Reversible data hiding in encrypted images with RSA and El gamal algorithm


  • Chethan R. Bhat Asst. Professor - Selection Grade, Manipal Institute of Technology, Manipal Academy of Higher Education, Manipal
  • B. Kishore Intern at Intel Bengaluru





Asymmetric Key Encoding, Cryptography, Data Embedding, Image Encoding, Pixel, Reversible Data Hiding.


This paper puts forward reversible concealing plans for figure content pictures encoded by techniques for open key cryptosystems with probabilistic and homomorphic properties. Inside the reversible plan despite the fact that a direct contortion is presented, the inserted infor-mation might be separated, and the special picture might be recuperated from the immediately unscrambled photograph. With the combined strategy, a beneficiary may evacuate a bit of inserted data before unscrambling and expel some other piece of installed data and recuperate the genuine plaintext picture post-decoding. Here we propose to actualize the RSA and ElGamal consolidated calculation for picture encod-ing and decoding.





[1] X. Zhang, J. Long, Z. Wang, and H. Cheng, "Lossless and Reversible Data Hiding in Encrypted Images With Public-Key Cryptography," in IEEE Transactions on Circuits and Systems for Video Technology, vol. 26, no.9, pp.1622-1631, Sept 2016.

[2] Rintu Jose, and Gincy Abraham, “A Separable Reversible Data Hiding in Encrypted Image with Improved Performance,†IEEE International Conference on Microelectronics, Communication and Renewable Energy, Pages: 1-5, 2013.

[3] Zhenxing Qian, Xinpeng Zhang, and Guorui Feng, “Reversible Data Hiding in Encrypted Images Based on Progressive Recoveryâ€, IEEE Signal Processing Letters, Volume: 23, Issue: 11, Pages: 1672-1676, Nov. 2016.

[4] Shuang Yi, and Yicong Zhou, â€An Improved Reversible Data Hiding In Encrypted Images,†Signal and Information Processing (ChinaSIP) IEEE China Summit and International Conference, Pages: 225-229, 2015.

[5] Zhaoxia Yin, Andrew Abel, Xinpeng Zhan, and Bin Luo, “Reversible Data Hiding In Encrypted Image Based On Block Histogram Shifting,†IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Pages: 2129-2133, 2016.

[6] N. A. Saleh, H. N. Baghdad, S. I. Shaheen, and A. M. Darwish, “High Capacity Lossless Data Embedding Technique for Palette Images Based on Histogram Analysis,†Digital Signal Processing, 20, pp. 1629−1636, 2010.

[7] Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, “Reversible Data Hiding,†IEEE Trans. on Circuits and Systems for Video Technology, 16(3), pp. 354−362, 2006.

[8] M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, “Lossless Generalized-LSB Data Embedding,†IEEE Trans. On Image Processing, 14(2), pp.253–266, 2005.

[9] X. Hu, W. Zhang, X. Li, and N. Yu, “Minimum Rate Prediction and Optimized Histograms Modification for Reversible Data Hiding,†IEEE Trans. on Information Forensics and Security, 10(3), pp. 653-664, 2015.

[10] W. Zhang, X. Hu, X. Li, and N. Yu, “Optimal Transition Probability of Reversible Data Hiding for General Distortion Metrics and Its Applications,†IEEE Trans. on Image Processing, 24(1), pp. 294-304, 2015.

[11] X. Zhang, “Reversible data hiding with optimal value transfer,†IEEE Trans. Multimedia, vol. 15, no. 2, pp. 316–325, Feb. 2013

[12] W. Puech, M. Chaumont, and O. Strauss, “A reversible data hiding Method for encrypted images,†in Proc. of SPIE 6819, pp.1-9, 2008.

[13] T. Hong, W. Chen, and H. Wu, “An improved reversible data hiding in encrypted images using side match, †IEEE Signal Processing Lett., vol.19, no.4, pp.199-202, 2012.

[14] Jiantao Zhou, Weiwei Sun, Li Dong, Xianming Liu, Oscar C. Au Yuan Yan Tang, “Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation,†IEEE Trans. On Circuits and Systems for Video Technology, vol. 26, issue 3, pp.441-452, 2015.

[15] Jun Tian, "Reversible data embedding using a difference expansion," in IEEE Transactions on Circuits and Systems for Video Technology, vol.13, no.8, pp.890-896, Aug.2003.

[16] X. Zhang, “Separable reversible data hiding in encrypted image,†IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 826–832, Apr. 2012.

View Full Article: