SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
Scientific Journal Impact Factor (SJIF): 1.711
International Journal of Modern Trends in Engineering
and Research
www.ijmter.com
@IJMTER-2014, All rights Reserved 334
e-ISSN: 2349-9745
p-ISSN: 2393-8161
Reversible Data Hiding in Encrypted Image: A Review
Ms. Nuzhat Ansari1
, Prof. Rahila Sheikh2
1
Dept. Of Computer Sci. & Engg., Rajiv Gandhi College of Engg. Research & Tech.,
Chandrapur,Maharashtra,India
2
Dept. Of Computer Technology,Rajiv Gandhi College of Engg. Research &Tech.,
Chandrapur,Maharashtra,India
Abstract-Recently, more and more attention is paid to reversible data hiding (RDH) in encrypted
images, since it maintains the excellent property that the original cover can be losslessly recovered
after embedded data is extracted while protecting the image content’s conïŹdentiality. All previous
methods embed data by reversibly vacating room from the encrypted images, which may be subject
to some errors on data extraction and/or image restoration. In this survey paper, we discuss about
various methods and algorithms which were used for reversible data hiding (RDH) in encrypted
image to make data hiding process effortless. We also use visual cryptographic approach for
encryption which helps to protect the image during transmission. The scheme is suitable for
authentication based application where collective acceptance and decision making plays an important
role. The main goal is to retrieve the original image with lossless process and minimum computation
during image encryption /decryption by using keyless approach.
Keywords - Reversible Data Hiding, image encryption, Visual Cryptography, encryption/decryption,
authentication.
I. INTRODUCTION
Reversible Data hiding is the method of hiding data inside a cover file so that both the data and the
cover file could be recovered lossless at the receiver. The transmitter side of such systems involves a
cover image, additional data, encryption key and data hiding key. The original image will be
encrypted, data will be hidden and then image will be transmitted. The receiver thus needs to decrypt
the image and extract the data.
For maintaining the security of images, two different approaches can be employed that is one
encrypting the image using the encryption keys and second approach can be without using the keys,
where the image is divided into different shares to maintain the image secrecy. This allows the visual
information to be encrypted in such a way that their decryption can be performed by human visual
system. Unfortunately heavy computation cost and key management limit the employment of the
first approach and the poor quality of the recovered image from the random shares limit the
application of the second approach.
More and more attention is paid to reversible data hiding in encrypted images. Data hiding plays an
important role in information security. It aims at embedding imperceptible confidential information
data in cover media such as static images, audio, videos, 3D meshes and so on. As long as images are
concerned data hiding which cannot perceive between stegno image and cover image by human, the
cover image still can get harmed in processing. Many different techniques have been proposed to get
back the cover image lossless. The reversibility means not only embedding data but also original
image can be precisely recovered in the extracting stage. Most hiding techniques perform data
embedding by altering the contents of a host media. As a result the host image cannot be completely
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 335
recovered after the bit extraction. These types of data hiding techniques are thus irreversible.
However in a number of domains such as military, legal and medical imaging although some
embedding distortion is admissible, permanent loss of signal fidelity is undesirable. This highlights
the need for Reversible (Lossless) data embedding techniques. Thus the proposed approach gives a
novel technique for reversible data hiding using visual cryptography. With the scheme involving use
of secret keys have limitations as regards key management. In addition in some cases the available
keys for encryption are limited (restricted key space), also high computation involved in encryption.
All these factors comprise the problem domain for using traditional encryption techniques in
reversible data hiding. In opposite to this approach the method using visual cryptography techniques
involve no use of keys for encryption keeping computational cost for encryption /decryption low.
Reversible Data Hiding: Reversible data hiding is an approach where data is hidden in an encrypted
image. A reversible data hiding is an algorithm, which can recover the original image losslessly from
the stego-image after the hidden data have been extracted. This important technique is widely used in
medical imagery, military imagery and law forensics where no distortion of original image is
allowed [2].
Visual Cryptography: Visual cryptography (VC) is a process where a secret image is encrypted into
shares which refuse to divulge information about the original secret image. Its strength is a fact that
the decryption of the secret image is through human visual system without computation [5].
II. RELATED WORK
Reversible data embedding has drawn lots of interest recently. Being reversible, the original digital
content can be completely restored. As the amount of information needed to be embedded (payload
and original values in the embedding area) is larger than that of the embedding area and the space
saved from compression will be used for embedding the payload.
Siddharth Malik, Anjali Sardana, Jaya [3] proposed an approach without the use of encryption keys.
Maintaining the secrecy and confidentiality of images is a vibrant area of research, with two different
approaches being followed, the first being encrypting the images through encryption algorithms
using keys; the other approach involves dividing the image into random shares to maintain the
images secrecy. The proposed technique involves splitting an image into multiple shares. The shares
so generated reveal no information about the original secret image and to retrieve the secret image all
the shares are required. The proposed technique is implemented with the SDS algorithm and involves
three steps – Sieving, Division and Shuffling. This technique involves computation during the
encryption and decryption stages and the results are to be viewed on the computer monitors hence it
is natural for us to use the additive color model. The scheme presented here is a (z, z) threshold
