Call for Papers - Ongoing round of submission, notification and publication.
    
  
Home    |    Login or Register    |    Contact CSC
By Title/Keywords/Abstract   By Author
Browse CSC-OpenAccess Library.
  • HOME
  • LIST OF JOURNALS
  • AUTHORS
  • EDITORS & REVIEWERS
  • LIBRARIANS & BOOK SELLERS
  • PARTNERSHIP & COLLABORATION
Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available
(no registration required)

(738.48KB)


-- CSC-OpenAccess Policy
-- Creative Commons Attribution NonCommercial 4.0 International License
>> COMPLETE LIST OF JOURNALS

EXPLORE PUBLICATIONS BY COUNTRIES

EUROPE
MIDDLE EAST
ASIA
AFRICA
.............................
United States of America
United Kingdom
Canada
Australia
Italy
France
Brazil
Germany
Malaysia
Turkey
China
Taiwan
Japan
Saudi Arabia
Jordan
Egypt
United Arab Emirates
India
Nigeria
Secured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
T M Amarunnishad, Aslam Nazeer
Pages - 423 - 433     |    Revised - 07-10-2014     |    Published - 10-11-2014
Published in International Journal of Image Processing (IJIP)
Volume - 8   Issue - 6    |    Publication Date - November / December 2014  Table of Contents
MORE INFORMATION
References   |   Abstracting & Indexing
KEYWORDS
Reversible Data Hiding, Encrypted Image, Self-reversible Embedding, Digital Watermarks, Hyper Chaotic System, Peak Signal To Noise Ratio.
ABSTRACT
Recently, more and more attention is paid to reversible data hiding (RDH) in encrypted images, since it maintains the excellent property that the original cover can be losslessly recovered after embedded data is extracted while protecting the image content’s confidentiality. All previous methods embed data by reversibly vacating room from the encrypted images, which may be subject to some errors on data extraction and/or image restoration. Here a novel method is proposed by reserving room before encryption with a traditional RDH algorithm, and thus it is easy for the data hider to reversibly embed data in the encrypted image. Moreover data to be embedded is shuffled using a hyper chaotic function which is difficult to be extracted from the stego image without original key. A digital water mark is also embedded which ensures integrity of the data. The proposed method has been validated against three other available RDH schemes and it is observed that the proposed scheme outperforms these RDH schemes both in visual quality and payload. The proposed method can achieve real reversibility, that is, data extraction and image recovery are free of any error.
ABSTRACTING & INDEXING
1 Google Scholar 
2 CiteSeerX 
3 refSeek 
4 Scribd 
5 SlideShare 
6 PdfSR 
REFERENCES
A. M. Alattar, “Reversible watermark using the difference expansion of a generalized integer transform,” IEEE Transactions on Image Processing, Vol. 13, 2004, pp. 1147-1156.
D. M Thodi and J. Rodriguez, “Expansion embedding techniques for reversible watermarking,” IEEE Trans. Image Process., vol. 16, no. 3,pp. 721–730, Mar. 2007.
I. Cox,M. Miller M, J. Bloom, J. Fridrich, T. Kalker. Digital Watermarking and Steganography Second Edition. Elsevier, 2008
J. Hwang , Kim and J. U Choi , “A reversible watermarking based on histogram shifting,” Int. Workshop on Digital Watermarking, Lecture Notes in Computer Science, Jeju Island, Korea, 2006, vol. 4283,pp. 348–361, Springer-Verlag.
J. Tian, “Reversible data embedding using a difference expansion” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896,Aug. 2003.
Johnson, Z. Duric, S. Jajodia Information Hiding. Steganography and Watermarking - Attacks and Countermeasures: Kluwer Academic Press. Norwall, 2000.
K. H Jung and K. Y Yoo, “Data hiding method using image interpolation,” Journ. of Compute standard and interfaces, vol. 31, pp. 465–470, 1996
V. Sachnev, H. J. Kim, J. Nam, S. Suresh, and Y.-Q. Shi, “Reversible watermarking algorithm using sorting and prediction,” IEEE Trans.Circuits Syst. Video Technol., vol. 19, no. 7, pp. 989–999, Jul.2009.
W. Hong, T. Chen, and H.Wu, “An improved reversible data hiding in encrypted images using side match,” IEEE Signal Process. Lett., vol.19, no. 4, pp. 199–202, Apr. 2012.
W. Zhang, K. Ma, X. Zhao, N. Yu, F. Li “Reversible data hiding in encrypted images by reserving room before encryption, ”IEEE trans. Info. forensics and security ,vol. 8, no. 3, pp. 553–558, March 2013.
X. Zhang, “Reversible data hiding in encrypted images,” IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255–258, Apr. 2011.
X. Zhang, “Separable reversible data hiding in encrypted image,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 826–832, Apr. 2012.
Y. Hu, H.K Lee, Chen and J. Li, “Difference Expansion based reversible data hiding using two embedding direction,” IEEE trans. multimedia, vol. 10, no. 8, pp. 1500–1512, 2008
Y. Wang, K. W Wong, X. F Liao, T. Xiang, G. R Chen , “A chaos based image encryption algorithm with variable control parameters “, Chaos ,solutions and Fractals 41(4) 1773- 1783, 2009.
Z. Ni, Y. Shi, N. Ansari, and S. Wei, “Reversible data hiding,” IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354–362, Mar.2006.
Zhu, C. Zhao, X. Zhang “A novel image encryption-compression scheme using hyper- chaos and Chinese remainder theorem”, Elsevier,Image communication 670-680, 2013.
[13] L. Luo et al., “Reversible image watermarking using interpolation technique, ”IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 187–193,Mar. 2010.
MANUSCRIPT AUTHORS
Professor T M Amarunnishad
T K M College of Engineering - India
amarnishad@rediffmail.com
Mr. Aslam Nazeer
Research Scholar T K M College of Engineering Kollam, Kerala, India - India


CREATE AUTHOR ACCOUNT
 
LAUNCH YOUR SPECIAL ISSUE
View all special issues >>
 
PUBLICATION VIDEOS
 
You can contact us anytime since we have 24 x 7 support.
Join Us|List of Journals|
    
Copyrights © 2025 Computer Science Journals (CSC Journals). All rights reserved. Privacy Policy | Terms of Conditions