Secure Reversible Data Hiding in Encrypted Image by Reversible Image Transformation (rit)

نویسنده

  • Dr. B. R. VIKRAM
چکیده

With the popularity of outsourcing facts to the cloud, it's far vital to shield the privacy of facts and enable the cloud server to effortlessly control the data at the same time. Under such needs, reversible statistics hiding in encrypted photos (RDH-EI) attracts increasingly more researchers’ attention. In this paper, we suggest a singular framework for RDH-EI primarily based on reversible photo transformation (RIT). Different from all previous encryption based totally frameworks, wherein the cipher-texts may additionally appeal to the notation of the curious cloud, RIT-primarily based framework allows the consumer to transform the content material of authentic image into the content of every other goal photo with the identical size. The converted picture, that seems like the goal photo, is used because the “encrypted image”, and is outsourced to the cloud. Therefore, the cloud server can easily embed statistics into the “encrypted picture” through any RDH strategies for plaintext snap shots. And thus a patron-unfastened scheme for RDH-EI may be realized, that is, the records embedding manner carried out with the aid of the cloud server is inappropriate with the procedures of both encryption and decryption. Two RDH methods, such as conventional RDH scheme and unified embedding and scrambling scheme, are adopted to embed watermark in the encrypted image, which could satisfy unique desires on photograph firstclass and big embedding capability respectively.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure and Authenticated Reversible Data Hiding in Encrypted Image

This work proposes a Secure and authenticated discrete reversible data hiding in cipher images deals with security and authentication. In the first phase, a content owner encrypts the original uncompressed image using an encryption key. Then, a data hider may compress the least significant bits of the encrypted image using a data hiding key to create a sparse space to accommodate some additiona...

متن کامل

A Survey on Reversible Data Hiding in Encrypted Image

Recently more attention is paid to reversible data hiding (RDH) in encrypted images, since it maintains the excellent property that the original image cover can be losslessly recovered after data embedded is extracted while protecting the image content’s as confidential. In this survey paper different reversible data hiding methods are analyzed. All previous methods embed data by reversibly vac...

متن کامل

Independent Changeable Information Hiding in Encrypted Images

This work proposes a Secure and authenticated discrete reversible data hiding in cipher images deals with security and authentication. In the first phase, a content owner encrypts the original uncompressed image using an encryption key. Then , a data hider may compress the least significant bits of the encrypted image using a data hiding key to create a sparse space to accommodate some addition...

متن کامل

Watermarked and Encrypted Image for Reversible Data Hiding by Reserving Room Algorithm with Random Pixel Data Hiding

Reversible Data Hiding (RDH) gaining the attraction in the world of secured message passing through encrypted images. It is due to the excellent property of recovering the original cover or image after embedded data is extracted while protecting the encrypted image content’s confidentiality. The related works may embed data by reversibly vacating room from the encrypted images, which may be sub...

متن کامل

A Secure Data Transmission by Embedding Marked Encrypted Image on Cloak Image

Data hiding is the method of embedding confidential information into a set of host data such as photograph, television signal or any other identity card Reversible data hiding in images is a technique, by which the original cover can be losslessly recovered after the embedded message is extracted. To ensure security, we propose a novel method in which the marked encrypted image is embedded on a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017