Advanced Reversible Data Hiding With Encrypted Data

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2014 by IJETT Journal
Volume-13 Number-7                          
Year of Publication : 2014
Authors : Shilpa Sreekumar , Vincy Salam
  10.14445/22315381/IJETT-V13P262

Citation 

Shilpa Sreekumar , Vincy Salam. "Advanced Reversible Data Hiding With Encrypted Data", International Journal of Engineering Trends and Technology (IJETT), V13(7),310-313 July 2014. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract

The advanced RDH work focuses on both data encryption and image encryption which makes it more secure and free of errors. All previous methods embed data without encrypting the data which may subject to errors on the data extraction or image recovery. The proposed work provides a novel RDH scheme in which both data and image can be encrypted and extracted reversibly without any errors. In the proposed work, data extraction and image recovery are free of any errors. The PSNR is significantly improved in the proposed work. This advanced work also performs data hiding in videos.

References

[1] Kede Ma, Weiming Zhang, Xianfeng Zhao, Member, IEEE, NenghaiYu, and Fenghua Li"Reversible Data Hiding in Encrypted Images byReserving Room Before Encryption" ieee transactions on information forensics and security, vol. 8, no. 3, march 2013.
[2] M. Goljan, J. Fridrich, and R. Du, “Distortion-free data embedding,” in Proc. 4th Int. Workshop on Information Hiding, Lecture Notes in Computer Science, 2001, vol. 2137, pp. 27–41.
[3] M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, “Lossless generalized- LSB data embedding,” IEEE Trans. Image Process., vol. 14, no. 2, pp. 253–266, Feb. 2005.
[4] J. Fridrich, M. Goljan, and R. Du, “Lossless data embedding for all image formats,” in Proc. Security and Watermarking of Multimedia Contents IV, Proc. SPIE, 2002, vol. 4675, pp. 572–583.
[5] J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896, Aug. 2003
[6] A. M. Alattar, “Reversible watermark using the difference expansion of a generalized integer transform,” IEEE Trans. Image Process., vol. 13, no. 8, pp. 1147–1156, Aug. 2004.
[7] Ratinder Kaur, V. K. Banga "Image Security using Encryption based Algorithm" International Conference on Trends in Electrical, ElectronicsandPowerEngineering (ICTEEP`2012) July 15-16, 2012 Singapore.
[8] Pia Singh Prof. Karamjeet Singh "Image encryption and decryption using blowfish algorithm in matlab" International Journal of Scientific & Engineering Research, Volume 4,Issue 7, July- 2013 150 ISSN 2229-5518.
[9] Prachi V. Powar , Prof. S.S.Agrawal "Design of digital video watermarking scheme using matlab simulink"PRACHI V POWAR* et al ISSN: 2319 1163 Volume: 2 Issue: 5 826 - 830 IJRET, MAY 2013.

Keywords
AES algorithm, Blowfish algorithm, Data embedding