scheme i.e. for retrieving a secret image that has been divided into z shares all z shares are required.
No shares individually convey any information about the secret image, nor do a combination of
subset of random shares.
Mehmet U. Celik, Gaurav Sharma, A. Murat Tekalp, Eli Saber [4] proposed a novel reversible data
hiding technique, which enables the exact recovery of the original host signal upon extraction of the
embedded information. A generalization of LSB (least significant bit) modification is proposed as
the data embedding method, which introduces additional operating points on the capacity-distortion
curve. Lossless recovery of the original is achieved by compressing portions of the signal that are
susceptible to embedding distortion, and transmitting these compressed descriptions as a part of the
embedded payload. It represents a high-capacity, low-distortion, lossless data embedding algorithms.
In all algorithms, recovery of the original image is enabled by compressing, transmitting, and
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 336
recovering these features. This property of the proposed method provides excellent compression of
relatively simple image features.
Moni Naor and Adi Shamir [5] proposed visual cryptography which is a method of protecting
confidential information. It encrypts the content of information using some mathematical
computation and then the decryption is done to revert back onto the original image and it requires the
use of a secret key. With remarkable advances in computer technology, using a computer to decrypt
secret image is infeasible in some situations. In these situations, the human visual system is one of
the most convenient and reliable technique to do secret recovery. They come up with a visual secret
sharing scheme, where an image is divided or broken up into n shares so that only someone with all n
shares could decrypt the image, while someone with any n-1 shares can reveal no information about
the original image. Each share is printed on a separate transparency (which serve the purpose of
secret key) and decryption is performed by overlaying the shares when all n shares are overlaid, the
original image gets appeared. Visual Cryptography provides one of the secure ways to transfer
images on the Internet. The advantage of visual cryptography is that it exploits human eyes to
decrypt secret images with no computation required.
Jun Tian [1] proposed reversible data embedding which has drawn lots of interest recently. Being
reversible, the original digital content can be completely restored. He proposed reversible data
embedding method for digital images. This paper explores the redundancy in digital images to
achieve very high embedding capacity, and keep the distortion low. DE technique was introduced,
which discovers extra storage space by exploring the redundancy in the image content. During data
embedding, modify all changeable difference values, by either adding a new LSB (via the DE) or
modifying its LSB. To guarantee an exact recovery of the original image, One should also embed the
original values of those modified LSBs. In brief, the date-embedding DE algorithm consists of six
steps: calculating the difference values, partitioning difference values into four sets, creating a
location map, collecting original LSB values, data embedding by replacement, and finally an inverse
integer transform.
Wen-Chung Kuo, Shao-Hung Kuo, Lih-ChyauWuu [9] proposed a reversible data hiding scheme
based on EMD data hiding and JPEG image compression technology still keeping high embedding
capacity, security and good compression ratio. Both data hiding and data compression are very
important technologies in the field of image processing. It seems that there is no relationship between
data hiding and data compression because most of the data hiding mechanisms focus on information
security and the data compression mechanisms emphasize the compression ratio. . In fact, they are
closely related. Until now, there are many literatures to discuss the secret data how to be embedded
into the media image. Unfortunately, the stegno-image’s size will be increased when the media
image is hidden a lot of secret data. In order to overcome this disadvantage, a reversible data hiding
scheme based on EMD data hiding and JPEG compression technology has been proposed in this
paper. According to the experimental results, proposed scheme still keeps high embedding capacity,
security and good compression ratio.
J. Fridrich, M. Goljan, and D. Rui [10] presented a review of reversible watermarking techniques and
showdifferent methods that are used to get reversible data hiding technique with higher embedding
capacity and invisible objects. Watermark need not be hidden. Watermarking can be applied to
images, text, audio/video, software. In this review authors have described the different data
hidingtechniques. The Image watermarking technique is used for protection and authentication of
intellectual property. Invisible watermarking of images, the watermark image is embedded in a
primary image such that watermark isintentionally perceptible to a human observer whereas in the
case of invisible watermarking the embedded data isnot perceptible, but may be extracted/detected
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 337
by a computer program.The lossless watermarking technique is a process that is used for the exact
recovery of the original image. Lossless watermarks found applications in fragile authentication,
integrity protection, and metadata embedding. It is especially important for medical and military
images. The lossless watermarking technique is also refer to as invertible, or distortion-free data
hiding technique because it is capable of restoring the embedded image to its original state without
accessing any side information. We can say that the embedding distortion can be erased or removed
from the embedded image.
C. Anuradha, S. Lavanya [11] proposed secure and authenticated discrete reversible data hiding in
cipher images deals with security and authentication. In the first phase, a content owner encrypts the
original uncompressed image using an encryption key. Then, a data hider may compress the least
significant bits of the encrypted image using a data hiding key to create a sparse space to
accommodate some additional data. With an encrypted image containing additional data, if a receiver
has the data hiding key, receiver can extract the additional data though receiver does not know the
