International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064




Downloads: 104

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014


Survey On: Reversible Data Hiding in Encrypted JPEG Images

N. B. Pokale, Sanjivani S. Koli


Abstract: Reversible data hiding (RDH) is just an approach where secret Data is stuck right into a cover picture in an opposite way. Generally RDH spatial-domain photographs are encrypted. The planned system encrypts the JPEG bit stream in to an adequately arranged structure. Then it embeds personal information in to the secured bit stream by gently adjusting the JPEG stream. Helpful bits ideal for knowledge hiding are then identified. It will help to effectively rule the protected bit stream holding key data. To have an ideal knowledge removal and picture recovery, error modification codes are utilized in coding the key message. Encryption and embedding keys are utilized in encryption and embedding processes. The secrete message bits are encoded with R and embedded into the encrypted bit stream by altering the appended bits. Utilizing the encryption and embedding keys, the recipient may remove the embedded information and completely recover the initial image. Once the embedding key is missing, the initial picture could be approximately recovered with adequate quality without removing the hidden data.


Keywords: secret data, spatial-domain photographs, secured bit stream, Encryption, embedding keys


Edition: Volume 3 Issue 12, December 2014,


Pages: 1130 - 1132


How to Cite this Article?

N. B. Pokale, Sanjivani S. Koli, "Survey On: Reversible Data Hiding in Encrypted JPEG Images", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=OCT141429, Volume 3 Issue 12, December 2014, 1130 - 1132

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'secret data'

Downloads: 103

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1175 - 1178

Steganographic Method of Data Hiding using JPEG Images

Shabana Vathelil Subair, Fathima A Muhammadali

Share this Article

Downloads: 108

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1367 - 1370

A Review on Various Approaches of Video Steganography

Sapanpreet Kaur, Mandeep Kaur

Share this Article

Similar Articles with Keyword 'Encryption'

Downloads: 119 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Similar Articles with Keyword 'secret'

Downloads: 99

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Downloads: 101

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Similar Articles with Keyword 'data'

Downloads: 530 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1454 - 1458

Heart Disease Prediction with Machine Learning Approaches

Megha Kamboj

Share this Article

Downloads: 119 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Similar Articles with Keyword 'photographs'

Downloads: 107

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 627 - 632

LoG Feature Extraction Based Photographic Detection

Sujitha B Cherkottu, Smija Das

Share this Article

Downloads: 125

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2716 - 2720

Methodology to Recover the Damaged and Degraded Portion of an Image by Image Inpainting

Chetan Biradar

Share this Article

Similar Articles with Keyword 'secured'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 99

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2394 - 2397

Multilayered Security Approach for Cloud Data Centers using Hash Functions

Jashanpreet Pal Kaur, Rajbhupinder Kaur

Share this Article

Similar Articles with Keyword 'bit'

Downloads: 2

Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 948 - 951

Survey on Various Image Segmentation Techniques

Babita Chauhan

Share this Article

Downloads: 2

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 914 - 919

Energy Efficient Sensory Data Collection in Wireless Sensor Networks

Liji Varghese

Share this Article

Similar Articles with Keyword 'stream'

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 12, December 2021

Pages: 1357 - 1360

An Opinion Mining for Indian Premier League Using Machine Learning Techniques

Rakshith N, Suraj B S, Chethana C

Share this Article

Downloads: 3

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 1118 - 1123

Music Recommendation System

Nipun Prakash Gupta, Durgesh Kumar

Share this Article
Top