Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Engrafting Data Using RDH by Reserving Room before Encryption

Author : G.Abinaya 1 Deepanshu Garg 2 Sarthak Kabra 3 Shivani Priya 4 Akanksha Priya 5

Date of Publication :17th April 2018

Abstract: There is also a large number of tasks on data covering in the engrafted field. Most of the work on RDH concentrates on the encryption and decryption of the data. This method is by reserving a room before encryption using traditional RDH a technique, and thus it is simple for the data hider to reversible engrafts the data in the engrafted image. The method that we are proposing can accomplish real reversible-ness, and extraction of data and recovery of the picture are free of any fault. Thus the data hider can profit from the additional space Released out in the prior stage to make data hiding method smooth. The stated scheme can take benefit of all regular RDH procedures for definite pictures. It obtains great description without loss of perfect privacy. Furthermore, this new method can obtain actual reversibility, separate data wrenching and an excellent growth on the quality of marked decrypted Pictures. Testing showed that this scheme can secure more than ten times as extensive payloads for the same picture quality as the prior schemes. The data extraction and image recovery can be achieved by examining the block smoothness. After encrypting the entire data of an uncompressed image by a stream cipher, the additional data can be embedded into the image by modifying a small dimension of encrypted data. With an encrypted image containing additional data, first we decrypt it using the encryption solution, and the decrypted version is similar to the original picture. According to the data-hiding key, with the aid of spatial similarity in a natural image, the embedded data can be successfully obtained and the original image can be perfectly revived.

Reference :

    1. J. Tian, Reversible data embedding using a difference expansion, IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890896, Aug. 2003.
    2. Z. Ni, Y. Shi, N. Ansari, and S. Wei, Reversible data hiding, IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354362, Mar. 2006.
    3. X. L. Li, B. Yang, and T. Y. Zeng, Efficient reversible watermarking based on adaptive predictionerror expansion and pixel selection, IEEE Trans. Image Process., vol. 20, no. 12, pp. 35243533, Dec. 2011
    4. L. Luo et al., Reversible image watermarking using interpolation tech-nique, IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 187193, Mar. 2010.
    5. X. Zhang, Reversible data hiding in encrypted images, IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255258, Apr. 2011.
    6.  X. Zhang, Separable reversible data hiding in encrypted image, IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 826832, Apr. 2012

Recent Article