image content. If the receiver has the encryption key, can decrypt the received data to obtain an
image similar to the original one, but cannot extract the additional data. If the receiver has both the
data hiding key and the encryption key, can extract the additional data and recover the original
content without any error by exploiting the spatial correlation in natural image when the amount of
additional data is not too large. It is also a drawback because if the receiver has any one key as
known, and then he can take any information from the encrypted data. In order to achieve
authentication SHA-1 algorithm is being used. The proposed scheme is made up of image
encryption, data embedding and data-extraction/image-recovery phases. This paper proposes a
separable reversible data hiding in encrypted image. In the proposed scheme, the original image is
encrypted using an encryption key and the additional data are embedded into the encrypted image
using data-hiding key. With an encrypted image containing additional data, if the receiver has only
the data-hiding key, he can extract the additional data though receiver does not know the image
content. If receiver has only the encryption key, he can decrypt the received data to obtain an image
similar to the original one, but cannot extract the embedded additional data.
III. PROPOSED WORK
The proposed method combines the benefits of two different approaches together that are reversible
data hiding and visual cryptography. This gives an efficient solution to overcome the limitations of
existing schemes in the area of reversible data hiding. Losslessly vacating the room from the
encrypted image is relatively difficult and sometimes inefficient, so in the proposed system we have
applied a method of vacating the room for embedding data prior to the image encryption, hence the
vacated room can be used to hide the secret data. For image encryption instead of using any standard
cipher, here a method of visual cryptography is used. In visual cryptography approach the image is
divided into random shares and for retrieving the image all the shares will be required. Thus the
image is protected in transmission and secret data is also transmitted securely. It does not involve the
use of keys for encryption, has low storage and bandwidth requirements, while also keep the
computation cost low during encryption and decryption. Thus key management is not an issue but
the proposed method provides complete lossless image recovery and data extraction.
In general, we hide the data in the image only in the pixel value, the proposed system will divide an
image into individual RGB components and stores each bit in the corresponding components. Since
we are dividing the pixel value into three components, so the search space we get is three times
more. This means we can add large amount of data in the image without degrading the quality of the
image. The proposed method aims at achieving complete reversibility with minimum computation by
employing keyless approach of visual cryptography.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 338
It involves following steps:
1) Vacating room for embedding data
2) Data Embedding in reserved vacated room
3) Image Encryption using keyless SDS algorithm
4) Original image recovery
5) Data extraction
Fig.1: Framework for Proposed Scheme
IV. CONCLUSION
Reversible data hiding in encrypted image is drawing lots of attention because of privacy preserving
requirements. Thus proposed scheme provides a completely new framework for reversible data
hiding. Here in this approach we have used a new technique for reserving room before encryption of
image. Thus the data hider can benefit from the extra space emptied out in previous stage before
encryption to make data hiding process effortless. In the proposed approach we take advantage of
visual cryptography approach for encrypting the image. Thus the image is protected in transmission
and secret data is also transmitted securely. The employed technique involves the three main steps
that are sieving, division and shuffling the images. Thus random shares are so generated from
shuffled shares of image are transmitted. As this approach does not involve any use of keys is
keyless approach for image encryption with the complete lossless image recovery and data
extraction.
REFERENCES
[1] Jun Tian “Reversible Data Embedding Using a Difference Expansion” Transactions on circuits and systems for
video technology, VOL. 13, NO. 8, AUGUST 2003.
[2] Kede Ma, Weiming Zhang, Xianfeng Zhao, Nenghai Yu, and Fenghua Li, “ Reversible Data Hiding in Encrypted
Images by Reserving Room Before Encryption” , IEEE Transaction on Information Forensics and Security, Vol.8,
No.3, March 2013.
[3] Siddharth Malik, Anjali Sardana, Jaya, “A Keyless Approach to Image Encryption”,2012 international conference on
Communication systems and Network Technologies ©2012 IEEE.
[4] Mehmet U. Celik, Gaurav Sharma, A. Murat Tekalp, Eli Saber, “Reversible Data Hiding”, IEEE ICIP 2002.
[5] Moni Naor and Adi Shamir, “Visual cryptography”, in Proceedings of Advances in Cryptology EUROCRYPT 94,
LNCS Vol. 950, pages 1-12. Springer-Verlag, 1994.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 339
[6] Kuo-Ming Hung, Wen-Kai Su, Ting-Wen Chen, Li-Ming Chen, “Reversible Data Hiding Base on VQ and
Halftoning Technique”,8th
International Conference on Information Science and Digital Content
Technology(ICIDT),© IEEE 2012.
[7] Jose, R.; Abraham, G, “A separable reversible data hiding in encrypted image with improved performance”,
Emerging Research Areas and 2013 International Conference on Microelectronics, Communications and Renewable
Energy(AICERA/ICMiCR), 2013 Annual International Conference ©IEEE 2013
[8] Jithi P V, Anitha T Nair, “Progressive Visual Cryptography with Watermarking for meaningful shares”,
International Multi-Conference on Automation , computing , Communication , control and Compressed Sensing
(iMac4s), 2013.
[9] Wen-Chung Kuo, Shao-Hung Kuo, Lih-ChyauWuu, “High Embedding Reversible Data Hiding Scheme for JPEG”,
Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing,(IIH-
MSP),Oct,2010.
[10] J. Fridrich, M. Goljan, and D. Rui, “Lossless Data Embedding - New Paradigm in Digital Watermarking”, In Special
Issue on Emerging Applications of Multimedia Data Hiding, Vol. 2, pp. 185-196, February 2002.
[11] C. Anuradha, S. Lavanya, “Secure and Authenticated Reversible Data Hiding in Encrypted Image”, International
Journal of Advanced Research in Computer Science and Software Engineering, volume 3,issue 4, April 2013
Reversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A Review

