Reversible Data Hiding in Encrypted Images
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 113 | Weekly Hits: ⮙4

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014

Reversible Data Hiding in Encrypted Images

Chaple Gopal, G Balram

In recent times, more attention is paid to reversible data hiding (RDH) in encrypted images, since it preserves the excellent property that the original cover can be losslessly improved after embedded data is extracted while protecting the image contents privacy. All earlier methods embed data by reversibly vacating room from the encrypted images, which may be raise some errors on data extraction and image restoration. In this paper, we proposed a novel method by reserving room before encryption with a traditional RDH algorithm, and thus it is easier for the data hider to reversibly embed data in the encrypted image. Proposed method that can achieve the real reversibility, data extraction and image recovery are free of any error. This Experiments show that this novel method can embed more than 10 times as large payloads for the same image quality as the earlier methods, such as for PSNR dB.

Keywords: Reversible data hiding, image encryption, privacy protection, histogram shift

Edition: Volume 3 Issue 9, September 2014

Pages: 762 - 767

Share this Article

How to Cite this Article?

Chaple Gopal, G Balram, "Reversible Data Hiding in Encrypted Images", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SEP14267, Volume 3 Issue 9, September 2014, 762 - 767

Enter Your Registered Email Address





Similar Articles with Keyword 'Reversible data hiding'

Downloads: 103 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1130 - 1132

Survey On: Reversible Data Hiding in Encrypted JPEG Images

N. B. Pokale, Sanjivani S. Koli

Share this Article

Downloads: 109

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3099 - 3106

Separable Reversible Data Hiding In Encrypted Image Using Modified Least Significant Bit and Virtual Embedding

Shreya M. S., Sandeep Kumar S

Share this Article

Downloads: 111 | Weekly Hits: ⮙4 | Monthly Hits: ⮙11

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1251 - 1253

Survey of Reversible Data Hiding using Chaos and Genetic Algorithm in Encrypted JPEG Bitstream

Vaibhav Sonyabapu Barve, S. S. Bere

Share this Article

Downloads: 112 | Weekly Hits: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 7, July 2017

Pages: 2156 - 2159

Review on Reversible Data Hiding With Distributed Source Encoding Using Identity Hiding Mechanism for Image and Data Owner

Sanjyot A. Biranje, Dr. D S. Bhosle

Share this Article

Downloads: 113 | Weekly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 762 - 767

Reversible Data Hiding in Encrypted Images

Chaple Gopal, G Balram

Share this Article

Similar Articles with Keyword 'image encryption'

Downloads: 104 | Weekly Hits: ⮙4 | Monthly Hits: ⮙14

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1062 - 1064

Enriching Process of Image Encryption and Compression Using Hierarchical Decomposition

Devashri Anil Vyawahare, Prof. Anil Gujar

Share this Article

Downloads: 106 | Weekly Hits: ⮙3 | Monthly Hits: ⮙8

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2033 - 2036

A Survey Work on ETC System for an Efficient Image Encryption and Compression

Gauri Chavan, Prashant Kumbharkar

Share this Article

Downloads: 106 | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1330 - 1335

Efficient Image Encryption EIE - Compression System Using Haar Wavelets Using Matlab

Kavita, Anil Vadhwa

Share this Article

Downloads: 107 | Weekly Hits: ⮙5

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1830 - 1833

A Survey on Efficient ETC (Encryption-Then-Compression) Techniques for Image Data Security

Ganesh Lamkhade, Ajay Kumar Gupta

Share this Article

Downloads: 108 | Monthly Hits: ⮙6

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1548 - 1550

Joint Task Migration and Power Management in Wireless Computing

Dayanand G Savakar, Anand S Ghuli

Share this Article

Similar Articles with Keyword 'privacy protection'

Downloads: 103 | Weekly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1640 - 1647

Privacy Preservation Protection for Personalized Web User by k-Anonymity with Profile Construction for Web Search Engines

Uma Maheswari.T, Dr.V. Kavitha

Share this Article

Downloads: 103 | Weekly Hits: ⮙2 | Monthly Hits: ⮙11

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1944 - 1949

A Review of Privacy Protection of Cloud Storage and Steganography Techniques

Alok Ranjan, Mansi Bhonsle

Share this Article

Downloads: 104 | Weekly Hits: ⮙1

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1285 - 1287

Location Based Social Networking in Geo-Social Applications

Shamsiamol K Shaji, Boby Jose

Share this Article

Downloads: 106 | Weekly Hits: ⮙3 | Monthly Hits: ⮙15

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1948 - 1954

A New Security Business Frame work for Resource Attestation in cloud Environment

Vallabhaneni. Hema Latha, Kolluru. Suresh Babu

Share this Article

Downloads: 106 | Weekly Hits: ⮙4 | Monthly Hits: ⮙12

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2839 - 2841

Novel Scheme to Segment Privacy and Securing Information to Brokering in Distributed Sharing

Sagar S. Sanghavi, Rajesh A. Auti

Share this Article

Similar Articles with Keyword 'histogram shift'

Downloads: 113 | Weekly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 762 - 767

Reversible Data Hiding in Encrypted Images

Chaple Gopal, G Balram

Share this Article

Downloads: 113 | Weekly Hits: ⮙4 | Monthly Hits: ⮙11

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 584 - 586

A Review on Histogram Shifting for Reversible Watermarking Technique

Naina Gaharwar, Dr. Reena Gunjan

Share this Article

Downloads: 124 | Weekly Hits: ⮙5 | Monthly Hits: ⮙15

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2321 - 2323

Integrated Data Hiding and Lossless Image Compression based on SMVQ and Image Inpainting

Sandeep Kumar, Nidhi Garg

Share this Article

Downloads: 127 | Weekly Hits: ⮙6 | Monthly Hits: ⮙15

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 32 - 34

Reversible Watermarking using Histogram Shifting and Pixel Differences with Inverse S-scan order and Local Prediction

Naseera P. A

Share this Article

Downloads: 133 | Weekly Hits: ⮙4 | Monthly Hits: ⮙12

Review Papers, Computer Science & Engineering, India, Volume 7 Issue 5, May 2018

Pages: 616 - 619

Reversible Data Hiding in Encrypted Images by Vacating Space in Advance

Prerna N. Deshmukh, Praveen Sathya

Share this Article



Top