Open Access Open Access  Restricted Access Subscription or Fee Access

Implementing Novel Cryptography Technique in Image Encryption and Secure Data Hiding

D. Sujatha

Abstract


This work proposes a Secure and authenticated discrete reversible data hiding in images deals with security and authentication. In the first phase, a content owner encrypts the original image using an encryption key. Then, a data hider may compress the least significant bits of the encrypted image using a data hiding key to create a sparse space to accommodate some additional data. With an encrypted image containing additional data, if a receiver has the data hiding key, receiver can extract the additional data though receiver does not know the image content. If the receiver has the encryption key, can decrypt the received data to obtain an image similar to the original one, but cannot extract the additional data. If the receiver has both the data hiding key and the encryption key, can extract the additional data and recover the original content without any error. In order to achieve authentication AES algorithm is being used. And also compare the efficiency using PSNR and MSE. 


Keywords


Image Encryption, Data Embedding, Image Extraction, Reversible Data Hiding.

Full Text:

PDF

References


X. Zhang, “Reversible data hiding in encrypted image,” IEEE Signal Process. Lett., vol. 18,no. 4, pp. 255–258, Apr. 2011.

J. Tian, “Reversible data embedding using a difference expansion,”IEEE Trans. CircuitsSyst. Video Technol., vol. 13, no. 8, pp. 890–896,Aug. 2003.

Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Trans. Circuits Syst.Video Technol., vol. 16, no. 3, pp. 354–362, Mar.2006.

C.-C. Chang, C.-C.Lin, and Y.-H. Chen, “Reversible data-embedding scheme using differences between original and predicted pixel values,”IET Inform. Security, vol. 2, no. 2, pp.35–46, 2008.

M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber,“Lossless generalized- LSB data embedding,” IEEETrans. Image Process., vol. 14, no. 2, pp. 253–266,2005.

N. Memon and P. W. Wong, “A buyer-seller watermarking protocol,” IEEE Trans. Image Process., vol. 10, no. 4, pp. 643–649, Apr. 2001.

M. Kuribayashi and H. Tanaka, “Fingerprinting protocol for images based on additive homomorphic property,” IEEE Trans. Image Process., vol. 14, no. 12, pp. 2129–2139, Dec. 2005.

M. Johnson, P. Ishwar, V. M. Prabhakaran, D. Schonberg, and K. Ramchandran, “On compressing encrypted data,” IEEE Trans. Signal Process., vol. 52, no. 10, pp. 2992–3006, Oct. 2004.

W. Liu, W. Zeng, L. Dong, and Q. Yao, “Efficient compression of encrypted grayscale images,” IEEE Trans.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.