A Novel Encryption and Extended Dynamic Histogram Shifting Modulation for Reversible Data Hiding in Encrypted Image

نویسندگان

  • K. Latha
  • M. Sundarambal
چکیده

Recently, progressive interest is paid to reversible data hiding (RDH) in encrypted images, since it preserves the original cover can be recovered without any loss after embedded data is extracted to protect the confidentiality of image content’s.Earlier method used“vacate room after Encryption” in which data can be embedded by reversibly vacating room from the encrypted images. This might cause errors while data extraction or image restoration. However this provides less PSNR value when embedding messages in Images. To address this problem, a proposed method uses Extended Dynamic Histogram Shifting Modulation (EDHS) can be done on the image content by the content owner. This method shifts the pixels of histogram based on prediction errors and its neighborhood pixels. The data can be embedded based on the space provided by the proposed histogram shifting method. After reserving space for data hiding by self reversible embedding using EDHS, Image can be encrypted by using proposed novel encryption method. Finally the receiver can restore the image and extract data by using encryption key and data hiding key. Experimental result provides greater PSNR value when compare with the existing work. Keywords— Reversible data hiding, Image encryption, Extended dynamic histogram.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Reversible Data Hiding For Embedding Data Securely in Encrypted Image by Reserving Room Before Encryption

Reversible data hiding with image encryption (RDH), since it maintains the excellent property that the original cover can be losslessly recovered after embedded data is extracted while protecting the image content’s confidentiality. In previous work vacating room after encrypted image, which subject to some errors on data extraction and/or image restoration. In this paper, a novel method by res...

متن کامل

Randomised Data Concealment with Reversibility Improved Data Hiding In Encrypted Images

Steganography is used to hide data like text, image audio from unauthorized user in different manner. Data hiding method for images suffer from performance issues like low embedding capabilities, distortion or do not recover the original image completely. A novel reversible data hiding method is proposed. The pixel to which data is embedded is estimated in a random manner, these pixels are shif...

متن کامل

Efficient reversible data hiding in encrypted image with public key cryptosystem

This paper proposes a new reversible data hiding scheme for encrypted images by using homomorphic and probabilistic properties of Paillier cryptosystem. The proposed method can embed additional data directly into encrypted image without any preprocessing operations on original image. By selecting two pixels as a group for encryption, data hider can retrieve the absolute differences of groups of...

متن کامل

Separable Reversible Data hiding in Encrypted Images by n-nary Histogram Modification

This work proposes a novel scheme of separable reversible data hiding for encrypted image using histogram modification. After the original image is encrypted by the sender, the data-hider embeds the secret message into the encrypted image by a histogram modification and n-nary data hiding scheme. On the receiver side, the secret message can be extracted by the embedding key, and the original im...

متن کامل

Separable and Error-Free Reversible Data Hiding in Encrypted Image with High Payload

This paper proposes a separable reversible data-hiding scheme in encrypted image which offers high payload and error-free data extraction. The cover image is partitioned into nonoverlapping blocks and multigranularity encryption is applied to obtain the encrypted image. The data hider preprocesses the encrypted image and randomly selects two basic pixels in each block to estimate the block smoo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014