Reversible Data Hiding in Encrypted Images by Reversible Image Transformation

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2018 by IJETT Journal
Volume-64 Number-1
Year of Publication : 2018
Authors : A.Sathi Babu, P.N.B.Swamy, P.Chenna rao
DOI :  10.14445/22315381/IJETT-V64P204

Citation 

MLA Style: A.Sathi Babu, P.N.B.Swamy, P.Chenna rao "Reversible Data Hiding in Encrypted Images by Reversible Image Transformation" International Journal of Engineering Trends and Technology 64.1 (2018): 24-30.

APA Style:A.Sathi Babu, P.N.B.Swamy, P.Chenna rao (2018). Reversible Data Hiding in Encrypted Images by Reversible Image Transformation. International Journal of Engineering Trends and Technology, 64(1), 24-30.

Abstract
Now a day’s data hiding and data encryption is more popular. People seek more security for day to day life styles. Here we presents an approach for data hiding in encrypted images at cloud server based on reversible data hiding in encrypted images by reversible image transformation. This approach is different from previous data hiding and encryption based frame works, in which we presents the cipher texts that are used embedding image and stores at cloud it may attract to allows the user to transform the content of user original image data into another target image with same size and format. We realize an RIT based method by improving the image transformation technique to be reversible data hiding model approaches.

Reference
[1] Z.Ni,Y.Shi,N.Ansari, and S.Wei, “Reversible data hiding, ”IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354–362, Mar. 2006.
[2] K.Hwang and D.Li, “Trusted cloud computing with securer sources and data coloring,” IEEE Internet Computer., vol.14 ,no.5,pp.14–22,Sep./Oct. 2010.
[3] F.Willems, D. Maas, and T. Kalker, “Semantic lossless source coding,” in Proc. 42nd Annu. Allerton Conf. Commun. Control Comput., 2004, pp. 1411–1418.
[4] W.Zhang, X. Hu, X. Li, and N. Yu, “Recursive histogram modification: Establishing equivalency between reversible data hiding and lossless data compression,” IEEE Trans. Image Process., vol. 22, no. 7, pp. 2775–2785,Jul. 2013.
[5] V.Sachnev, H. J. Kim, J. Nam, S. Suresh, and Y. Q. Shi, “Reversible watermarking algorithm using sorting and prediction,” IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 7, pp. 989–999, Jul. 2009.
[6] B.ou, X. Li, Y. Zhao, R. Ni, and Y. Shi, “Pairwise prediction-error expansion for efficient reversible data hiding,” IEEE Trans. Image Process., vol. 22, no. 12, pp. 5010–5021, Dec. 2013.
[7] I.-C.Dragoi and D. Coltuc, “Local-prediction-based difference expansion reversible watermarking,” IEEE Trans. Image Process., vol. 23, no. 4, pp. 1779–1790, Apr. 2014.
[8] J.Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896, Aug. 2003.
[9] Weiming Zhang Hui Wang, Dongdong Hou, and Nenghai Yu “Reversible Data Hiding in Encrypted Images by Reversible Image Transformation” IEEE transactions on multimedia, vol. 18, no. 8, august 2016
[10] X.Hu, W. Zhang, X. Li, and N. Yu, “Minimum rate prediction and optimized histograms modification for reversible data hiding,” IEEE Trans. Inf. Forensics Security, vol. 10, no. 3, 653–664, Mar. 2015.
[11] Xinpeng Zhang “Reversible Data Hiding in Encrypted Image,” IEEE SIGNAL PROCESSING LETTERS, VOL. 18, NO. 4, APRIL 2011.
[12] W.Hong, T. Chen, and H. Wu, “An improved reversible data hiding in encrypted images using side match,” IEEE Signal Process. Lett., vol. 19, no. 4, pp. 199–202, Apr. 2012.
[13] S.Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing,” in Proc. IEEE INFOCOM, Mar. 2010, pp. 1–9.

Keywords
Reversible data hiding, PSNR, Target image, embedding image