Research Article

A Secure Method for Data Hiding in Encrypted Image using Progressive Recovery

by  Bhakti Narayan Patil, Sanyukta Bhaskar Patil, Mansi Kailash Patil, Neha Mahyavanshi
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 161 - Issue 13
Published: Mar 2017
Authors: Bhakti Narayan Patil, Sanyukta Bhaskar Patil, Mansi Kailash Patil, Neha Mahyavanshi
10.5120/ijca2017913409
PDF

Bhakti Narayan Patil, Sanyukta Bhaskar Patil, Mansi Kailash Patil, Neha Mahyavanshi . A Secure Method for Data Hiding in Encrypted Image using Progressive Recovery. International Journal of Computer Applications. 161, 13 (Mar 2017), 1-5. DOI=10.5120/ijca2017913409

                        @article{ 10.5120/ijca2017913409,
                        author  = { Bhakti Narayan Patil,Sanyukta Bhaskar Patil,Mansi Kailash Patil,Neha Mahyavanshi },
                        title   = { A Secure Method for Data Hiding in Encrypted Image using Progressive Recovery },
                        journal = { International Journal of Computer Applications },
                        year    = { 2017 },
                        volume  = { 161 },
                        number  = { 13 },
                        pages   = { 1-5 },
                        doi     = { 10.5120/ijca2017913409 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2017
                        %A Bhakti Narayan Patil
                        %A Sanyukta Bhaskar Patil
                        %A Mansi Kailash Patil
                        %A Neha Mahyavanshi
                        %T A Secure Method for Data Hiding in Encrypted Image using Progressive Recovery%T 
                        %J International Journal of Computer Applications
                        %V 161
                        %N 13
                        %P 1-5
                        %R 10.5120/ijca2017913409
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

The existing paper explains reversible data hiding in encrypted images based on progressive recovery. Image processing is a method to convert an image into digital form and perform some operations on it, in order to yield an enhanced image or to extract some essential information from it. Three parties are involved in the framework, including the content owner, the data-hider, and the recipient. The owner encrypts the original image using an algorithm i.e. stream cipher . The method proposes stream cipher algorithm such as the AES (Advanced Encryption Standard)and uploads cipher text to the server. The data-hider on the server divides the encrypted image into three channels and respectively insert different amount of additional bits into each channel to generate a marked encrypted image. On the recipient side, additional message can be extracted from the marked encrypted image, and error free image can be recovered. Reversible data hiding is a technique used to recover original content it can be perfectly restored after extraction of the hidden message.

References
  • N. F. Johnson and S. Jajodia, “Exploring steganography: theunseen,” Computer, vol. 31, no. 2, pp. 26-34, 1998.
  • N. Provos and P. Honeyman, “Hide and seek: an introduction tosteganography,” Security & Privacy, IEEE, vol. 1, no. 3, pp. 32-44, 2003.
  • F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding-a survey,” Proceedings of the IEEE, vol. 87, no. 7, pp. 1062- 1078, 1999
  • H. Otori and S. Kuriyama, “Data-embeddable texture synthesis,” in Proc. of the 8th International Symposium on Smart Graphics, Kyoto, Japan,
  • H. Otori and S. Kuriyama, “Texture synthesis for mobile data communications,” IEEE Comput.Graph. Appl., vol. 29, no. 6, pp. 74- 81
  • A. Efros and T. K. Leung, “Texture synthesis by non-parametric sampling”, in Proceedings of 7th IEEE International Conference on Computer Vision, pp. 1033–1038, Sep. 1999.
  • Efros and T. K. Leung, “Texture synthesis by non- parametric sampling”, in Proceedings of 7th IEEE International Conference on Computer Vision, pp. 1033– 1038, Sep. 1999.
  • L. Liang, C. Liu, Y.-Q.Xu, B. Guo, and H.-Y. Shum, “Real-time texture synthesis by patch-based sampling”, ACM Transactions on Graph Theory, vol. 20, no. 3, pp. 127–150, May 2001.
  • Efros and W. T. Freeman, “Image quilting for texture synthesis and transfer”, in Proceedings of 28th Annual Conference on Computer Graph. Interaction Technology, pp. 341–346, Sep. 2011.
  • Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEETrans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354- 362, 2006.
  • C. W. Honsinger, P. Jones, M. Rabbani, and J. C. Stoffel, “Lossless Recovery of an Original Image Containing Embedded Data,” U.S. Patent 6 278 791 B1, Aug. 21, 2001
  • Zhicheng Ni, Yun-Qing Shi, Nirwan Ansari, and Wei Su , Reversible Data Hiding , IEEE Transactions On Circuits And Systems For Video Technology, Vol. 16, No. 3, March 2006
  • Chuan Qin , Chin-ChenChang , Yen-ChangChen , Efficient reversible datahiding for VQ-compressed images based on index mapping mechanism , Signal Processing 2687–2695 , 2013.
  • N.M. Nasrabadi,R.King,Image coding using vector quantization a review,IEEETransactionsonCommunications 36 957–971 , 1988.
  • C.C. Chang,W.C.Wu,Fast planar-oriented ripple search algorithm for hyperspace VQ codebook,IEEE Transactionson Image Processing 16(6) 1538–1547 ,2007.
  • Qin, Chuan, Chin-Chen Chang, and Yen-Chang Chen. "Efficient reversible data hiding for VQ-compressed images based on index mapping mechanism", Signal Processing, 2013.
  • Wien Hong ,Tung-ShouChen , Mei-ChenWua , An improved human visual system based reversible data hiding method using adaptive histogram modification ,Optics Communications 291 87–97 , 2013
  • Hong, Wien, Tung-Shou Chen, and Mei-Chen Wu. "An improved human visual system based reversible data hiding method using adaptive histogram modification", Optics Communications, 2013.
  • FeiPeng, XiaolongLi, BinYang, Adaptive reversible data hiding scheme based on integer transform. Signal Processing (2012) 54–62.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Encryption Decryption Reversible Data hiding scrambling intrascrambling AES algorithm

Powered by PhDFocusTM