Weitere Àhnliche Inhalte

Was ist angesagt?

Secured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
Secured Reversible Data Hiding In Encrypted Images Using Hyper ChaosSecured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
Secured Reversible Data Hiding In Encrypted Images Using Hyper ChaosCSCJournals
 
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMATDATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMATalphin jose
 
(Sample) image encryption
(Sample) image encryption(Sample) image encryption
(Sample) image encryptionAnsabArshad
 
Data encryption using LSB matching algorithm and Reserving Room before Encryp...
Data encryption using LSB matching algorithm and Reserving Room before Encryp...Data encryption using LSB matching algorithm and Reserving Room before Encryp...
Data encryption using LSB matching algorithm and Reserving Room before Encryp...IJERA Editor
 
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...IOSR Journals
 
DIP Using Image Encryption and XOR Operation Affine Transform
DIP Using Image Encryption and XOR Operation Affine TransformDIP Using Image Encryption and XOR Operation Affine Transform
DIP Using Image Encryption and XOR Operation Affine Transformiosrjce
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...CSCJournals
 
Learnable Image Encryption
Learnable Image EncryptionLearnable Image Encryption
Learnable Image EncryptionMasayuki Tanaka
 
Image encryption
Image encryptionImage encryption
Image encryptionrakshit2105
 
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...ijceronline
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
 
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...IOSR Journals
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUEijcisjournal
 
Using SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageUsing SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageCSCJournals
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryptionAashish R
 
Implementation of image steganography using lab view
Implementation of image steganography using lab viewImplementation of image steganography using lab view
Implementation of image steganography using lab viewIJARIIT
 

Was ist angesagt? (20)

Secured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
Secured Reversible Data Hiding In Encrypted Images Using Hyper ChaosSecured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
Secured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
 
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMATDATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
 
F1803063236
F1803063236F1803063236
F1803063236
 
(Sample) image encryption
(Sample) image encryption(Sample) image encryption
(Sample) image encryption
 
Data encryption using LSB matching algorithm and Reserving Room before Encryp...
Data encryption using LSB matching algorithm and Reserving Room before Encryp...Data encryption using LSB matching algorithm and Reserving Room before Encryp...
Data encryption using LSB matching algorithm and Reserving Room before Encryp...
 
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
 
DIP Using Image Encryption and XOR Operation Affine Transform
DIP Using Image Encryption and XOR Operation Affine TransformDIP Using Image Encryption and XOR Operation Affine Transform
DIP Using Image Encryption and XOR Operation Affine Transform
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
REAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUE
REAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUEREAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUE
REAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUE
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
 
Learnable Image Encryption
Learnable Image EncryptionLearnable Image Encryption
Learnable Image Encryption
 
Image encryption
Image encryptionImage encryption
Image encryption
 
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
 
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
 
Using SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageUsing SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG Image
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
 
Implementation of image steganography using lab view
Implementation of image steganography using lab viewImplementation of image steganography using lab view
Implementation of image steganography using lab view
 

Andere mochten auch

Data Hiding Techniques
Data Hiding TechniquesData Hiding Techniques
Data Hiding Techniquesprashant3535
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.Pradeep Vishwakarma
 
Steganography
Steganography Steganography
Steganography Uttam Jain
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptkusum sharma
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation finaladrigee12
 
PPT steganography
PPT steganographyPPT steganography
PPT steganographyparvez Sharaf
 
Image Cryptography and Steganography
Image Cryptography and SteganographyImage Cryptography and Steganography
Image Cryptography and SteganographyMohammad Amin Amjadi
 
Technical seminar ppt
Technical seminar pptTechnical seminar ppt
Technical seminar pptTejas_srinivas
 
Pixel Matching from Stereo Images (Callan seminar)
Pixel Matching from Stereo Images (Callan seminar)Pixel Matching from Stereo Images (Callan seminar)
Pixel Matching from Stereo Images (Callan seminar)Guillaume Gales
 
Stegnography
StegnographyStegnography
Stegnographykeerthi505
 
Global Wirelesse Voting Machine
Global Wirelesse Voting MachineGlobal Wirelesse Voting Machine
Global Wirelesse Voting MachineAnkita Khadatkar
 
Reversible data hiding using histogram shifting method
Reversible data hiding using histogram shifting methodReversible data hiding using histogram shifting method
Reversible data hiding using histogram shifting methodHimanshu Bal
 
Hybrid encryption ppt
Hybrid encryption pptHybrid encryption ppt
Hybrid encryption pptprashantdahake
 

Andere mochten auch (14)

Data Hiding Techniques
Data Hiding TechniquesData Hiding Techniques
Data Hiding Techniques
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
 
Steganography
Steganography Steganography
Steganography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Image Cryptography and Steganography
Image Cryptography and SteganographyImage Cryptography and Steganography
Image Cryptography and Steganography
 
Technical seminar ppt
Technical seminar pptTechnical seminar ppt
Technical seminar ppt
 
Pixel Matching from Stereo Images (Callan seminar)
Pixel Matching from Stereo Images (Callan seminar)Pixel Matching from Stereo Images (Callan seminar)
Pixel Matching from Stereo Images (Callan seminar)
 
Dropbox
DropboxDropbox
Dropbox
 
Stegnography
StegnographyStegnography
Stegnography
 
Global Wirelesse Voting Machine
Global Wirelesse Voting MachineGlobal Wirelesse Voting Machine
Global Wirelesse Voting Machine
 
Reversible data hiding using histogram shifting method
Reversible data hiding using histogram shifting methodReversible data hiding using histogram shifting method
Reversible data hiding using histogram shifting method
 
