, vol. 52, no. 10, pp. 2992-3006, Oct. 2004.
    16. W. Liu, W. Zeng, L. Dong, and Q. Yao, Efficient compression of encrypted grayscale images, IEEE Trans. on Image Processing, vol. 19, no. 4, pp. 1097-1102, Apr. 2010.
    17. X. Zhang, Reversible data hiding in encrypted images, IEEE Signal Processing Letters, vol. 18, no. 4, pp. 255-258, Apr. 2011.
    18. W. Hong, T. Chen, H. Wu, An improved reversible data hiding in encrypted images using side match, IEEE Signal Processing Letters, vol. 19, no. 4, pp. 199-202, Apr. 2012.
    19. J. Zhou, W. Sun, L. Dong, et al., Secure reversible image data hid-ing over encrypted domain via key modulation, IEEE Trans. on Cir-cuits and Systems for Video Technology, vol. 26, no. 3, pp. 441-452, Mar. 2016.
    20. X. Zhang, Separable reversible data hiding in encrypted image, IEEE Trans. on Information Forensics and Security, vol. 7, no. 2, pp. 826-832, Apr. 2012.
    21. Z. Qian, and X. Zhang, Reversible data hiding in encrypted image with distributed source encoding, IEEE Trans. on Circuits and Sys-tems for Video Technology, vol. 26, no. 4, pp. 636-646, Apr. 2016.
    22. W. Zhang, K. Ma and N. Yu, Reversibility improved data hiding in encrypted images, Signal Processing, vol. 94, pp. 118-127, Jan. 2014.
    23. X. Cao, L. Du, X. Wei, et al., High capacity reversible data hiding in encrypted images by patch-level sparse representation, IEEE Trans. on Cybernetics, vol. 46, no. 5, pp. 1132-1143, May. 2016.
    24. Weiming Zhang, Hui Wang, Dongdong Hou, Nenghai Yu et al., Reversible Data Hiding in Encrypted Images by Reversible Image Transformation, IEEE Trans. on Multimedia, 2016.
    25. B.ou, X. Li, Y. Zhao, R. Ni, Y. Shi, Pairwise prediction-error ex-pansion for efficient reversible data hiding, IEEE Trans. on Image Processing, vol. 22, no.12, pp. 5010-5021, Dec. 2013.
    26. Y. Lee and W. Tsai,A new secure image transmission technique via secret-fragment-visible mosaic images by nearly reversible color transformation, IEEE Trans. on Circuits and Systems for Video
  • Downloads

  • How to Cite

    Suryawanshi, P., Mane, V., & Padiya, P. (2018). Study of Reversible Data Hiding in Encrypted Images. International Journal of Engineering and Technology, 7(4.41), 42-46. https://doi.org/10.14419/ijet.v7i4.41.24295