Research Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014
Reversible Data Hiding in Encrypted Images
Chaple Gopal, G Balram
In recent times, more attention is paid to reversible data hiding (RDH) in encrypted images, since it preserves the excellent property that the original cover can be losslessly improved after embedded data is extracted while protecting the image contents privacy. All earlier methods embed data by reversibly vacating room from the encrypted images, which may be raise some errors on data extraction and image restoration. In this paper, we proposed a novel method by reserving room before encryption with a traditional RDH algorithm, and thus it is easier for the data hider to reversibly embed data in the encrypted image. Proposed method that can achieve the real reversibility, data extraction and image recovery are free of any error. This Experiments show that this novel method can embed more than 10 times as large payloads for the same image quality as the earlier methods, such as for PSNR dB.
Keywords: Reversible data hiding, image encryption, privacy protection, histogram shift
Edition: Volume 3 Issue 9, September 2014
Pages: 762 - 767
How to Cite this Article?
Chaple Gopal, G Balram, "Reversible Data Hiding in Encrypted Images", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SEP14267, Volume 3 Issue 9, September 2014, 762 - 767
140 PDF Views | 95 PDF Downloads
Similar Articles with Keyword 'Reversible data hiding'
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1130 - 1132Survey On: Reversible Data Hiding in Encrypted JPEG Images
N. B. Pokale, Sanjivani S. Koli
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 762 - 767Reversible Data Hiding in Encrypted Images
Chaple Gopal, G Balram
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1251 - 1253Survey of Reversible Data Hiding using Chaos and Genetic Algorithm in Encrypted JPEG Bitstream
Vaibhav Sonyabapu Barve, S. S. Bere
Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 7, July 2017
Pages: 2156 - 2159Review on Reversible Data Hiding With Distributed Source Encoding Using Identity Hiding Mechanism for Image and Data Owner
Sanjyot A. Biranje, Dr. D S. Bhosle
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 3099 - 3106Separable Reversible Data Hiding In Encrypted Image Using Modified Least Significant Bit and Virtual Embedding
Shreya M. S., Sandeep Kumar S
Similar Articles with Keyword 'image encryption'
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 1062 - 1064Enriching Process of Image Encryption and Compression Using Hierarchical Decomposition
Devashri Anil Vyawahare, Prof. Anil Gujar
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020
Pages: 1330 - 1335Efficient Image Encryption EIE - Compression System Using Haar Wavelets Using Matlab
Kavita, Anil Vadhwa
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1830 - 1833A Survey on Efficient ETC (Encryption-Then-Compression) Techniques for Image Data Security
Ganesh Lamkhade, Ajay Kumar Gupta
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2814 - 2815Partial Image Encryption Using Block Shuffling and Pseudo Random Number Generator
Rakhi Lande, Rekha Pandit
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1939 - 1942An Uncompressed AVI Encryption Based on Haar Wavelet Decomposition of Frames and Audio
Minal C. Toley, Mayur S.Burange
Similar Articles with Keyword 'privacy protection'
Research Proposals or Synopsis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2611 - 2615Bidirectional Location Privacy Protection Schemes against Internal Adversary in WSN
Samson Raja T, S. Satheesbabu, Dr. K. Balasubadra
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1640 - 1647Privacy Preservation Protection for Personalized Web User by k-Anonymity with Profile Construction for Web Search Engines
Uma Maheswari.T, Dr.V. Kavitha
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2839 - 2841Novel Scheme to Segment Privacy and Securing Information to Brokering in Distributed Sharing
Sagar S. Sanghavi, Rajesh A. Auti
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1944 - 1949A Review of Privacy Protection of Cloud Storage and Steganography Techniques
Alok Ranjan, Mansi Bhonsle
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1285 - 1287Location Based Social Networking in Geo-Social Applications
Shamsiamol K Shaji, Boby Jose
Similar Articles with Keyword 'histogram shift'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 762 - 767Reversible Data Hiding in Encrypted Images
Chaple Gopal, G Balram
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 584 - 586A Review on Histogram Shifting for Reversible Watermarking Technique
Naina Gaharwar, Dr. Reena Gunjan
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2321 - 2323Integrated Data Hiding and Lossless Image Compression based on SMVQ and Image Inpainting
Sandeep Kumar, Nidhi Garg
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 32 - 34Reversible Watermarking using Histogram Shifting and Pixel Differences with Inverse S-scan order and Local Prediction
Naseera P. A
Review Papers, Computer Science & Engineering, India, Volume 7 Issue 5, May 2018
Pages: 616 - 619Reversible Data Hiding in Encrypted Images by Vacating Space in Advance
Prerna N. Deshmukh, Praveen Sathya