Reversible Encrypted Data Concealment in Encrypted Images by Reserving Room approach for Data Protection System
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 132 , Downloads: 131 | CTR: 99 % | Weekly Popularity: ⮙4

Research Paper | Electronics & Communication Engineering | India | Volume 5 Issue 2, February 2016

Reversible Encrypted Data Concealment in Encrypted Images by Reserving Room approach for Data Protection System

Sunayana A. Sutar, Ashish A. Zanjade

The reversible encrypted data concealment in encrypted images is used to hide encrypted data in encrypted images for secret communication which has very high security. The project proposes the enhancement of protection system for secret data communication through encrypted data concealment in encrypted images. The image is then separated into number of blocks locally and lifting wavelet transform will be used to detect approximation and detailed coefficients. Then approximation part is encrypted using chaos encryption. After image encryption, the data hider will hide the secret data into the detailed coefficient which are reserved before encryption. The data hiding technique uses the adaptive LSB replacement algorithm for concealing the secret message bits into encrypted image. The proposed method can achieve real reversibility, that is, data extraction and image recovery are free of errors.

Keywords: Reversible, Data Concealment, Image Encryption

Edition: Volume 5 Issue 2, February 2016

Pages: 969 - 974

Share this Article

How to Cite this Article?

Sunayana A. Sutar, Ashish A. Zanjade, "Reversible Encrypted Data Concealment in Encrypted Images by Reserving Room approach for Data Protection System", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV161319, Volume 5 Issue 2, February 2016, 969 - 974

132 PDF Views | 131 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Reversible'

Views: 118 , Downloads: 102 | CTR: 86 % | Weekly Popularity: ⮙4

Review Papers, Electronics & Communication Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2286 - 2288

A Review on Reversible Logic Gate Multipliers

Supreetha Rao, Supreetha M, Vidya Venkatesh, Prajna

Share this Article

Views: 133 , Downloads: 103 | CTR: 77 % | Weekly Popularity: ⮙4

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1188 - 1192

Face Obfuscation Based Reversible Watermarking For Lossless Image Compression

Vivek Jaladi, Suhasini Andurey

Share this Article

Views: 121 , Downloads: 103 | CTR: 85 % | Weekly Popularity: ⮙3

Research Paper, Electronics & Communication Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2433 - 2438

A Novel Design of Low Power 4:2 Compressor using Adiabatic Logic

Shaswat Singh Bhardwaj, Vishal Moyal

Share this Article

Views: 141 , Downloads: 105 | CTR: 74 % | Weekly Popularity: ⮙1

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 7, July 2014

Pages: 901 - 904

Low Power 8 Bit quantum ALU Implementation Using Reversible Logic Structure

Vijay G. Roy, P. R. Indurkar, D. M. Khatri

Share this Article

Views: 126 , Downloads: 106 | CTR: 84 % | Weekly Popularity: ⮙4

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1100 - 1102

Design and Implementation BCD adder Using Integrated Qubit Gates for Quantum Applications

G. Sivakrishna, K. Amarnath, S. Madhava Rao

Share this Article

Similar Articles with Keyword 'Data Concealment'

Views: 132 , Downloads: 131 | CTR: 99 % | Weekly Popularity: ⮙4

Research Paper, Electronics & Communication Engineering, India, Volume 5 Issue 2, February 2016

Pages: 969 - 974

Reversible Encrypted Data Concealment in Encrypted Images by Reserving Room approach for Data Protection System

Sunayana A. Sutar, Ashish A. Zanjade

Share this Article

Views: 149 , Downloads: 141 | CTR: 95 % | Weekly Popularity: ⮙4

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 5 Issue 10, October 2016

Pages: 975 - 979

FPGA Implementation of a Image Encryption System using AES Algorithm

Dr. G. V. R. Sagar, G. Ashok Kumar

Share this Article

Similar Articles with Keyword 'Image Encryption'

Views: 126 , Downloads: 96 | CTR: 76 % | Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1791 - 1793

Image Encryption-Then-Compression System Operated in the Prediction Error Domain and Random Permutation

Sujatha D, Venkatakiran S

Share this Article

Views: 127 , Downloads: 108 | CTR: 85 % | Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 6 Issue 5, May 2017

Pages: 1420 - 1426

A Chosen-Plaintext Attack on Permutation-Only Image Encryption Schemes and Steganography on Images

Soja Prasannan, Devi Murali

Share this Article

Views: 159 , Downloads: 109 | CTR: 69 % | Weekly Popularity: ⮙3

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2231 - 2236

Image Compression Approach for Encryption and Decryption using RGB Content with DCT Function

Anita, Bhavneesh Malik

Share this Article

Views: 144 , Downloads: 124 | CTR: 86 % | Weekly Popularity: ⮙3

Research Paper, Electronics & Communication Engineering, India, Volume 2 Issue 12, December 2013

Pages: 250 - 255

Image Encryption and Iterative Reconstruction of an Encrypted Image

N. Nagaraja Kumar, M. Sucharitha

Share this Article

Views: 158 , Downloads: 124 | CTR: 78 % | Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 6 Issue 5, May 2017

Pages: 620 - 625

On the Security of Permutation-Only Image Encryption Schemes and Steganography

Soja Prasannan, Devi Murali

Share this Article
Top