Reversible Datahiding Using Reserved Room Approach with Magic Rectangle Encryption

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Reserving Room Approach on Reversible Data Hiding before Encryption

Now-a-days peoples give more attention while transmitting secure data. For that Reversible Data Hiding algorithm is mostly preferred since it maintains the property that the original image is recovered from encrypted image and embedded data without analysis into it. But the existing method embeds data by reversibly vacating room from encrypted images, which will further leads to the loss of dat...

متن کامل

A \varGamma -magic Rectangle Set and Group Distance Magic Labeling

A Γ -magic rectangle set MRSΓ (a, b; c) of order abc is a collection of c arrays (a× b) whose entries are elements of group Γ , each appearing once, with all row sums in every rectangle equal to a constant ω ∈ Γ and all column sums in every rectangle equal to a constant δ ∈ Γ . In the paper we show that if a and b are both even then MRSΓ (a, b; c) exists for any Abelian group Γ of order abc. Fu...

متن کامل

Magic rectangle sets of odd order

A magic rectangle set M = MRS(a, b; c) is a collection of c arrays (a × b) whose entries are elements of {1, 2, . . . , abc}, each appearing once, with all row sums in every rectangle equal to a constant ρ and all column sums in every rectangle equal to a constant σ. It was proved in [2] that if an MRS(a, b; c) exists, then a ≡ b (mod 2). It was also proved there that if a ≡ b ≡ 0 (mod 2) and b...

متن کامل

Block Encryption Using Reversible Cellular Automata

Cellular automata (CA) are highly parallel and discrete dynamical systems, whose behavior is completely specified in terms of a local relation. They were successfully applied for simulation of biological systems and physical phenomena and recently to design parallel and distributed algorithms for solving task density and synchronization problems. In this paper CA are applied to construct crypto...

متن کامل

Reserving Room Before Encryption

Recently, more and more attention is paid to reversible data hiding (RDH) in encrypted images, since it maintains the excellent property that the original cover can be losslessly recovered after embedded data is extracted while protecting the image content’s confidentiality. All previous methods embed data by reversibly vacating room from the encrypted images, which may be subject to some error...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IOSR Journal of Computer Engineering

سال: 2017

ISSN: 2278-8727,2278-0661

DOI: 10.9790/0661-1903010105