505 research outputs found

    A Framework to Reversible Data Hiding Using Histogram-Modification

    Get PDF
    A Novel method of Stegnography to achieve Reversible Data Hiding (RDH) is proposed using Histogram Modification (HM). In this paper the HM technique is revisited and a general framework to construct HM-based RDH is presented by simply designing the shifting and embedding functions on the cover image. The Secret Image is embedded inside the cover image using several steps of specific shifting of pixels with an order. The secret image or logo is retrieved without any loss in data on the cover and as well as in the secrete image. The Experimental results show the better Peak Signal to Noise Ratio (PSNR) with the existing methods

    Implementation of Reversible Data Hiding Using Suitable Wavelet Transform For Controlled Contrast Enhancement

    Get PDF
    Data Hiding is important for secrete communication and it is also essential to keep the data hidden to be received by the intended recipient only. The conventional Reversible Data Hiding (RDH) algorithms pursue high Peak-Signal-to-Noise-Ratio (PSNR) at certain amount of embedding bits. Considering an importance of improvement in image visual quality than keeping high PSNR, a novel RDH scheme utilizing contrast enhancement to replace the PSNR was presented with the help of Integer Wavelet Transform (IWT). In proposed work, the identification of suitable transform from different wavelet families is planned to enhance the security of data by encrypting it and embedding more bits with the original image to generate stego image. The obtained stego image will be transmitted to the other end, where the receiver will extract the transmitted secrete data and original cover image from stego image using required keys. It will use a proper transformation for the purpose of Controlled Contrast Enhancement (CCE) to achieve the intended RDH so that the amount of embedding data bits and visual perception will be enhanced. The difference of the transmitted original image and restored original image is minor, which is almost invisible for human eyes though more bits are embedded with the original image. The performance parameters are also calculated

    Separable Reversible Data Hiding in Encrypted Images Based on Two-Dimensional Histogram Modification

    Get PDF
    An efficient method of completely separable reversible data hiding in encrypted images is proposed. The cover image is first partitioned into nonoverlapping blocks and specific encryption is applied to obtain the encrypted image. Then, image difference in the encrypted domain can be calculated based on the homomorphic property of the cryptosystem. The data hider, who does not know the original image content, may reversibly embed secret data into image difference based on two-dimensional difference histogram modification. Data extraction is completely separable from image decryption; that is, data extraction can be done either in the encrypted domain or in the decrypted domain, so that it can be applied to different application scenarios. In addition, data extraction and image recovery are free of any error. Experimental results demonstrate the feasibility and efficiency of the proposed scheme

    Survey on Reversible Data Hiding in Encrypted Images Using POB Histogram Method

    Get PDF
    This paper describes a survey on reversible data hiding in encrypted images. Data hiding is a process to embed useful data into cover media. Data invisibility is its major requirement. Data hiding can be done in audio, video, image, text, and picture. Here use an image for data hiding especially digital images and existing method (Histogram Block Shift Base Method) HBSBM or POB. Now a day's reversible data hiding in encrypted images is in use due to its excellent property which is original cover image can be recovered with no loss after extraction of the embedded data. Also, it protects the original data. According to the level and kind of application one or more data hiding methods is used. Data hiding can be done in audio, video, text, and image and other forms of information. Some data hiding techniques emphasize on digital image security, some on the robustness of digital image hiding process while other's main focus is on imperceptibility of a digital image. The capacity of digital information which has to hide is also the main concern in some of the applications. The objective of some of the papers mentioned below is to achieve two or more than two parameters i.e. Security, robustness, imperceptibility and capacity but some of the parameters are trade-off which means only one can be achieved on the cost of other. So the data hiding techniques aiming to achieve maximum requirements i.e. security, robustness, capacity, imperceptibility etc. and which can be utilized in the larger domain of applications is desired. Related work for techniques used for data hiding in a digital image is described in this paper
    • …
    corecore