Open Access Open Access  Restricted Access Subscription or Fee Access

Secure Communication for Reversible Data Hiding in Encrypted Images by Reserving Room before Encryption Technique

A. Balakumar, R. Senthilkumar


Reversible data hiding (RDH) in encrypted images, in this encryption method to readable data is converted into unreadable data format to using cipher text. In this data can be displayed into the reversible manner to using a RDH technique and it is a securable one. The reversible information can be inserting into the back side of the image. So, both the images and data can be hided after the encryption. So, no one can access without knowing the encryption key. Finally receiver to the hided images and data can be recovering to the original format without any error. The embed maximum 10 times to improve the image quality compare to the previous method, such as peak to signal noise ratio is 60 db.


RDH Technique, Cipher Text, Image Encryption, Privacy Protection.

Full Text:



Kede ma Weiming Zhang, “Reversible Data Hiding in Encrypted Images by Reserving Room before Encryption” Vol 8. No.3, March 2013.

T. Kalker and F.M.Willems, “Capacity bounds and code constructions for reversible data-hiding,” in Proc. 14th Int. Conf. Digital Signal Processing (DSP2002), 2002, pp. 71–76.

W. Zhang, B. Chen, and N. Yu, “Capacity-approaching codes for reversible data hiding,” in Proc 13th Information Hiding (IH’2011),LNCS 6958, 2011, pp. 255–269, Springer-Verlag.

W. Zhang, B. Chen, and N. Yu, “Improving various reversible data hiding schemes via optimal codes for binary covers,” IEEE Trans. Image Process., vol. 21, no. 6, pp. 2991–3003, Jun. 2012.

J. Fridrich and M. Goljan, “Lossless data embedding for all image formats,” in Proc. SPIE Proc. Photonics West, Electronic Imaging, Security and Watermarking of Multimedia Contents, San Jose, CA, USA, Jan. 2002, vol. 4675, pp. 572–583.

J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896, Aug. 2003.

Z. Ni, Y. Shi, N. Ansari, and S. Wei, “Reversible data hiding,” IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354–362, Mar.2006.

D.M. Thodi and J. J. Rodriguez, “Expansion embedding techniques for reversible watermarking,” IEEE Trans. Image Process., vol. 16, no. 3, pp. 721–730, Mar. 2007.

X. L. Li, B. Yang, and T. Y. Zeng, “Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection,” IEEE Trans. Image Process., vol. 20, no. 12, pp. 3524–3533, Dec. 2011.

P. Tsai, Y. C. Hu, and H. L. Yeh, “Reversible image hiding scheme using predictive coding and histogram shifting,” Signal Process., vol. 89, pp. 1129–1143, 2009.

L. Luoet al., “Reversible image watermarking using interpolation technique,” IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 187–193, Mar. 2010.

X. Zhang, “Separable data hiding in encrypted image”, IEEE Trans inform Forensics security, vol. 7, no.2, pp. 826, Apr. 2012.

Ni, Y.-Q.Shi, N.Ansari, and W.Su, “Reversible data hiding”, IEE Trans. Circuits syst. Video technol., vol. 16, no.3, pp. 354-362, Mar. 2006.

X.Zhang, “Reversible data hiding in encrypted images”, IEEE Signal Process.Lett., vol. 18, no.4, pp.255-258, Apr. 2011.

W.Hong, T.Chen, and H.Wu, “An improved reversible data hiding in encrypted images using side match”,IEEE Signal process.Lett., vol. 19, no. 4,pp. 199-202, Apr. 2012

Rintu Jose and Gincy Abraham, “A Separable Reversible Data Hiding in Encrypted Image with Improved Performance” International conference on Microelectronics, communication and Renewable Energy (icmicr-2013)

L. Luo et al., “Reversible image water making using interpolation technique”, IEEE Trans. Inf. Forensics security, vol. 5, pp. 187-193, March. 2010


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.