Survey Paper | Information Technology | India | Volume 4 Issue 12, December 2015
Lossless and Reversible Data Hiding in Asymmetric Cryptography
Prashant Gholve, H. A. Hingoliwala
This technology proposes a lossless, a reversible, and a combined data hiding schemes for cipher text images encrypted by public key cryptosystems with probabilistic and holomorphic properties. In the lossless scheme, the cipher text pixels are replaced with new values to embed the additional data into several LSB-planes of cipher text pixels by multiple layer wet paper coding. Then, the embedded data can be directly extracted from the encrypted domain and the data embedding operation does not affect the decryption of original plaintext image. In the reversible scheme, a pre-processing is employed to shrink the image histogram before image encryption, so that the modification on encrypted images for data embedding will not cause any pixel oversaturation in plaintext domain. Although a slight distortion is introduced, the embedded data can be extracted and the original image can be recovered from the directly decrypted image. Due to the compatibility between the lossless and reversible schemes, the data embedding operations in the two manners can be simultaneously performed in an encrypted image. With the combined technique, a receiver may extract a part of embedded data before decryption, and extract another part of embedded data and recover the original plaintext image after decryption.
Keywords: reversible data hiding, lossless data hiding, image encryption
Edition: Volume 4 Issue 12, December 2015
Pages: 1984 - 1987
How to Cite this Article?
Prashant Gholve, H. A. Hingoliwala, "Lossless and Reversible Data Hiding in Asymmetric Cryptography", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV152435, Volume 4 Issue 12, December 2015, 1984 - 1987
112 PDF Views | 91 PDF Downloads
Similar Articles with Keyword 'reversible data hiding'
Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015
Pages: 2137 - 2140Protection Figures Hitting by Refining Depiction Fragment Torrent
P Siddharthan, C Mahesh
Survey Paper, Information Technology, India, Volume 4 Issue 12, December 2015
Pages: 1984 - 1987Lossless and Reversible Data Hiding in Asymmetric Cryptography
Prashant Gholve, H. A. Hingoliwala
Research Paper, Information Technology, India, Volume 4 Issue 2, February 2015
Pages: 2443 - 2447Separable Reversible Data Hiding In Image Using a Keyless Approach
Jitbahan Samanta, G. Sujatha
Similar Articles with Keyword 'image encryption'
Survey Paper, Information Technology, India, Volume 4 Issue 12, December 2015
Pages: 1984 - 1987Lossless and Reversible Data Hiding in Asymmetric Cryptography
Prashant Gholve, H. A. Hingoliwala
M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 2, February 2015
Pages: 2430 - 2432Highly Secured Lossless Image Cryptography Algorithm Based on Haar Wavelet Transform
Rishi Kumar Gupta, G. Sujatha
Research Paper, Information Technology, India, Volume 4 Issue 2, February 2015
Pages: 2443 - 2447Separable Reversible Data Hiding In Image Using a Keyless Approach
Jitbahan Samanta, G. Sujatha