Secure Reversible Data Hiding in Encrypted Images by Allocating Memory before Encryption via Security keys
Digital image and information embedding system have number of important multimedia applications. Recently, attention is paid to reversible data hiding (RDH) in encrypted images is more, since it maintains the excellent property that the original cover can be lossless recovered after embedded data is extracted while protecting the image contentâ€™s confidentiality. RDH is a technique used to hide data inside image for high security in such a way that original data is not visible. All previous methods embed data by reversibly vacating room from the encrypted images, which may be subject to some errors on data extraction and/or image restoration. In this paper, we propose another method in which we simply encrypt an image without its header by using our own algorithm. And thus it is easy for the data hider to reversibly embed data in the encrypted image. The proposed method can achieve real reversibility, that is, data extraction and image recovery are free of any error.
T. Kalker and F.M.Willems, â€œCapacity bounds and code constructions for reversible data-hiding,â€ in Proc. 14th Int. Conf. Digital Signal Processing (DSP2002), 2002, pp. 71â€“76.
Zhang, B. Chen, and N. Yu, â€œCapacity-approaching codes for reversible data hiding,â€ in Proc 13th Information Hiding (IHâ€™2011),LNCS 6958, 2011, pp. 255â€“269, Springer-Verlag.
W. Zhang, B. Chen, and N. Yu, â€œImproving various reversible data hiding schemes via optimal codes for binary covers,â€ IEEE Trans.Image Process., vol. 21, no. 6, pp. 2991â€“3003, Jun. 2012.
J. Fridrich and M. Goljan, â€œLossless data embedding for all image formats,â€ in Proc. SPIE Proc. Photonics West, Electronic Imaging, Security and Watermarking of Multimedia Contents, San Jose, CA, USA, Jan. 2002, vol. 4675, pp. 572â€“583.
J. Tian, â€œReversible data embedding using a difference expansion,â€ IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890â€“896, Aug. 2003.
Z. Ni, Y. Shi, N. Ansari, and S. Wei, â€œReversible data hiding,â€ IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354â€“362, Mar. 2006.
D.M. Thodi and J. J. Rodriguez, â€œExpansion embedding techniques for reversible watermarking,â€ IEEE Trans. Image Process., vol. 16, no. 3, pp. 721â€“730, Mar. 2007.
X. L. Li, B. Yang, and T. Y. Zeng, â€œEfficient reversible watermarking based on adaptive prediction-error expansion and pixel selection,â€ IEEE Trans. Image Process., vol. 20, no. 12, pp. 3524â€“3533, Dec. 2011.
P. Tsai, Y. C. Hu, and H. L. Yeh, â€œReversible image hiding scheme using predictive coding and histogram shifting,â€ Signal Process., vol. 89, pp. 1129â€“1143, 2009.
L. Luo et al., â€œReversible image watermarking using interpolation technique,â€ IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 187â€“193, Mar. 2010.
V. Sachnev, H. J. Kim, J. Nam, S. Suresh, and Y.-Q. Shi, â€œReversible watermarking algorithm using sorting and prediction,â€ IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 7, pp. 989â€“999, Jul. 2009.
A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography. Boca Raton, FL, USA: CRC, 1996.
K. Hwang and D. Li, â€œTrusted cloud computing with secure resources and data coloring,â€ IEEE Internet Comput., vol. 14, no. 5, pp. 14â€“22, Sep./Oct. 2010.
M. Johnson, P. Ishwar, V. M. Prabhakaran, D. Schonberg, and K. Ramchandran, â€œOn compressing encrypted data,â€ IEEE Trans. Signal Process, vol. 52, no. 10, pp. 2992â€“3006, Oct. 2004. 562 IEEE Transactions On Information Forensics And Security, Vol. 8, No. 3, March 2013
W. Liu, W. Zeng, L. Dong, and Q. Yao, â€œEfficient compression of encrypted grayscale images,â€ IEEE Trans. Image Process., vol. 19, no. 4, pp. 1097â€“1102, Apr. 2010.
X. Zhang, â€œReversible data hiding in encrypted images,â€ IEEE Signal Process. Lett, vol. 18, no. 4, pp. 255â€“258, Apr. 2011.
W. Hong, T. Chen, and H.Wu, â€œAn improved reversible data hiding in encrypted images using side match,â€ IEEE Signal Process. Lett, vol. 19, no. 4, pp. 199â€“202, Apr. 2012.
X. Zhang, â€œSeparable reversible data hiding in encrypted image,â€ IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 826â€“832, Apr. 2012.
Miscellaneous Gray Level Images [Online]. Available:http://decsai.ugr.es/cvg/dbimagenes/g512.php
The submitter hereby warrants that the Work (collectively, the “Materials”) is original and that he/she is the author of the Materials. To the extent the Materials incorporate text passages, figures, data or other material from the works of others, the undersigned has obtained any necessary permissions. Where necessary, the undersigned has obtained all third party permissions and consents to grant the license above and has all copies of such permissions and consents.
The submitter represents that he/she has the power and authority to make and execute this assignment. The submitter agrees to indemnify and hold harmless the COMPUSOFT from any damage or expense that may arise in the event of a breach of any of the warranties set forth above. For authenticity, validity and originality of the research paper the author/authors will be totally responsible.