Hybrid encryption ppt
Hybrid encryption pptHybrid encryption ppt
Hybrid encryption ppt
 

Ähnlich wie Reversible Data Hiding in Encrypted Image: A Review

Scalable Image Encryption Based Lossless Image Compression
Scalable Image Encryption Based Lossless Image CompressionScalable Image Encryption Based Lossless Image Compression
Scalable Image Encryption Based Lossless Image CompressionIJERA Editor
 
Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...CSCJournals
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYIRJET Journal
 
IRJET- Securely Performing Operations on Images using PSNR
IRJET-  	  Securely Performing Operations on Images using PSNRIRJET-  	  Securely Performing Operations on Images using PSNR
IRJET- Securely Performing Operations on Images using PSNRIRJET Journal
 
Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...
Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...
Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...IRJET Journal
 
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...IRJET Journal
 
Nesting of five modulus method with improved lsb subtitution to hide an image...
Nesting of five modulus method with improved lsb subtitution to hide an image...Nesting of five modulus method with improved lsb subtitution to hide an image...
Nesting of five modulus method with improved lsb subtitution to hide an image...eSAT Publishing House
 
A secured data transmission system by reversible data hiding with scalable co...
A secured data transmission system by reversible data hiding with scalable co...A secured data transmission system by reversible data hiding with scalable co...
A secured data transmission system by reversible data hiding with scalable co...IAEME Publication
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Dft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of imagesDft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of imageseSAT Journals
 
Dft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of imagesDft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of imageseSAT Publishing House
 
Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.IRJET Journal
 
novel Approach For Data Hiding by integrating Steganography and Extended Visu...
novel Approach For Data Hiding by integrating Steganography and Extended Visu...novel Approach For Data Hiding by integrating Steganography and Extended Visu...
novel Approach For Data Hiding by integrating Steganography and Extended Visu...swapnalithakur7
 
K041068072
K041068072K041068072
K041068072ijceronline
 
IRJET- Image Privacy Protection as a Single Share
IRJET-  	  Image Privacy Protection as a Single ShareIRJET-  	  Image Privacy Protection as a Single Share
IRJET- Image Privacy Protection as a Single ShareIRJET Journal
 

Ähnlich wie Reversible Data Hiding in Encrypted Image: A Review (20)

Scalable Image Encryption Based Lossless Image Compression
Scalable Image Encryption Based Lossless Image CompressionScalable Image Encryption Based Lossless Image Compression
Scalable Image Encryption Based Lossless Image Compression
 
Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
 
IRJET- Securely Performing Operations on Images using PSNR
IRJET-  	  Securely Performing Operations on Images using PSNRIRJET-  	  Securely Performing Operations on Images using PSNR
IRJET- Securely Performing Operations on Images using PSNR
 
Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...
Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...
Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...
 
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
 
Nesting of five modulus method with improved lsb subtitution to hide an image...
Nesting of five modulus method with improved lsb subtitution to hide an image...Nesting of five modulus method with improved lsb subtitution to hide an image...
Nesting of five modulus method with improved lsb subtitution to hide an image...
 
A secured data transmission system by reversible data hiding with scalable co...
A secured data transmission system by reversible data hiding with scalable co...A secured data transmission system by reversible data hiding with scalable co...
A secured data transmission system by reversible data hiding with scalable co...
 
19_2
19_219_2
19_2
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Dft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of imagesDft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of images
 
Dft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of imagesDft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of images
 
Ijariie1132
Ijariie1132Ijariie1132
Ijariie1132
 
V01 i010411
V01 i010411V01 i010411
V01 i010411
 
Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.
 
Sub1584
Sub1584Sub1584
Sub1584
 
novel Approach For Data Hiding by integrating Steganography and Extended Visu...
novel Approach For Data Hiding by integrating Steganography and Extended Visu...novel Approach For Data Hiding by integrating Steganography and Extended Visu...
novel Approach For Data Hiding by integrating Steganography and Extended Visu...
 
K041068072
K041068072K041068072
K041068072
 
IRJET- Image Privacy Protection as a Single Share
IRJET-  	  Image Privacy Protection as a Single ShareIRJET-  	  Image Privacy Protection as a Single Share
IRJET- Image Privacy Protection as a Single Share
 

Mehr von Editor IJMTER

A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIPA NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIPEditor IJMTER
 
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...Editor IJMTER
 
Analysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentAnalysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentEditor IJMTER
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationEditor IJMTER
 
Aging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetAging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetEditor IJMTER
 
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...Editor IJMTER
 
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESA CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESEditor IJMTER
 
Sustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialSustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialEditor IJMTER
 
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTUSE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTEditor IJMTER
 
Textual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisTextual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisEditor IJMTER
 
Testing of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsTesting of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsEditor IJMTER
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection TechniquesEditor IJMTER
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICEEditor IJMTER
 
SURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSSURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSEditor IJMTER
 
Survey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkSurvey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkEditor IJMTER
 
Step up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveStep up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveEditor IJMTER
 
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONSPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONEditor IJMTER
 
Software Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeSoftware Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeEditor IJMTER
 
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisEditor IJMTER
 
Software Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeSoftware Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeEditor IJMTER
 

Mehr von Editor IJMTER (20)

A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIPA NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
 
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
 
Analysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentAnalysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX Environment
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-Duplication
 
Aging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetAging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the Internet
 
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
 
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESA CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
 
Sustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialSustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building Material
 
