Author : Samiksha Velip 1
Date of Publication :16th August 2017
Abstract: With the popularity of outsourcing data to the cloud, it is vital to protect the privacy of data. Systems security becomes the first consideration to prevent illegal access as interest of information security has increased recently. Information hiding is one of the methods for secret communication, where the existence of the secret data is hidden. In this paper, we propose a novel framework for reversible data hiding scheme using context free grammar where additional data can be embedded in encrypted image in form of context free grammar
Reference :
-
- Gayatri Pisal, Aparna More, Sonali Pawar, and Ashwini Vishwakarma “Separable Reversible Data Hiding in Encrypted Video File IJRCS - International Journal of Research in Computer Science, Volume: 02 Issue: 04 2015.
- Mr. Ratnakar Kumbhar, Mr. Sagar Yamgar, Ms. Rupali Ghule, Prof. Murkute P.K “Data Hiding in Encrypted H.264/AVC Video Streams By Codeword Substitution” IEEE International Journal of Computer Science and Information Technology Research ISSN 2348-120X (online) Vol. 3, Issue 2, pp: (323-331), Month: April - June 2015
- Z. Ni, Y. Shi, N. Ansari, and S. Wei, “Reversible data hiding”, IEEE Trans.Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354362, Mar.2006.
- J. Kieffer and E-h. Yang, “Design of context-free grammars for lossless data compression,”Technical Report, Dept. of Electrical & Computer Engineering, University of Minnesota Twin Cities.
- Lixiao Zheng, Duanyi Wu, “A Sentence Generation Algorithm for Testing Grammars”, 2009 33rd Annual IEEE International Computer Software and Applications Conference
- Masoud Nosrati, Ronak Karimi, and Mehdi Hariri,” Reversible Data Hiding: Principles, Techniques, and Recent Studies, World Applied Programming, Vol (2), Issue (5), May 2012. 349-353.
- Xinpeng Zhang, “Separable Reversible Data Hiding in Encrypted Image”, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 2, APRIL 2012
- X. Zhang, “Lossy compression and iterative reconstruction for encrypted image,” IEEE Trans. Inform. Forensics Security, vol. 6, no. 1, pp. 53–58, Feb. 2011.
- W. Liu, W. Zeng, L. Dong, and Q. Yao, “Efficient compression of encrypted grayscale images,” IEEE Trans. Image Process., vol. 19, no. 4, pp. 1097–1102, Apr. 2010.
- M. Johnson, P. Ishwar, V. M. Prabhakaran, D. Schonberg, and K. Ramchandran, “On compressing encrypted data,” IEEE Trans. Signal Process., vol. 52, no. 10, pp. 2992–3006, Oct.2004.