Author : Kalyani D. Kadukar 1
Date of Publication :23rd August 2017
Abstract: The aim of this project is related to novel scheme for separable reversible data hiding in encrypted image is proposed, which consists of image encryption, data embedding and data-extraction/image-recovery ,3D chaos generation,3D histogram equalization, row rotation, column rotation and XOR operation phases. Additional message are embed into some cover media, such as military or medical images, in a reversible manner so that the original cover content can be perfectly restored after extraction of the hidden message is called reversible data hiding. Separable reversible data hiding, the name its self indicates that it is a separable reversible data technique .That is it is reversible data technique but which is separable. The separable means which is able to separate .The separation of activities i.e. extraction of original cover image and extraction of payload is done in this method. This separation requires some basic cause to occur. In separable data hiding key explained by Xinpeng Zhang the separation exists according to keys. Digital images has increased rapidly on the Internet. Security becomes increasingly important for many applications, confidential transmission, video surveillance, military and medical applications. The transmission of images is a daily routine and it is necessary to find an efficient way to transmit them over networks
Reference :
-
- X. Zhang,(2011) “Reversible data hiding in encrypted image,” IEEE Signa Process. Lett., vol. 18, no. 4, pp. 255–258..
- Chia-Chen Lin, Pei-Feng Shiu, “DCT-based Reversible Data Hiding Scheme” , JOURNAL OF SOFTWARE, VOL. 5, NO. 2, FEBRUARY 2010
- Zhicheng Ni Yun-Qing Shi, Nirwan Ansari, and Wei Su (2011) , “Reversible data hiding," IEEE Trans. Circuits Syst. Video Technol, vol. 16, no. 3, Mar 2006,pp. 354-362.
- Xinpeng Zhang, (2013) “Separable Reversible Data Hiding in Encrypted Image”, IEEE transactions on information forensics and security, vol. 7, NO. 2, APRIL 2012.
- Srivastava, A., “A survey report on Different Techniques of Image Encryption”. International Journal of Emerging Technology and Advanced engineering. Vol. 2, pp. 163-167. 2012
- S. Lian., “A Block Cipher Based on Chaotic Neural Networks”.Elsevier, Neurocomputing, vol. 72, pp. 1296-1301, 2009.
- Bhatnagar, G., & Wu, Q., “Chaos-Based Security Solution for Fingerprint Data During Communication and Transmission”. Instrumentation and Measurement, IEEE Transactions on, 61(4), 876-887. 2012.
- Chang, C. C., Hwang, M. S., Chen, T. S., “A new encryption algorithm for image cryptosystems”. Journal of Systems and Software, 58(2), 83-91. 2001 [9] Schneier B., “Applied Cryptography: Protocols, Algorithms, and Source Code in C”, John Wileyand Sons, New York, 1996. 2002.
- Kwok H. and Tang W., “A Fast Image Encryption System Based on Chaotic Maps With Finite Precision Representation,” Chaos, Solitons and Fractals, vol. 32, no. 4, pp. 1518-1529, 2007.
- L. Kocarev., “Chaos-Based Cryptography: A Brief Overview”. IEEE Circuits and Systems, 1(3):6–21, 200.
- J. C. Yen and J. I. Guo, “A new image encryption algorithm and its VLSI architecture.” in Proceedings of IEEE workshop on signal processing systems, pp. 430–437, 1999.
- J. C. Yen and J. I. Guo, “A new chaotic keybased design for image encryption and decryption.” in Proceedings of IEEE International Symposium on Circuits and Systems, Vol.4, pp. 49–52, 2000.
- L. Zhang, X. Liao, X. Wang, “An image encryption approach based on chaotic maps.” Chaos, Solitons and Fractals, vol. 24, no. 3, pp. 759–765, 2005.
- C. Dongming, Z. zhiliang, Y. Guangming, "An Improved Image Encryption Algorithm Based on Chaos." in Proceedings of IEEE International Conference for Young Computer Scientists, pp. 2792-2796, 2008.
- A. N. Pisarchik, N. J. Flores-Carmona and M. Carpio-Valadez, “Encryption and decryption of images