Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(738.48KB)
This is an Open Access publication published under CSC-OpenAccess Policy.

PUBLICATIONS BY COUNTRIES

Top researchers from over 74 countries worldwide have trusted us because of quality publications.

United States of America
United Kingdom
Canada
Australia
Malaysia
China
Japan
Saudi Arabia
Egypt
India
Secured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
T M Amarunnishad, Aslam Nazeer
Pages - 423 - 433     |    Revised - 07-10-2014     |    Published - 10-11-2014
Volume - 8   Issue - 6    |    Publication Date - November / December 2014  Table of Contents
MORE INFORMATION
KEYWORDS
Reversible Data Hiding, Encrypted Image, Self-reversible Embedding, Digital Watermarks, Hyper Chaotic System, Peak Signal To Noise Ratio.
ABSTRACT
Recently, more and more attention is paid to reversible data hiding (RDH) in encrypted images, since it maintains the excellent property that the original cover can be losslessly recovered after embedded data is extracted while protecting the image content’s confidentiality. All previous methods embed data by reversibly vacating room from the encrypted images, which may be subject to some errors on data extraction and/or image restoration. Here a novel method is proposed by reserving room before encryption with a traditional RDH algorithm, and thus it is easy for the data hider to reversibly embed data in the encrypted image. Moreover data to be embedded is shuffled using a hyper chaotic function which is difficult to be extracted from the stego image without original key. A digital water mark is also embedded which ensures integrity of the data. The proposed method has been validated against three other available RDH schemes and it is observed that the proposed scheme outperforms these RDH schemes both in visual quality and payload. The proposed method can achieve real reversibility, that is, data extraction and image recovery are free of any error.
1 Google Scholar 
2 CiteSeerX 
3 refSeek 
4 Scribd 
5 SlideShare 
6 PdfSR 
1 Johnson, Z. Duric, S. Jajodia Information Hiding. Steganography and Watermarking - Attacks and Countermeasures: Kluwer Academic Press. Norwall, 2000.
2 J. Hwang , Kim and J. U Choi , “A reversible watermarking based on histogram shifting,” Int. Workshop on Digital Watermarking, Lecture Notes in Computer Science, Jeju Island, Korea, 2006, vol. 4283,pp. 348–361, Springer-Verlag.
3 A. M. Alattar, “Reversible watermark using the difference expansion of a generalized integer transform,” IEEE Transactions on Image Processing, Vol. 13, 2004, pp. 1147-1156.
4 Z. Ni, Y. Shi, N. Ansari, and S. Wei, “Reversible data hiding,” IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354–362, Mar.2006.
5 J. Tian, “Reversible data embedding using a difference expansion” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896,Aug. 2003.
6 X. Zhang, “Reversible data hiding in encrypted images,” IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255–258, Apr. 2011.
7 W. Zhang, K. Ma, X. Zhao, N. Yu, F. Li “Reversible data hiding in encrypted images by reserving room before encryption, ”IEEE trans. Info. forensics and security ,vol. 8, no. 3, pp. 553–558, March 2013.
8 X. Zhang, “Separable reversible data hiding in encrypted image,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 826–832, Apr. 2012.
9 D. M Thodi and J. Rodriguez, “Expansion embedding techniques for reversible watermarking,” IEEE Trans. Image Process., vol. 16, no. 3,pp. 721–730, Mar. 2007.
10 Y. Hu, H.K Lee, Chen and J. Li, “Difference Expansion based reversible data hiding using two embedding direction,” IEEE trans. multimedia, vol. 10, no. 8, pp. 1500–1512, 2008
11 K. H Jung and K. Y Yoo, “Data hiding method using image interpolation,” Journ. of Compute standard and interfaces, vol. 31, pp. 465–470, 1996
12 W. Hong, T. Chen, and H.Wu, “An improved reversible data hiding in encrypted images using side match,” IEEE Signal Process. Lett., vol.19, no. 4, pp. 199–202, Apr. 2012.
13 [13] L. Luo et al., “Reversible image watermarking using interpolation technique, ”IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 187–193,Mar. 2010.
14 V. Sachnev, H. J. Kim, J. Nam, S. Suresh, and Y.-Q. Shi, “Reversible watermarking algorithm using sorting and prediction,” IEEE Trans.Circuits Syst. Video Technol., vol. 19, no. 7, pp. 989–999, Jul.2009.
15 Zhu, C. Zhao, X. Zhang “A novel image encryption-compression scheme using hyper- chaos and Chinese remainder theorem”, Elsevier,Image communication 670-680, 2013.
16 Y. Wang, K. W Wong, X. F Liao, T. Xiang, G. R Chen , “A chaos based image encryption algorithm with variable control parameters “, Chaos ,solutions and Fractals 41(4) 1773- 1783, 2009.
17 I. Cox,M. Miller M, J. Bloom, J. Fridrich, T. Kalker. Digital Watermarking and Steganography Second Edition. Elsevier, 2008
Professor T M Amarunnishad
T K M College of Engineering - India
amarnishad@rediffmail.com
Mr. Aslam Nazeer
Research Scholar T K M College of Engineering Kollam, Kerala, India - India