Full Paper View Go Back

A Novel RDH Scheme for Real Time Applications

Uma Shivalli1 , B.K.Sujatha 2

1 Dept. of Telecommunication Engineering, M S Ramaiah Institute of Technology, Banglore, India.
2 Dept. of Telecommunication Engineering, M S Ramaiah Institute of Technology, Banglore, India.

Correspondence should be addressed to: umashivalli9@gmail.com.


Section:Research Paper, Product Type: Journal
Vol.5 , Issue.3 , pp.113-116, Jun-2017

Online published on Jun 30, 2017


Copyright © Uma Shivalli, B.K.Sujatha . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Uma Shivalli, B.K.Sujatha, “A Novel RDH Scheme for Real Time Applications,” International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.3, pp.113-116, 2017.

MLA Style Citation: Uma Shivalli, B.K.Sujatha "A Novel RDH Scheme for Real Time Applications." International Journal of Scientific Research in Network Security and Communication 5.3 (2017): 113-116.

APA Style Citation: Uma Shivalli, B.K.Sujatha, (2017). A Novel RDH Scheme for Real Time Applications. International Journal of Scientific Research in Network Security and Communication, 5(3), 113-116.

BibTex Style Citation:
@article{Shivalli_2017,
author = {Uma Shivalli, B.K.Sujatha},
title = {A Novel RDH Scheme for Real Time Applications},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {6 2017},
volume = {5},
Issue = {3},
month = {6},
year = {2017},
issn = {2347-2693},
pages = {113-116},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=281},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=281
TI - A Novel RDH Scheme for Real Time Applications
T2 - International Journal of Scientific Research in Network Security and Communication
AU - Uma Shivalli, B.K.Sujatha
PY - 2017
DA - 2017/06/30
PB - IJCSE, Indore, INDIA
SP - 113-116
IS - 3
VL - 5
SN - 2347-2693
ER -

961 Views    412 Downloads    321 Downloads
  
  

Abstract :
Significance of Multimedia security is ever increasing due to threat of duplication, modification and manipulation of the multimedia data like photograph and documents. In the recent days reversible data hiding(RDH) in encrypted images is gaining widespread application in the digital world. Use of RDH for real time application helps in losslessly recovering the original image after the embedded data is extracted and image content’s confidentiality is also protected. In this paper we propose a novel method of RDH for real time multimedia data by reserving room. Performance analysis is done for different embedding rates. Experimental results show that, this novel method ensures better security of the multimedia data and protects the original image from manipulation by the data hider.

Key-Words / Index Term :
Image encryption, Reversible data hiding, Histogram, data extraction, PSNR

References :
[1] Xiaolong Li, Weiming Zhang, Xinlu Gui, Bin Yang, “A Novel Reversible Data Hiding Scheme Based on Two-Dimensional Difference-Histogram Modification”, IEEE Transactions on Information forensics and security, Vol. 8, No. 7, pp.1-7, 2013.
[2] Shobha Elizabeth Rajan, Sreedevi P, "Enhancing Visual Cryptography Using Digital Watermarking", International Journal of Computer Sciences and Engineering, Vol.3, Issue.7, pp.152-156, 2015.
[3] Kede Ma, Weiming Zhang, Xianfeng Zhao, Nenghai Yu, Fenghua Li, “Reversible Data hiding in Encrypted Images by Reserving Room before Encryption”, IEEE Trans. Inf. Forensics Security, Vol. 8, No. 3, pp. 826-832, 2013.
[4] W .Hong, T. Chen, H. Wu, “An improved reversible data hiding in encrypted images using side match”, IEEE Signal Process. Lett., Vol.19, No. 4, pp. 199-202, 2012.
[5] X. Zhang, “Separable reversible data hiding in encrypted image”, IEEE Trans. Inf. Forensics Security, Vol. 7, No. 2, pp. 826-832, 2012.
[6] X.L.Li, B.Yang, and T.Y.Zeng, “Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection”, IEEE Trans. Image Process., Vol.20, No.12, pp.3524-3533, 2011.
[7] Zhi-Hui Wang, Chin-Chen Chang, Pei-Yu Tsai, “Hiding Secret Data in an Image Using Codeword Imitation”, Journal of Information Processing Systems, Vol.6, No.4, pp.435-452, 2010.
[8] Akhila Sreenivas K. and Pretty Babu , "An Approach for Data Hiding Technique Based on Reversible Texture Synthesis", International Journal of Computer Sciences and Engineering, Vol.4, Issue.7, pp.81-85, 2016.
[9] Nitin Shelake and S. R. Durugkar , "Extracting Hidden Data from Encrypted Images Using IWT", International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.219-222, 2015.
[10] J. Fridrich and M. Goljan, “Lossless data embedding for all image for-mats”, in Proc. SPIE Proc. Photonics West, Electronic Imaging, Secu-rity and Watermarking of Multimedia Contents, San Jose, CA, USA, pp. 572-583, 2002.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.

Impact Factor

Journals Contents

Information

Downloads

Digital Certificate

Go to Navigation