Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014
Survey of Reversible Data Hiding using Chaos and Genetic Algorithm in Encrypted JPEG Bitstream
Vaibhav Sonyabapu Barve, S. S. Bere
Reversible data hiding (RDH) is a technique where secret Information is embedded into a cover image in a reverse way. In general RDH spatial-domain images are encrypted. The proposed system encrypts the JPEG bit stream into a properly organized structure. Then it embeds private message into the encrypted bit stream by lightly changing the JPEG stream. Useful bits suitable for data hiding are then identified. This helps to accurately code the encrypted bit stream carrying secret data. To have a perfect data extraction and image recovery, error correction codes are used in encoding the secret message. Encryption and embedding keys are used in encryption and embedding processes. The secret message bits are encoded with RC4 and embedded into the encrypted bit stream by modifying the appended bits. By using the encryption and embedding keys, the receiver can extract the embedded data and perfectly restore the original image. When the embedding key is absent, the original image can be approximately recovered with satisfactory quality without extracting the hidden data.
Keywords: Reversible data hiding, JPEG bit stream, RC4, Embedding
Edition: Volume 3 Issue 11, November 2014
Pages: 1251 - 1253
How to Cite this Article?
Vaibhav Sonyabapu Barve, S. S. Bere, "Survey of Reversible Data Hiding using Chaos and Genetic Algorithm in Encrypted JPEG Bitstream", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=OCT141028, Volume 3 Issue 11, November 2014, 1251 - 1253
112 PDF Views | 100 PDF Downloads
Similar Articles with Keyword 'Reversible data hiding'
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1130 - 1132Survey On: Reversible Data Hiding in Encrypted JPEG Images
N. B. Pokale, Sanjivani S. Koli
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 762 - 767Reversible Data Hiding in Encrypted Images
Chaple Gopal, G Balram
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1251 - 1253Survey of Reversible Data Hiding using Chaos and Genetic Algorithm in Encrypted JPEG Bitstream
Vaibhav Sonyabapu Barve, S. S. Bere
Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 7, July 2017
Pages: 2156 - 2159Review on Reversible Data Hiding With Distributed Source Encoding Using Identity Hiding Mechanism for Image and Data Owner
Sanjyot A. Biranje, Dr. D S. Bhosle
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 3099 - 3106Separable Reversible Data Hiding In Encrypted Image Using Modified Least Significant Bit and Virtual Embedding
Shreya M. S., Sandeep Kumar S
Similar Articles with Keyword 'JPEG bit stream'
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1130 - 1132Survey On: Reversible Data Hiding in Encrypted JPEG Images
N. B. Pokale, Sanjivani S. Koli
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1251 - 1253Survey of Reversible Data Hiding using Chaos and Genetic Algorithm in Encrypted JPEG Bitstream
Vaibhav Sonyabapu Barve, S. S. Bere
Similar Articles with Keyword 'RC4'
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 1925 - 1927Survey on Secured Association Rule Mining in Partitioned Database
Gurpreet Kaur Bhatti, Prof. Ravi Patki
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1251 - 1253Survey of Reversible Data Hiding using Chaos and Genetic Algorithm in Encrypted JPEG Bitstream
Vaibhav Sonyabapu Barve, S. S. Bere
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 2281 - 2284Hiding Image in Image Using LSB Insertion Method with Improved Security and Quality
Mekha Jose
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 662 - 665An Introduction of Advanced Encryption Algorithm: A Preview
Asfiya Shireen Shaikh Mukhtar, Ghousiya Farheen Shaikh Mukhtar
Similar Articles with Keyword 'Embedding'
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020
Pages: 470 - 478Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT
Aditya Tiwari, Ayush Pandey
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2081 - 2083Survey of Approximate Shortest Distance Computing Using Improved Shortest Path Tree
Sonali Malode, Mansi Bhonsle
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1579 - 1582Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format
Neenu Shereef
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1175 - 1178Steganographic Method of Data Hiding using JPEG Images
Shabana Vathelil Subair, Fathima A Muhammadali
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1944 - 1949A Review of Privacy Protection of Cloud Storage and Steganography Techniques
Alok Ranjan, Mansi Bhonsle