Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

A Data Embedding Scheme using Encrypted Images

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 107 - Number 3
Year of Publication: 2014
Authors:
Athira M A
Sreebala P
Vipin Krishnan C V
10.5120/18733-9975

Athira M A, Sreebala P and Vipin Krishnan C V. Article: A Data Embedding Scheme using Encrypted Images. International Journal of Computer Applications 107(3):24-29, December 2014. Full text available. BibTeX

@article{key:article,
	author = {Athira M A and Sreebala P and Vipin Krishnan C V},
	title = {Article: A Data Embedding Scheme using Encrypted Images},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {107},
	number = {3},
	pages = {24-29},
	month = {December},
	note = {Full text available}
}

Abstract

The use of computer networks for data transmission has created the need of security. Transmission of images is a daily routine and it is necessary to find an efficient way to transmit them over networks. This work describes the concept of Separable Reversible data hiding technique. When it is desired to send the confidential data over an insecure channel, it mustbe encrypted as well as compress the cover data and then embed the data into that cover data. Also it is important that the data hiding should be reversible in nature, and should be suitable for the encryption/decryption domain. In the Modified System, a content owner encrypts the original uncompressed image using an encryption key to produce an encrypted image. The data hider can hide the data in the encrypted image compressing the least significant bits of the encrypted image to obtain the space to hide the data by using data hiding key. The data can be retrieved at the receiver side using the data hiding key without the need for decrypting the image. But, the encrypted image will remain unchanged till it is decrypted using the encryption key,to reveal the original image content. The receiver who has both the encryption and data hidings keys can access the data embedded as well as the original image.

References

  • XinpengZhang(2011), Reversible Data Hiding in Encrypted Image, IEEE SIGNAL PROCESSING LETTERS, VOL. 18, NO. 4
  • VinitAgham and TareekPattewar, A survey on seperable reversible data hiding technique, IMACST: VOLUME 4 NUMBER 1 MAY 2013
  • ZaidoonKh. AL-Ani, A. A. Zaidan, B. B. Zaidan and Hamdan. O. Alanazi (2010), Overview: Main Fundamentals for Steganography, JOURNAL OF COMPUTING, VOLUME 2, ISSUE 3.
  • Firas A. Jassim (2013), A Novel Steganography Algorithm for Hiding Text in Image using Five Modulus Method, International Journal of Computer Applications,Volume 72 No. 17
  • Deepthi Barbara Nickolas, Sindhuja. Ba, Sivasankar. A (2013), Enhance-ment of Data Hiding Process in Encrypted Image Using Advanced Encryption Standard, International Journal of Current Engineering and Technology, Vol. 3, No. 2
  • Majdi Al-Qdah (2013), Fast and Secure Image Hiding Scheme Based on Cryptographic Techniques, Journal of Emerging Trends in Computing and Information Sciences, Vol. 4, No. 2
  • Vivek Jain1, Lokesh Kumar2, , Madhur Mohan Sharma3, Mohd Sadiq4, Kshitiz Rastogi5(2012), PUBLIC-KEY STEGANOGRAPHY BASED ON MODIFIED LSB METHOD, Students of CSE department, IMS Engineering College,
  • Eugene T Lin and Edward J. delp,A Review of data hiding in dig-italimges,Video and Image processing Laboratory (VIPER) School of Electrical and computer Engineering purde university West lafayette,IndianaS
  • Chi-Kwong Chan, L. M. Cheng(2003), Hiding data in images by simple LSB substitution, Department of Computer Engineering and Information Technology, City University of Hong Kong, Hong Kong
  • Jun Tian(2003), Reversible Data Embedding Using a Difference Expan-sion, IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY,VOL. 13, NO. 8
  • Aman Kumar, Dr. SudeshJakhar, Mr. Sunil Makkar (2012), International Journal of Advanced Research in Computer Science and Software Engineering,vol. 2, issue 7 .