Randomised Data Concealment with Reversibility Improved Data Hiding In Encrypted Images

نویسندگان

  • S. Narayanan
  • M. Pravin Kumar
  • G. Ramprasad
  • M. Mohan
چکیده

Steganography is used to hide data like text, image audio from unauthorized user in different manner. Data hiding method for images suffer from performance issues like low embedding capabilities, distortion or do not recover the original image completely. A novel reversible data hiding method is proposed. The pixel to which data is embedded is estimated in a random manner, these pixels are shifted and data along with the estimation errors are embedded in the image and these pixels are encrypted using a standard encryption technique. The rest of the image is then encrypted using a standard encryption algorithm. The image and data can be encrypted before data concealment for added protection. The embedded data can be extracted before or after the image is decrypted. This is possible by implementing a data hiding key. Thus, with the data hiding key, only the embedded data can be extracted revealing no information about the carrier image. The image is decrypted and can be recovered using the location maps created during the histogram shifting process. The various encryption levels in this method ensure a secure system. The proposed model exhibits high PSNR values and offers complete recovery of the hidden data and image.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Reversibility improved data hiding in encrypted images

A novel reversible data hiding technique in encrypted images is presented in this paper. Instead of embedding data in encrypted images directly, some pixels are estimated before encryption so that additional data can be embedded in the estimating errors. A benchmark encryption algorithm (e.g. AES) is applied to the rest pixels of the image and a special encryption scheme is designed to encrypt ...

متن کامل

Watermarked and Encrypted Image for Reversible Data Hiding by Reserving Room Algorithm with Random Pixel Data Hiding

Reversible Data Hiding (RDH) gaining the attraction in the world of secured message passing through encrypted images. It is due to the excellent property of recovering the original cover or image after embedded data is extracted while protecting the encrypted image content’s confidentiality. The related works may embed data by reversibly vacating room from the encrypted images, which may be sub...

متن کامل

Efficient technique of data hiding in encrypted images

Recently, more and more attention is paid to reversible data hiding (RDH) in encrypted images, since it maintains the excellent property that the original cover can be lossless recovered after embedded data is extracted while protecting the image content’s confidentiality. All previous methods embed data by reversibly memory space from the encrypted images, which may be subject to some errors o...

متن کامل

New Reversible Data Hiding Scheme for Encrypted Images using Lattices

Reversible data hiding is a technique to hide arbitrary data, without influencing the original images. In 2011, Zhang proposed a reversible data hiding scheme for encrypted images, by using a spatial correlation of the decrypted original image. Later, Hong et al. proposed an improved scheme by using side-match techniques, and modifying the correlation calculation function. In this paper, we pro...

متن کامل

Reversible Data Hiding For Embedding Data Securely in Encrypted Image by Reserving Room Before Encryption

Reversible data hiding with image encryption (RDH), since it maintains the excellent property that the original cover can be losslessly recovered after embedded data is extracted while protecting the image content’s confidentiality. In previous work vacating room after encrypted image, which subject to some errors on data extraction and/or image restoration. In this paper, a novel method by res...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014