235 research outputs found

    A Survey on Reversible Image Data Hiding Using the Hierarchical Block Embedding Technique

    Get PDF
    The use of graphics for data concealment has significantly advanced the fields of secure communication and identity verification. Reversible data hiding (RDH) involves hiding data within host media, such as images, while allowing for the recovery of the original cover. Various RDH approaches have been developed, including difference expansion, interpolation techniques, prediction, and histogram modification. However, these methods were primarily applied to plain photos. This study introduces a novel reversible image transformation technique called Block Hierarchical Substitution (BHS). BHS enhances the quality of encrypted images and enables lossless restoration of the secret image with a low Peak Signal-to-Noise Ratio (PSNR). The cover image is divided into non-overlapping blocks, and the pixel values within each block are encrypted using the modulo function. This ensures that the linear prediction difference in the block remains consistent before and after encryption, enabling independent data extraction without picture decryption. In order to address the challenges associated with secure multimedia data processing, such as data encryption during transmission and storage, this survey investigates the specific issues related to reversible data hiding in encrypted images (RDHEI). Our proposed solution aims to enhance security (low Mean Squared Error) and improve the PSNR value by applying the method to encrypted images

    A Multistage High Capacity Reversible Data Hiding Technique Without Overhead Communication

    Get PDF
    Reversible Data Hiding(RDH) has been extensively investigated, recently, due to its numerous applications in the field of defence, medical, law enforcement and image authentication. However, most of RDH techniques suffer from low secret data hiding capacity and communication overhead. For this, multistage high-capacity reversible data hiding technique without overhead is proposed in this manuscript. Proposed reversible data hiding approach exploits histogram peaks for embedding the secret data along with overhead bits both in plain and encrypted domain. First, marked image is obtained by embedding secret data in the plain domain which is further processed using affine cipher maintaining correlation among the pixels. In second stage, overhead bits are embedded in the encrypted marked image. High embedding capacity is achieved through exploiting histogram peak for embedding multiple bits of secret data. Proposed approach is experimentally validated on different datasets and results are compared with the state-of-the-art techniques over different images

    Novel Frame work for Improving Embedding Capacity of the System using Reversible Data Hiding Technique

    Get PDF
    Internet communication has become an essential part of infrastructure of today’s world. The secret information communicated in various forms. Security of the secret information has been a challenge when the heavy amount of data is exchanged on the internet. A secure data transfer can be achieved by steganography and Cryptography. Steganography is a process of hiding the information into cover media while cryptography is the technique that encodes the message using encryption key. In this paper described the reversible data hiding concept. This maintains the property that recovered the original cover without loss of data while extracting the embedded message. DOI: 10.17762/ijritcc2321-8169.15072

    Histogram-based multilayer reversible data hiding method for securing secret data

    Get PDF
    In this modern age, data can be easily transferred within networks. This condition has brought the data vulnerable; so they need protection at all times. To minimize this threat, data hiding appears as one of the potential methods to secure data. This protection is done by embedding the secret into various types of data, such as an image. In this case, histogram shifting has been proposed; however, the amount of secret and the respective stego image are still challenging. In this research, we offer a method to improve its performance by performing some steps, for example removing the shifting process and employing multilayer embedding. Here, the embedding is done directly to the peak of the histogram which has been generated by the cover. The experimental results show that this proposed method has a better quality of stego image than existing ones. So, it can be one of possible solutions to protect sensitive data

    Efficient Security and Authentication for Edge-Based Internet of Medical Things

    Get PDF
    Internet of Medical Things (IoMT)-driven smart health and emotional care is revolutionizing the healthcare industry by embracing several technologies related to multimodal physiological data collection, communication, intelligent automation, and efficient manufacturing. The authentication and secure exchange of electronic health records (EHRs), comprising of patient data collected using wearable sensors and laboratory investigations, is of paramount importance. In this article, we present a novel high payload and reversible EHR embedding framework to secure the patient information successfully and authenticate the received content. The proposed approach is based on novel left data mapping (LDM), pixel repetition method (PRM), RC4 encryption, and checksum computation. The input image of size MimesNM imes N is upscaled by using PRM that guarantees reversibility with lesser computational complexity. The binary secret data are encrypted using the RC4 encryption algorithm and then the encrypted data are grouped into 3-bit chunks and converted into decimal equivalents. Before embedding, these decimal digits are encoded by LDM. To embed the shifted data, the cover image is divided into 2imes22 imes 2 blocks and then in each block, two digits are embedded into the counter diagonal pixels. For tamper detection and localization, a checksum digit computed from the block is embedded into one of the main diagonal pixels. A fragile logo is embedded into the cover images in addition to EHR to facilitate early tamper detection. The average peak signal to noise ratio (PSNR) of the stego-images obtained is 41.95 dB for a very high embedding capacity of 2.25 bits per pixel. Furthermore, the embedding time is less than 0.2 s. Experimental results reveal that our approach outperforms many state-of-the-art techniques in terms of payload, imperceptibility, computational complexity, and capability to detect and localize tamper. All the attributes affirm that the proposed scheme is a potential candidate for providing better security and authentication solutions for IoMT-based smart health

    Reversible Data Hiding in Encrypted Text Using Paillier Cryptosystem

    Full text link
    Reversible Data Hiding in Encrypted Domain (RDHED) is an innovative method that can keep cover information secret and allows the data hider to insert additional information into it. This article presents a novel data hiding technique in an encrypted text called Reversible Data Hiding in Encrypted Text (RDHET). Initially, the original text is converted into their ASCII values. After that, the Paillier cryptosystem is adopted to encrypt all ASCII values of the original text and send it to the data hider for further processing. At the data hiding phase, the secret data are embedded into homomorphically encrypted text using a technique that does not lose any information, i.e., the homomorphic properties of the Paillier cryptosystem. Finally, the embedded secret data and the original text are recovered at the receiving end without any loss. Experimental results show that the proposed scheme is vital in the context of encrypted text processing at cloud-based services. Moreover, the scheme works well, especially for the embedding phase, text recovery, and performance on different security key sizes
    • …
    corecore