Reversible data hiding in image encryption with efficient compression and enhanced security

Author(s):  
B. Elang Kavin ◽  
B. Latha
2018 ◽  
Vol 6 (1) ◽  
pp. 64-68
Author(s):  
V. M. Manikandan ◽  
◽  
V. Masilamani

2014 ◽  
Vol 6 (3) ◽  
pp. 16-29
Author(s):  
Xiyu Han ◽  
Zhenxing Qian ◽  
Guorui Feng ◽  
Xinpeng Zhang

This paper proposes a novel method for data hiding in encrypted image using image interpolation. Before the image encryption, the original image is sampled and an interpolation algorithm is used to calculate an estimation of the original image. Errors between the original image and the estimated image are compressed by Huffman encoding, which are further embedded into the estimated image to generate the redundant room. After image encryption using an encryption key, the secret bits are embedded into the reserved room. On the receiver side, the hidden bits can be extracted and the original content of the image can be perfectly recovered. Compared with the published results, the proposed method provides a larger embedding payload.


2010 ◽  
Author(s):  
Bian Yang ◽  
Christoph Busch ◽  
Xiamu Niu

2013 ◽  
Vol 11 (6) ◽  
pp. 2663-2667
Author(s):  
Musham Pradeep ◽  
D Srilatha

This paper proposes a scheme for detachable reversible data hiding in image encryption. In which the sender encrypts an image using encryption key. Then, the data is appended to the encrypted image using a data-hiding key. With an encrypted image containing additional data, if a receiver has the data-hiding key, he can extract the additional data though he does not know the content of the image. If the receiver has the encryption key, he can decrypt the encrypted image and get an image similar to the original one, but he cannot extract the additional data. If the receiver has both the data-hiding key and the encryption key, he can extract the additional data and recover the original image without any error.


2018 ◽  
Vol 2018 ◽  
pp. 1-12 ◽  
Author(s):  
Ming Li ◽  
Haiju Fan ◽  
Hua Ren ◽  
Dandan Lu ◽  
Di Xiao ◽  
...  

A novel method of meaningful image encryption is proposed in this paper. A secret image is encrypted into another meaningful image using the algorithm of reversible data hiding (RDH). High covertness can be ensured during the communication, and the possibility of being attacked of the secret image would be reduced to a very low level. The key innovation of the proposed method is that RDH is applied to compressive sensing (CS) domain, which brings a variety of benefits in terms of image sampling, communication and security. The secret image after preliminary encryption is embedded into the sparse representation coefficients of the host image with the help of the dictionary. The embedding rate could reach 2 bpp, which is significantly higher than those of other state-of-art schemes. In addition, the computational complexity of receiver is reduced. Simulations verify our proposal.


2021 ◽  
Vol 22 (2) ◽  
Author(s):  
V. M. Manikandan

The research in the domain of reversible data hiding got much attention in recent years due to its wide applications in medical image transmission and cloud computing.  Reversible data hiding during image encryption is a recently emerged framework for hiding secret data into an image during the image encryption process. In this manuscript, we propose a new reversible data hiding through encryption scheme which will ensure a high embedding rate without bringing any additional overhead of key handling. The proposed algorithm can use any secure symmetric encryption scheme, and the encryption and/or decryption key should be shared with the receiver for data extraction and image recovery. As per the proposed scheme, the data hider can hide three-bits of secret message in an image block of size $B\times B$ pixels. The data extraction image recovery will be carried out by analyzing the closeness between adjacent pixels. The simulation of the new scheme on the USC-SIPI dataset shows that the proposed scheme outperforms the well-known existing schemes in embedding rate and bit error rate.


Sign in / Sign up

Export Citation Format

Share Document