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTUSE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
 
Textual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisTextual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative Analysis
 
Testing of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsTesting of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different Processors
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection Techniques
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
 
SURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSSURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODS
 
Survey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkSurvey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor Network
 
Step up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveStep up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor Drive
 
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONSPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
 
Software Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeSoftware Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing Scheme
 
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global Analysis
 
Software Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeSoftware Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking Scheme
 

KĂŒrzlich hochgeladen

🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadaditya806802
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the weldingMuhammadUzairLiaqat
 
TechTACÂź CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTACÂź CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTACÂź CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTACÂź CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptMadan Karki
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxVelmuruganTECE
 
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...Amil Baba Dawood bangali
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgsaravananr517913
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 

KĂŒrzlich hochgeladen (20)

🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasad
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the welding
 
TechTACÂź CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTACÂź CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTACÂź CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTACÂź CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptx
 
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 

Reversible Data Hiding in Encrypted Image: A Review

  • 1. Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com @IJMTER-2014, All rights Reserved 334 e-ISSN: 2349-9745 p-ISSN: 2393-8161 Reversible Data Hiding in Encrypted Image: A Review Ms. Nuzhat Ansari1 , Prof. Rahila Sheikh2 1 Dept. Of Computer Sci. & Engg., Rajiv Gandhi College of Engg. Research & Tech., Chandrapur,Maharashtra,India 2 Dept. Of Computer Technology,Rajiv Gandhi College of Engg. Research &Tech., Chandrapur,Maharashtra,India Abstract-Recently, more and more attention is paid to reversible data hiding (RDH) in encrypted images, since it maintains the excellent property that the original cover can be losslessly recovered after embedded data is extracted while protecting the image content’s conïŹdentiality. All previous methods embed data by reversibly vacating room from the encrypted images, which may be subject to some errors on data extraction and/or image restoration. In this survey paper, we discuss about various methods and algorithms which were used for reversible data hiding (RDH) in encrypted image to make data hiding process effortless. We also use visual cryptographic approach for encryption which helps to protect the image during transmission. The scheme is suitable for authentication based application where collective acceptance and decision making plays an important role. The main goal is to retrieve the original image with lossless process and minimum computation during image encryption /decryption by using keyless approach. Keywords - Reversible Data Hiding, image encryption, Visual Cryptography, encryption/decryption, authentication. I. INTRODUCTION Reversible Data hiding is the method of hiding data inside a cover file so that both the data and the cover file could be recovered lossless at the receiver. The transmitter side of such systems involves a cover image, additional data, encryption key and data hiding key. The original image will be encrypted, data will be hidden and then image will be transmitted. The receiver thus needs to decrypt the image and extract the data. For maintaining the security of images, two different approaches can be employed that is one encrypting the image using the encryption keys and second approach can be without using the keys, where the image is divided into different shares to maintain the image secrecy. This allows the visual information to be encrypted in such a way that their decryption can be performed by human visual system. Unfortunately heavy computation cost and key management limit the employment of the first approach and the poor quality of the recovered image from the random shares limit the application of the second approach. More and more attention is paid to reversible data hiding in encrypted images. Data hiding plays an important role in information security. It aims at embedding imperceptible confidential information data in cover media such as static images, audio, videos, 3D meshes and so on. As long as images are concerned data hiding which cannot perceive between stegno image and cover image by human, the cover image still can get harmed in processing. Many different techniques have been proposed to get back the cover image lossless. The reversibility means not only embedding data but also original image can be precisely recovered in the extracting stage. Most hiding techniques perform data embedding by altering the contents of a host media. As a result the host image cannot be completely
  • 2. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 335 recovered after the bit extraction. These types of data hiding techniques are thus irreversible. However in a number of domains such as military, legal and medical imaging although some embedding distortion is admissible, permanent loss of signal fidelity is undesirable. This highlights the need for Reversible (Lossless) data embedding techniques. Thus the proposed approach gives a novel technique for reversible data hiding using visual cryptography. With the scheme involving use of secret keys have limitations as regards key management. In addition in some cases the available keys for encryption are limited (restricted key space), also high computation involved in encryption. All these factors comprise the problem domain for using traditional encryption techniques in reversible data hiding. In opposite to this approach the method using visual cryptography techniques involve no use of keys for encryption keeping computational cost for encryption /decryption low. Reversible Data Hiding: Reversible data hiding is an approach where data is hidden in an encrypted image. A reversible data hiding is an algorithm, which can recover the original image losslessly from the stego-image after the hidden data have been extracted. This important technique is widely used in medical imagery, military imagery and law forensics