International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 54 | Number 1 | Year 2017 | Article Id. IJCTT-V54P104 | DOI : https://doi.org/10.14445/22312803/IJCTT-V54P104

Reversible data hiding in encrypted images: A survey


Ms.Mili Els Jose

Citation :

Ms.Mili Els Jose, "Reversible data hiding in encrypted images: A survey," International Journal of Computer Trends and Technology (IJCTT), vol. 54, no. 1, pp. 16-18, 2017. Crossref, https://doi.org/10.14445/22312803/IJCTT-V54P104

Abstract

This paper presents a survey of various methods for reversible data hiding in Encrypted Images. Reversible data hiding is a technique to embed additional message into a cover media with a reversible manner so that the original cover image can be perfectly restored after extraction of the hidden message. It will give security to the embedded data. But in the areas like cloud storage, medical systems etc. it is important to give protection to the image also .To solve this problem Reversible data hiding in encrypted images are used.

Keywords

This paper presents a survey of various methods for reversible data hiding in Encrypted Images. Reversible data hiding is a technique to embed additional message into a cover media with a reversible manner so that the original cover image can be perfectly restored after extraction of the hidden message. It will give security to the embedded data. But in the areas like cloud storage, medical systems etc. it is important to give protection to the image also .To solve this problem Reversible data hiding in encrypted images are used.

References

[1] J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896, 2003.
[2] X. Zhang, “Reversible Data Hiding In Encrypted Image”S, IEEE Signal Processing Letters, vol. 18, no. 4, pp. 255–258, 2011.
[3] W. Puech, M. Chaumont, and O. Strauss, “A Reversible Data Hiding Method For Encrypted Images,” Proc. SPIE, vol. 6819, p. 68191E, Feb. 2008.
[4] X. Zhang, “Separable Reversible Data Hiding In Encrypted Image,”IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 826–832,Apr. 2012.
[5] Xinpeng Zhang, Member, IEEE, Jing Long, Zichi Wang, and Hang Cheng, “Lossless And Reversible Data Hiding In Encrypted Images With Public-Key Cryptography”, IEEE Transactions On Circuits And Systems For Video Technology, Vol. 26, No. 9, September 2016.
[6] P. Paillier, “Public-key cryptosystems based on composite degree residuosity classes,” in Advances in Cryptology (Lecture Notes in Computer Science), vol. 1592. Berlin, Germany: Springer-Verlag, 1999, pp. 223–238.
[7] K. Ma, W. Zhang, X. Zhao, N. Yu, and F. Li, “Reversible data hiding in encrypted images by reserving room before encryption,” IEEE Trans. Inf. Forensics Security, vol. 8, no. 3, pp. 553–562,Mar. 2013.
[8] Ahmet Murat Tekal, Eli Saber, Mehmet Utku Celik , Gaurav Sharma,”Lossless Generalized-LSB Data Embedding”, IEEE Transactions On Image Processing, Vol. 14, No. 2, February 2005.
[9] J. Tian, “Reversible watermarking by difference expansion,” in Proc.Workshop on Multimedia and Security, J. Dittmann, J. Fridrich, and P.Wohlmacher, Eds., Dec. 2002, pp. 19–22.