Reversible Datahiding Using Reserved Room Approach with Magic Rectangle Encryption
نویسندگان
چکیده
منابع مشابه
Reserving Room Approach on Reversible Data Hiding before Encryption
Now-a-days peoples give more attention while transmitting secure data. For that Reversible Data Hiding algorithm is mostly preferred since it maintains the property that the original image is recovered from encrypted image and embedded data without analysis into it. But the existing method embeds data by reversibly vacating room from encrypted images, which will further leads to the loss of dat...
متن کاملA \varGamma -magic Rectangle Set and Group Distance Magic Labeling
A Γ -magic rectangle set MRSΓ (a, b; c) of order abc is a collection of c arrays (a× b) whose entries are elements of group Γ , each appearing once, with all row sums in every rectangle equal to a constant ω ∈ Γ and all column sums in every rectangle equal to a constant δ ∈ Γ . In the paper we show that if a and b are both even then MRSΓ (a, b; c) exists for any Abelian group Γ of order abc. Fu...
متن کاملMagic rectangle sets of odd order
A magic rectangle set M = MRS(a, b; c) is a collection of c arrays (a × b) whose entries are elements of {1, 2, . . . , abc}, each appearing once, with all row sums in every rectangle equal to a constant ρ and all column sums in every rectangle equal to a constant σ. It was proved in [2] that if an MRS(a, b; c) exists, then a ≡ b (mod 2). It was also proved there that if a ≡ b ≡ 0 (mod 2) and b...
متن کاملBlock Encryption Using Reversible Cellular Automata
Cellular automata (CA) are highly parallel and discrete dynamical systems, whose behavior is completely specified in terms of a local relation. They were successfully applied for simulation of biological systems and physical phenomena and recently to design parallel and distributed algorithms for solving task density and synchronization problems. In this paper CA are applied to construct crypto...
متن کاملReserving Room Before Encryption
Recently, more and more attention is paid to reversible data hiding (RDH) in encrypted images, since it maintains the excellent property that the original cover can be losslessly recovered after embedded data is extracted while protecting the image content’s confidentiality. All previous methods embed data by reversibly vacating room from the encrypted images, which may be subject to some error...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IOSR Journal of Computer Engineering
سال: 2017
ISSN: 2278-8727,2278-0661
DOI: 10.9790/0661-1903010105