where no distortion of original image is allowed [2]. Visual Cryptography: Visual cryptography (VC) is a process where a secret image is encrypted into shares which refuse to divulge information about the original secret image. Its strength is a fact that the decryption of the secret image is through human visual system without computation [5]. II. RELATED WORK Reversible data embedding has drawn lots of interest recently. Being reversible, the original digital content can be completely restored. As the amount of information needed to be embedded (payload and original values in the embedding area) is larger than that of the embedding area and the space saved from compression will be used for embedding the payload. Siddharth Malik, Anjali Sardana, Jaya [3] proposed an approach without the use of encryption keys. Maintaining the secrecy and confidentiality of images is a vibrant area of research, with two different approaches being followed, the first being encrypting the images through encryption algorithms using keys; the other approach involves dividing the image into random shares to maintain the images secrecy. The proposed technique involves splitting an image into multiple shares. The shares so generated reveal no information about the original secret image and to retrieve the secret image all the shares are required. The proposed technique is implemented with the SDS algorithm and involves three steps – Sieving, Division and Shuffling. This technique involves computation during the encryption and decryption stages and the results are to be viewed on the computer monitors hence it is natural for us to use the additive color model. The scheme presented here is a (z, z) threshold scheme i.e. for retrieving a secret image that has been divided into z shares all z shares are required. No shares individually convey any information about the secret image, nor do a combination of subset of random shares. Mehmet U. Celik, Gaurav Sharma, A. Murat Tekalp, Eli Saber [4] proposed a novel reversible data hiding technique, which enables the exact recovery of the original host signal upon extraction of the embedded information. A generalization of LSB (least significant bit) modification is proposed as the data embedding method, which introduces additional operating points on the capacity-distortion curve. Lossless recovery of the original is achieved by compressing portions of the signal that are susceptible to embedding distortion, and transmitting these compressed descriptions as a part of the embedded payload. It represents a high-capacity, low-distortion, lossless data embedding algorithms. In all algorithms, recovery of the original image is enabled by compressing, transmitting, and
  • 3. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 336 recovering these features. This property of the proposed method provides excellent compression of relatively simple image features. Moni Naor and Adi Shamir [5] proposed visual cryptography which is a method of protecting confidential information. It encrypts the content of information using some mathematical computation and then the decryption is done to revert back onto the original image and it requires the use of a secret key. With remarkable advances in computer technology, using a computer to decrypt secret image is infeasible in some situations. In these situations, the human visual system is one of the most convenient and reliable technique to do secret recovery. They come up with a visual secret sharing scheme, where an image is divided or broken up into n shares so that only someone with all n shares could decrypt the image, while someone with any n-1 shares can reveal no information about the original image. Each share is printed on a separate transparency (which serve the purpose of secret key) and decryption is performed by overlaying the shares when all n shares are overlaid, the original image gets appeared. Visual Cryptography provides one of the secure ways to transfer images on the Internet. The advantage of visual cryptography is that it exploits human eyes to decrypt secret images with no computation required. Jun Tian [1] proposed reversible data embedding which has drawn lots of interest recently. Being reversible, the original digital content can be completely restored. He proposed reversible data embedding method for digital images. This paper explores the redundancy in digital images to achieve very high embedding capacity, and keep the distortion low. DE technique was introduced, which discovers extra storage space by exploring the redundancy in the image content. During data embedding, modify all changeable difference values, by either adding a new LSB (via the DE) or modifying its LSB. To guarantee an exact recovery of the original image, One should also embed the original values of those modified LSBs. In brief, the date-embedding DE algorithm consists of six steps: calculating the difference values, partitioning difference values into four sets, creating a location map, collecting original LSB values, data embedding by replacement, and finally an inverse integer transform. Wen-Chung Kuo, Shao-Hung Kuo, Lih-ChyauWuu [9] proposed a reversible data hiding scheme based on EMD data hiding and JPEG image compression technology still keeping high embedding capacity, security and good compression ratio. Both data hiding and data compression are very important technologies in the field of image processing. It seems that there is no relationship between data hiding and data compression because most of the data hiding mechanisms focus on information security and the data compression mechanisms emphasize the compression ratio. . In fact, they are closely related. Until now, there are many literatures to discuss the secret data how to be embedded into the media image. Unfortunately, the stegno-image’s size will be increased when the media image is hidden a lot of secret data. In order to overcome this disadvantage, a reversible data hiding scheme based on EMD data hiding and JPEG compression technology has been proposed in this paper. According to the experimental results, proposed scheme still keeps high embedding capacity, security and good compression ratio. J. Fridrich, M. Goljan, and D. Rui [10] presented a review of reversible watermarking techniques and showdifferent methods that are used to get reversible data hiding technique with higher embedding capacity and invisible objects. Watermark need not be hidden. Watermarking can be applied to images, text, audio/video, software. In this review authors have described the different data hidingtechniques. The Image watermarking technique is used for protection and authentication of intellectual property. Invisible watermarking of images, the watermark image is embedded in a primary image such that watermark isintentionally perceptible to a human observer whereas in the case of invisible watermarking the embedded data isnot perceptible, but may be extracted/detected
