A Novel RDH Scheme for Real Time Applications

Authors

  • Uma Shivalli Dept. of Telecommunication Engineering, M S Ramaiah Institute of Technology, Banglore, India
  • B.K. Sujatha Dept. of Telecommunication Engineering, M S Ramaiah Institute of Technology, Banglore, India

Keywords:

Image encryption, Reversible data hiding, Histogram, data extraction, PSNR

Abstract

Significance of Multimedia security is ever increasing due to threat of duplication, modification and manipulation of the multimedia data like photograph and documents. In the recent days reversible data hiding(RDH) in encrypted images is gaining widespread application in the digital world. Use of RDH for real time application helps in losslessly recovering the original image after the embedded data is extracted and image content’s confidentiality is also protected. In this paper we propose a novel method of RDH for real time multimedia data by reserving room. Performance analysis is done for different embedding rates. Experimental results show that, this novel method ensures better security of the multimedia data and protects the original image from manipulation by the data hider.

 

References

Xiaolong Li, Weiming Zhang, Xinlu Gui, Bin Yang, “A Novel Reversible Data Hiding Scheme Based on Two-Dimensional Difference-Histogram Modification”, IEEE Transactions on Information forensics and security, Vol. 8, No. 7, pp.1-7, 2013.

Shobha Elizabeth Rajan, Sreedevi P, "Enhancing Visual Cryptography Using Digital Watermarking", International Journal of Computer Sciences and Engineering, Vol.3, Issue.7, pp.152-156, 2015.

Kede Ma, Weiming Zhang, Xianfeng Zhao, Nenghai Yu, Fenghua Li, “Reversible Data hiding in Encrypted Images by Reserving Room before Encryption”, IEEE Trans. Inf. Forensics Security, Vol. 8, No. 3, pp. 826-832, 2013.

W .Hong, T. Chen, H. Wu, “An improved reversible data hiding in encrypted images using side match”, IEEE Signal Process. Lett., Vol.19, No. 4, pp. 199-202, 2012.

X. Zhang, “Separable reversible data hiding in encrypted image”, IEEE Trans. Inf. Forensics Security, Vol. 7, No. 2, pp. 826-832, 2012.

X.L.Li, B.Yang, and T.Y.Zeng, “Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection”, IEEE Trans. Image Process., Vol.20, No.12, pp.3524-3533, 2011.

Zhi-Hui Wang, Chin-Chen Chang, Pei-Yu Tsai, “Hiding Secret Data in an Image Using Codeword Imitation”, Journal of Information Processing Systems, Vol.6, No.4, pp.435-452, 2010.

Akhila Sreenivas K. and Pretty Babu , "An Approach for Data Hiding Technique Based on Reversible Texture Synthesis", International Journal of Computer Sciences and Engineering, Vol.4, Issue.7, pp.81-85, 2016.

Nitin Shelake and S. R. Durugkar , "Extracting Hidden Data from Encrypted Images Using IWT", International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.219-222, 2015.

J. Fridrich and M. Goljan, “Lossless data embedding for all image for-mats”, in Proc. SPIE Proc. Photonics West, Electronic Imaging, Secu-rity and Watermarking of Multimedia Contents, San Jose, CA, USA, pp. 572-583, 2002.

Downloads

Published

2017-06-30

How to Cite

[1]
U. Shivalli and B. Sujatha, “A Novel RDH Scheme for Real Time Applications”, Int. J. Sci. Res. Net. Sec. Comm., vol. 5, no. 3, pp. 113–116, Jun. 2017.

Issue

Section

Research Article

Similar Articles

<< < 7 8 9 10 11 12 13 > >> 

You may also start an advanced similarity search for this article.