Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Reversible Data hiding by Reversible image Transformation Algorithm for Encrypted Images

Author : Bharati S Pochal 1 Gayatri Prasanna 2

Date of Publication :8th August 2017

Abstract: The outsourcing data to the cloud is very important to defend privacy of the information and it will allow the cloud server to easily manage the information at the same time. And reversible data hiding in encrypted images (RDH-EI), it will attracts the more and more researchers interest and also we are introduced a framework for RDH-EI based on Reversible Image Transformation that is [RIT]. This one is the unique framework from all other frameworks, in which framework the cipher text may be attract the notation of the interested cloud. This framework permits the client to convert the original image content in to target image content with a similar size, and the transformed image seems like a target image and it is used as an encrypted image and it is outsourced to the cloud. For this the cloud server embeds the data in to encrypted image so easily, by using any RDH techniques for the plain text pictures. Like that we realized that client free scheme for RDH-EI, and this is data embedding process and it will be implemented by the cloud server is unrelated with the both encryption and decryption process, to embed the watermark in the encrypted image we need two RDH techniques, including unified embedding, scrambling scheme and traditional RDH scheme, it can assure different requirements on picture quality and huge embedding capacity.

Reference :

    1. A. W. Zhang, X. Hu, N. Yu, et al. “Recursive histogram modification: establishing equivalency between reversible data hiding and lossless data compression,” IEEE Trans. on Image Processing, vol. 22, no. 7, pp. 2775-2785, Jul. 2013.
    2. V. Sachnev, H. J. Kim, J. Nam, S. Suresh, and Y. Q. Shi, “Reversible watermarking algorithm using sorting and prediction,” IEEE Trans. on Circuits and Systems for Video Technology, vol.19, no.7, pp. 989-999, Jul. 2009.
    3. B.ou, X. Li, Y. Zhao, R. Ni, Y. Shi, “Pairwise prediction-error expansion for efficient reversible data hiding,” IEEE Trans. On Image Processing, vol. 22, no.12, pp. 5010-5021, Dec. 2013.
    4. Ioan-Catalin Dragoi, Dinu Coltuc, “Local-predictionbased difference expansion reversible watermarking,” IEEE Trans. on Image Processing, vol. 23, no. 4, pp. 1779-1790, Apr. 2014.
    5. Z. Ni, Y. Shi, N. Ansari, and S. Wei, “Reversible data hiding,” IEEE Trans. on Circuits and Systems for Video Technology, vol. 16, no. 3, pp. 354-362, Mar. 2006.
    6. Klimis Ntalianis and Nicolas Tsapatsoulis, “Remote Authentication via Biometrics: A Robust Video-Object Steganographic Mechanism Over Wireless Networks,” in IEEE Transactions on Emerging Topics In Computing, Jan. 2015.
    7. Mehran Andalibi and Damon M. Chandler,, “Digital Image watermarking via adaptive logo texturization,” in IEEE Transactions on Image processing, Dec. 2015.
    8. Huang Lidong, Zhao Wei, Wang Jun and Sun Zebin, “Combination of contrast limited adaptive histogram equalization and discrete wavelet transform for image enhancement,” in IET Transactions on Image processing, 2015, Vol. 9, Issue no. 10, pp. 908–915
    9. Xinpeng Zhang, Member, IEEE, Yanli Ren, Liquan Shen, Zhenxing Qian, and Guorui Feng, “Compressing Encrypted Images with Auxiliary information,” IEEE Transactions on Image processing, vol. 16, no. 5, pp. 1327–1336, Aug 2014.
    10. W. Hong and M. Hang, “Robust Digital Watermarking Scheme for Copy Right Protection”,IEEE Trans.Signal process,Vo.12, pp.1-8-2006

Recent Article