  • 4. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 337 by a computer program.The lossless watermarking technique is a process that is used for the exact recovery of the original image. Lossless watermarks found applications in fragile authentication, integrity protection, and metadata embedding. It is especially important for medical and military images. The lossless watermarking technique is also refer to as invertible, or distortion-free data hiding technique because it is capable of restoring the embedded image to its original state without accessing any side information. We can say that the embedding distortion can be erased or removed from the embedded image. C. Anuradha, S. Lavanya [11] proposed secure and authenticated discrete reversible data hiding in cipher images deals with security and authentication. In the first phase, a content owner encrypts the original uncompressed image using an encryption key. Then, a data hider may compress the least significant bits of the encrypted image using a data hiding key to create a sparse space to accommodate some additional data. With an encrypted image containing additional data, if a receiver has the data hiding key, receiver can extract the additional data though receiver does not know the image content. If the receiver has the encryption key, can decrypt the received data to obtain an image similar to the original one, but cannot extract the additional data. If the receiver has both the data hiding key and the encryption key, can extract the additional data and recover the original content without any error by exploiting the spatial correlation in natural image when the amount of additional data is not too large. It is also a drawback because if the receiver has any one key as known, and then he can take any information from the encrypted data. In order to achieve authentication SHA-1 algorithm is being used. The proposed scheme is made up of image encryption, data embedding and data-extraction/image-recovery phases. This paper proposes a separable reversible data hiding in encrypted image. In the proposed scheme, the original image is encrypted using an encryption key and the additional data are embedded into the encrypted image using data-hiding key. With an encrypted image containing additional data, if the receiver has only the data-hiding key, he can extract the additional data though receiver does not know the image content. If receiver has only the encryption key, he can decrypt the received data to obtain an image similar to the original one, but cannot extract the embedded additional data. III. PROPOSED WORK The proposed method combines the benefits of two different approaches together that are reversible data hiding and visual cryptography. This gives an efficient solution to overcome the limitations of existing schemes in the area of reversible data hiding. Losslessly vacating the room from the encrypted image is relatively difficult and sometimes inefficient, so in the proposed system we have applied a method of vacating the room for embedding data prior to the image encryption, hence the vacated room can be used to hide the secret data. For image encryption instead of using any standard cipher, here a method of visual cryptography is used. In visual cryptography approach the image is divided into random shares and for retrieving the image all the shares will be required. Thus the image is protected in transmission and secret data is also transmitted securely. It does not involve the use of keys for encryption, has low storage and bandwidth requirements, while also keep the computation cost low during encryption and decryption. Thus key management is not an issue but the proposed method provides complete lossless image recovery and data extraction. In general, we hide the data in the image only in the pixel value, the proposed system will divide an image into individual RGB components and stores each bit in the corresponding components. Since we are dividing the pixel value into three components, so the search space we get is three times more. This means we can add large amount of data in the image without degrading the quality of the image. The proposed method aims at achieving complete reversibility with minimum computation by employing keyless approach of visual cryptography.
  • 5. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 338 It involves following steps: 1) Vacating room for embedding data 2) Data Embedding in reserved vacated room 3) Image Encryption using keyless SDS algorithm 4) Original image recovery 5) Data extraction Fig.1: Framework for Proposed Scheme IV. CONCLUSION Reversible data hiding in encrypted image is drawing lots of attention because of privacy preserving requirements. Thus proposed scheme provides a completely new framework for reversible data hiding. Here in this approach we have used a new technique for reserving room before encryption of image. Thus the data hider can benefit from the extra space emptied out in previous stage before encryption to make data hiding process effortless. In the proposed approach we take advantage of visual cryptography approach for encrypting the image. Thus the image is protected in transmission and secret data is also transmitted securely. The employed technique involves the three main steps that are sieving, division and shuffling the images. Thus random shares are so generated from shuffled shares of image are transmitted. As this approach does not involve any use of keys is keyless approach for image encryption with the complete lossless image recovery and data extraction. REFERENCES [1] Jun Tian “Reversible Data Embedding Using a Difference Expansion” Transactions on circuits and systems for video technology, VOL. 13, NO. 8, AUGUST 2003. [2] Kede Ma, Weiming Zhang, Xianfeng Zhao, Nenghai Yu, and Fenghua Li, “ Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption” , IEEE Transaction on Information Forensics and Security, Vol.8, No.3, March 2013. [3] Siddharth Malik, Anjali Sardana, Jaya, “A Keyless Approach to Image Encryption”,2012 international conference on Communication systems and Network Technologies ©2012 IEEE. [4] Mehmet U. Celik, Gaurav Sharma, A. Murat Tekalp, Eli Saber, “Reversible Data Hiding”, IEEE ICIP 2002. [5] Moni Naor and Adi Shamir, “Visual cryptography”, in Proceedings of Advances in Cryptology EUROCRYPT 94, LNCS Vol. 950, pages 1-12. Springer-Verlag, 1994.
  • 6. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 339 [6] Kuo-Ming Hung, Wen-Kai Su, Ting-Wen Chen, Li-Ming Chen, “Reversible Data Hiding Base on VQ and Halftoning Technique”,8th International Conference on Information Science and Digital Content Technology(ICIDT),© IEEE 2012. [7] Jose, R.; Abraham, G, “A separable reversible data hiding in encrypted image with improved performance”, Emerging Research Areas and 2013 International Conference on Microelectronics, Communications and Renewable Energy(AICERA/ICMiCR), 2013 Annual International Conference ©IEEE 2013 [8] Jithi P V, Anitha T Nair, “Progressive Visual Cryptography with Watermarking for meaningful shares”, International Multi-Conference on Automation , computing , Communication , control and Compressed Sensing (iMac4s), 2013. [9] Wen-Chung Kuo, Shao-Hung Kuo, Lih-ChyauWuu, “High Embedding Reversible Data Hiding Scheme for JPEG”, Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing,(IIH- MSP),Oct,2010. [10] J. Fridrich, M. Goljan, and D. Rui, “Lossless Data Embedding - New Paradigm in Digital Watermarking”, In Special Issue on Emerging Applications of Multimedia Data Hiding, Vol. 2, pp. 185-196, February 2002. [11] C. Anuradha, S. Lavanya, “Secure and Authenticated Reversible Data Hiding in Encrypted Image”, International Journal of Advanced Research in Computer Science and Software Engineering, volume 3,issue 4, April 2013