Downloads: 135 | Views: 273
Review Papers | Computer Science & Engineering | India | Volume 7 Issue 5, May 2018 | Popularity: 6.6 / 10
Reversible Data Hiding in Encrypted Images by Vacating Space in Advance
Prerna N. Deshmukh, Praveen Sathya
Abstract: Recently, more and more attention is paid to reversible data hiding (RDH) in encrypted images, since it maintains the excellent property that the original cover can be losslessly recovered after embedded data is extracted while protecting the image contents condentiality. All previous methods embed data by reversibly vacating room from the encrypted images, which may be subject to some errors on data extract ion and/or image restoration. In this paper, we propose a novel method by reserving room before encryption with a traditional RDH algorithm, and thus it is easy for the data hider to reversibly embed data in the encrypted image. The proposed method can achieve real reversibility, that is, data extraction and image recovery are free of any error. Experiments show that this novel method can embed more than 10 times as large payloads for the same image quality as the previous methods, such as for PSNR dB.
Keywords: Reversible data hiding, image encryption, privacy protection, histogram shift
Edition: Volume 7 Issue 5, May 2018
Pages: 616 - 619
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022
Pages: 654 - 659Image Encryption using (k, n) Secret Sharing Scheme using Lagrange Polynomial
GVSS Jayanth Anish
Downloads: 104
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1640 - 1647Privacy Preservation Protection for Personalized Web User by k-Anonymity with Profile Construction for Web Search Engines
Uma Maheswari.T, Dr.V. Kavitha
Downloads: 104
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1944 - 1949A Review of Privacy Protection of Cloud Storage and Steganography Techniques
Alok Ranjan, Mansi Bhonsle
Downloads: 105
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 1062 - 1064Enriching Process of Image Encryption and Compression Using Hierarchical Decomposition
Devashri Anil Vyawahare, Prof. Anil Gujar
Downloads: 105
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1285 - 1287Location Based Social Networking in Geo-Social Applications
Shamsiamol K Shaji, Boby Jose