International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015

Separable Reversible Data Hiding In Encrypted Image Using Modified Least Significant Bit and Virtual Embedding

Shreya M. S., Sandeep Kumar S

Nowadays digital communication has become an essential part of our daily activities. A lot of applications are internet-based and it is important that communication be made secret especially if it involves exchange of confidential information. As a result, the security of information passed over an open channel has become a fundamental issue and therefore, the confidentiality and data integrity are required to protect against unauthorized access and use. This has led to an unstable growth in the field of information hiding. Cryptography and steganography are the two popular methods available to provide security. Using cryptography, the data is transformed into some other gibberish form and then the encrypted data is transmitted. In steganography, the data is embedded in an image without affecting the quality of the image and that image will be transmitted. This paper proposes a new method for embedding the data inside the image using ordinal virtual embedding technique and also modification of data.

Keywords: Cryptography, Feedback shift, MLSB, Ordinal Virtual Embedding, Reversible Data Hiding, Steganography, Separable Reversible Data Hiding

Edition: Volume 4 Issue 4, April 2015

Pages: 3099 - 3106


How to Cite this Article?

Shreya M. S., Sandeep Kumar S, "Separable Reversible Data Hiding In Encrypted Image Using Modified Least Significant Bit and Virtual Embedding", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB153846, Volume 4 Issue 4, April 2015, 3099 - 3106

21 PDF Views | 23 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cryptography'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2927 - 2930

Incorporating Google Cloud Based Pub/Sub in Implementation of Identity Concentrated Encryption

Shilpashree K S, Harshavardhan L

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2062 - 2066

XOR- Based Secrete Sharing Scheme For Image Database Security: A Review

Bhagyashree A. Dhamande, Rutuja N. Kamble

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2214 - 2220

A Comprehensive Survey on: Quantum Cryptography

Pranav Verma, Ritika Lohiya

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016

Pages: 1885 - 1890

A Proposed Paper for D-Scrabble Physical Layer Security Model Integrated with AI

Devansh Dave

Share this article



Similar Articles with Keyword 'MLSB'

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 2024 - 2028

A Review on Various Approaches for Image Steganography

Urvashi, Amninder Kaur

Share this article

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1547 - 1549

Various Approaches of Video and Image Stenography: A Review

Mandeep Singh, Garima Mahajan

Share this article

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1367 - 1370

A Review on Various Approaches of Video Steganography

Sapanpreet Kaur, Mandeep Kaur

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 9, September 2016

Pages: 668 - 673

Secure Secret Information Transmission with Audio-Video Steganography Using Encryption and Data Authentication

Mandeep Singh, Garima Mahajan

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 626 - 631

Data Hiding In Digital Image Using MD5 and DES

Harsimranjeet Kaur

Share this article



Similar Articles with Keyword 'Reversible Data Hiding'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2321 - 2323

Integrated Data Hiding and Lossless Image Compression based on SMVQ and Image Inpainting

Sandeep Kumar, Nidhi Garg

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3099 - 3106

Separable Reversible Data Hiding In Encrypted Image Using Modified Least Significant Bit and Virtual Embedding

Shreya M. S., Sandeep Kumar S

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 248 - 251

Efficient Data Security System Using Room Reservation Approach on Digital Images for Secret Sharing using Color Visual Cryptography

Aparna T. Deshmukh, Jyoti Raghatwan

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2480 - 2483

PSO (Particle Swarm Optimization) Based Reversible Data Hiding

Kritika Jaidka, Amandeep Mavi

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 7, July 2017

Pages: 2156 - 2159

Review on Reversible Data Hiding With Distributed Source Encoding Using Identity Hiding Mechanism for Image and Data Owner

Sanjyot A. Biranje, Dr. D S. Bhosle

Share this article



Similar Articles with Keyword 'Steganography'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2319 - 2323

Performance Enhancement of a Transform Domain Based SteganographicTechnique Using Segmentation

Harjeet Kaur, Er Divya Goyal

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3198 - 3203

A Study and Review of Techniques of Spatial Steganography

Ravneet Kaur, Bhavneet Kaur

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 560 - 563

Survey of Cheating Prevention Techniques in Visual Cryptography

Smita Patil, Jyoti Rao

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2382 - 2385

Data Sharing through Multimedia Steganocryptic and Visual Cryptography System

Gajangi Rahul Kumar, U.Shivaji

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 2024 - 2028

A Review on Various Approaches for Image Steganography

Urvashi, Amninder Kaur

Share this article



Similar Articles with Keyword 'Separable Reversible Data Hiding'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3099 - 3106

Separable Reversible Data Hiding In Encrypted Image Using Modified Least Significant Bit and Virtual Embedding

Shreya M. S., Sandeep Kumar S

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2480 - 2483

PSO (Particle Swarm Optimization) Based Reversible Data Hiding

Kritika Jaidka, Amandeep Mavi

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 378 - 384

Separable Reversible Data Hiding Using Matrix Addition Compression Approach For Color Images

Sneshshree Dengle, Dr. Santosh Lomte

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 449 - 455

Security of Information Using Cryptography and Image Processing

Mrunalinee Patole, Sheela A Bankar

Share this article
Top