93 research outputs found

    An Enhanced Reversible Data Hiding Technique for Coloured Images

    Get PDF
    To maintain image contents confidentiality and to recover original image, there is a need of Reversible Data Hiding scheme. This paper proposes an enhanced reversible data hiding technique for the coloured image. All previous methods embed data by reversibly vacating room from the encrypted images, which may be subject to some errors on data extraction or image restoration. The proposed method embeds data by reserving room before encryption with a traditional RDH algorithm. It is easy for the data hider to reversibly embed data in the encrypted image. This paper also concerns with a method that embeds the data invisibly into an image. The transmission and exchange of image also needs a high security. To achieve a security, Visual Cryptography is used. Visual cryptography maintains security of a cover media and also it will not make a use of encryption key. Hence, it is less prone to attack. The proposed method can achieve real reversibility, that is, data extraction and image recovery are free of any error

    An Improved Reversible Data Hiding with Hierarchical Embedding for Encrypted Images and BBET

    Get PDF
    This research introduces an enhanced reversible data hiding (RDH) approach incorporating hierarchical embedding for encrypted images and employs a novel technique termed BBET (Best Bits Embedding Technique). RDH involves concealing information within a host sequence, enabling the restoration of both the host sequence and embedded data without loss from the marked sequence. While RDH has traditionally found applications in media annotation and integrity authentication, its utilisation has expanded into diverse fields. Given the rapid advancements in digital communication, computer technologies, and the Internet, ensuring information security poses a formidable challenge in safeguarding valuable data. Various reversible and stenographic techniques exist for covertly embedding or protecting data, spanning text, images, and protocols, and facilitating secure transmission to intended recipients. An influential approach in data security is reversible data hiding in encrypted images (RDHEI). This paper distinguishes between the conventional RDHEI technique, characterised by lower Peak Signal-to-Noise Ratio (PSNR) and higher Mean Squared Error (MSE), and proposes an improved RDHEI technique. As the prevalence of digital techniques for image transmission and storage rises, preserving image confidentiality, integrity, and authenticity becomes paramount. Text associated with an image, such as authentication or author information, can serve as embedded data. The recipient must adeptly recover both the concealed data and the original image. Reversible data-hiding techniques ensure the exact recovery of the original carrier after extracting the encrypted data. Classification of RDHEI techniques is based on the implemented method employed. This paper delves into a comprehensive exploration of techniques applicable to difference expansion, histogram shifting, and compression embedding for reversible data hiding. Emphasis is placed on the necessity for a reversible data-hiding technique that meticulously restores the host image. Furthermore, the study evaluates performance parameters associated with encryption processes, scrutinising their security aspects. The investigation utilises the MATLAB tool to develop the proposed BBET technique, comparing its efficacy in embedding and achieving enhanced security features. The BBET technique is characterised by reliability, high robustness, and secure data hiding, making it a valuable addition to the evolving landscape of reversible data hiding methodologies

    Separable Reversible Data Hiding in Encrypted Images Based on Two-Dimensional Histogram Modification

    Get PDF
    An efficient method of completely separable reversible data hiding in encrypted images is proposed. The cover image is first partitioned into nonoverlapping blocks and specific encryption is applied to obtain the encrypted image. Then, image difference in the encrypted domain can be calculated based on the homomorphic property of the cryptosystem. The data hider, who does not know the original image content, may reversibly embed secret data into image difference based on two-dimensional difference histogram modification. Data extraction is completely separable from image decryption; that is, data extraction can be done either in the encrypted domain or in the decrypted domain, so that it can be applied to different application scenarios. In addition, data extraction and image recovery are free of any error. Experimental results demonstrate the feasibility and efficiency of the proposed scheme

    A Review on Separable Reversible Data Hiding in Encrypted Image

    Get PDF
    This work proposes a new system for separable reversible data hiding in color images encrypted with the approach of adding the matrix. In the proposed scheme, Take color image input and provide the encryption key to encrypt the picture image and then compressed encrypted with various algorithms. Due to the compression of the image to create a sparse space to accommodate the additional data, integrated data using the key data hiding. If the receiver has the encryption key, you can decrypt the received data to obtain the image only. If the receiver has the data hiding key, it can extract data only. If the receiver is both the key to hidden data and the encryption key, it can extract the additional data and recover the original content without any errors using the spatial correlation in the natural image if the amount of data extra is great

    Reversible Data Hiding in Encrypted Images Using MSBs Integration and Histogram Modification

    Full text link
    This paper presents a reversible data hiding in encrypted image that employs based notions of the RDH in plain-image schemes including histogram modification and prediction-error computation. In the proposed method, original image may be encrypted by desire encryption algorithm. Most significant bit (MSB) of encrypted pixels are integrated to vacate room for embedding data bits. Integrated ones will be more resistant against failure of reconstruction if they are modified for embedding data bits. At the recipient, we employ chess-board predictor for lossless reconstruction of the original image by the aim of prediction-error analysis. Comparing to existent RDHEI algorithms, not only we propose a separable method to extract data bits, but also content-owner may attain a perfect reconstruction of the original image without having data hider key. Experimental results confirm that the proposed algorithm outperforms state of the art ones

    An Efficient Data Security System Using Reserve Room Approach on Digital Images for Secret Sharing

    Get PDF
    This paper presents enhancement of d ata protection system for secret communication through common network based on reversible data concealment in encrypted images with reserve room approach. In this paper was implemented for true color RGB image and reserve room approach under multi scale decomposition. The Blue plane will be chosen for hiding the secret text data. Then image is then separated into number of blocks locally and lifting wavelet will be used to detect approximation and detailed coefficients. Then approximation part is encrypted using chaos encryption method. The proposed encryption technique uses the key to encrypt an image and not only enhances the safety of secret carrier informa tion by making the information inaccessible to any intruder having a random method. After image encryption, the data hide r will conceal the secret data into the detailed coefficients which are reserved before encryption. Although encryption achieves certain security effects, they make the secret messages unreadable and unnatural or meaningless. This system is still enhanced with encrypt messages using a symmetric key method. This is the reason a new security approach called reversible data hiding arises. It is the art of hiding the existence of data in another transmission medium to achieve secret communication. The data hidi ng technique uses the adaptive LSB replacement algorithm for concealing the secret message bits into the encrypted image. In the data extraction module, the secret data will be extracted by using relevant key for choosing the encrypted pixe ls to extract th e data. By using the decryption keys, the image and extracted text data will be extracted from encryption to get the original informatio n. Finally the performance of this proposal in encryption and data hiding will be analyzed based on image and data recovery

    Reversible Data Hiding in Encrypted Text Using Paillier Cryptosystem

    Full text link
    Reversible Data Hiding in Encrypted Domain (RDHED) is an innovative method that can keep cover information secret and allows the data hider to insert additional information into it. This article presents a novel data hiding technique in an encrypted text called Reversible Data Hiding in Encrypted Text (RDHET). Initially, the original text is converted into their ASCII values. After that, the Paillier cryptosystem is adopted to encrypt all ASCII values of the original text and send it to the data hider for further processing. At the data hiding phase, the secret data are embedded into homomorphically encrypted text using a technique that does not lose any information, i.e., the homomorphic properties of the Paillier cryptosystem. Finally, the embedded secret data and the original text are recovered at the receiving end without any loss. Experimental results show that the proposed scheme is vital in the context of encrypted text processing at cloud-based services. Moreover, the scheme works well, especially for the embedding phase, text recovery, and performance on different security key sizes
    • …
    corecore