Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(686.54KB)
This is an Open Access publication published under CSC-OpenAccess Policy.
Publications from CSC-OpenAccess Library are being accessed from over 74 countries worldwide.
Reversible Data Hiding In Encrypted Images And Its Application To Secure Missile Launching
Radhika Ramchandra Patil, Deepali Y. Loni
Pages - 63 - 71     |    Revised - 30-07-2018     |    Published - 01-10-2018
Volume - 12   Issue - 3    |    Publication Date - October 2018  Table of Contents
MORE INFORMATION
KEYWORDS
Image Encryption, Data Embedding, Reversible Data Hiding.
ABSTRACT
This paper proposes reversible data hiding in encrypted images for secure missile launching. The work is presented in two stages: one involves encryption of cover image by block cipher algorithm and other is embedding secure data related to missile launching. For embedding data, vacant pixels are identified by Slepian-Wolf encoding method along with embedding key to hide the data. At the other end by using decryption algorithm the original cover image is recovered and the secret data is extracted. The performance analysis is presented by calculating parameters MSE, PSNR and SSIM.
1 Google Scholar 
2 BibSonomy 
3 Doc Player 
4 Scribd 
5 SlideShare 
1 Shilpy Mukherjee, A. Mahajan, "Review on Algorithms and Techniques of Reversible Data Hiding" International Journal of Research in Computer and Communication Technology, Vol 3, Issue 3, March- 2014.
2 K. Ma, W. Zhang, X. Zhao, N. Yu, and F. Li, "Reversible data hiding in encrypted images by reserving room before encryption," IEEE Trans. Inf. Forensics Security, vol. 8, no. 3, pp. 553-562, Mar. 2013.
3 Mehmet U. Celik, Gaurav Sharma, A. Murat Tekalp and Eli Saber, "Reversible DATA Hiding" IEEE ICIP pp. 157-160. 2002.
4 J. Tian, "Reversible data embedding using a difference expansion," IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890-896, Aug. 2003.
5 Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, "Reversible data hiding," IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354-362, Mar. 2006.
6 D. M. Thodi and J. J. Rodriguez, "Expansion embedding techniques for reversible watermarking," IEEE Trans. Image Process., vol. 16, no. 3, pp. 721-730, Mar. 2007.
7 L. Luo, Z. Chen, M. Chen, X. Zeng, and Z. Xiong, "Reversible image watermarking using interpolation technique," IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 187-193, Mar. 2010.
8 Zhenxing Qian, and Xinpeng Zhang, "Reversible data hiding in encrypted images with distributed source encoding," IEEE Transactions on Circuits and Systems for Video Technology, vol. 26, no. 4,pp. 636-646 April 2016.
9 Z. Qian, X. Han, and X. Zhang, "Separable reversible data hiding in encrypted images by n-nary histogram modification," in Proc. 3rdInt. Conf. Multimedia Technol. (ICMT), Guangzhou, China, 2013, pp. 869-876.
10 X. Zhang, "Reversible data hiding in encrypted image," IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255-258, Apr. 2011.
11 X. Zhang, "Separable reversible data hiding in encrypted image," IEEE Trans. Inf. Forensics Security, Vol. 7, No. 2, pp. 826-832, Apr. 2012.
12 W. Hong, T.-S. Chen, and H.-Y. Wu, "An improved reversible data hiding in encrypted images using side match," IEEE Signal Process. Lett., vol. 19, no. 4, pp. 199-202, Apr. 2012.
13 W. Liu, W. Zeng, L. Dong, and Q. Yao, "Efficient compression of encrypted grayscale images," IEEE Trans. Image Process., vol. 19, no. 4, pp. 1097-1102, Apr. 2010.
14 S. S. Pradhan and K. Ramchandran, "Distributed source coding using syndromes (DISCUS): Design and construction," IEEE Trans. Inf. Theory, vol. 49, no. 3, pp. 626-643, Mar. 2003.
Miss Radhika Ramchandra Patil
Department of Electronics DKTE Society's Textile & Engineering Institute, Ichalkaranji - India
radhikap589@gmail.com
Miss Deepali Y. Loni
Department of Electronics DKTE Society's Textile & Engineering Institute, Ichalkaranji - India