Research Article | Open Access | Download PDF
Volume 54 | Number 1 | Year 2017 | Article Id. IJCTT-V54P104 | DOI : https://doi.org/10.14445/22312803/IJCTT-V54P104
Reversible data hiding in encrypted images: A survey
Ms.Mili Els Jose
Citation :
Ms.Mili Els Jose, "Reversible data hiding in encrypted images: A survey," International Journal of Computer Trends and Technology (IJCTT), vol. 54, no. 1, pp. 16-18, 2017. Crossref, https://doi.org/10.14445/22312803/IJCTT-V54P104
Abstract
This paper presents a survey of various methods for reversible data hiding in Encrypted Images. Reversible data hiding is a technique to embed additional message into a cover media with a reversible manner so that the original cover image can be perfectly restored after extraction of the hidden message. It will give security to the embedded data. But in the areas like cloud storage, medical systems etc. it is important to give protection to the image also .To solve this problem Reversible data hiding in encrypted images are used.
Keywords
This paper presents a survey of various methods for reversible data hiding in Encrypted Images. Reversible data hiding is a technique to embed additional message into a cover media with a reversible manner so that the original cover image can be perfectly restored after extraction of the hidden message. It will give security to the embedded data. But in the areas like cloud storage, medical systems etc. it is important to give protection to the image also .To solve this problem Reversible data hiding in encrypted images are used.
References
[1] J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896, 2003.
[2] X. Zhang, “Reversible Data Hiding In Encrypted Image”S, IEEE Signal Processing Letters, vol. 18, no. 4, pp. 255–258, 2011.
[3] W. Puech, M. Chaumont, and O. Strauss, “A Reversible Data Hiding Method For Encrypted Images,” Proc. SPIE, vol. 6819, p. 68191E, Feb. 2008.
[4] X. Zhang, “Separable Reversible Data Hiding In Encrypted Image,”IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 826–832,Apr. 2012.
[5] Xinpeng Zhang, Member, IEEE, Jing Long, Zichi Wang, and Hang Cheng, “Lossless And Reversible Data Hiding In Encrypted Images With Public-Key Cryptography”, IEEE Transactions On Circuits And Systems For Video Technology, Vol. 26, No. 9, September 2016.
[6] P. Paillier, “Public-key cryptosystems based on composite degree residuosity classes,” in Advances in Cryptology (Lecture Notes in Computer Science), vol. 1592. Berlin, Germany: Springer-Verlag, 1999, pp. 223–238.
[7] K. Ma, W. Zhang, X. Zhao, N. Yu, and F. Li, “Reversible data hiding in encrypted images by reserving room before encryption,” IEEE Trans. Inf. Forensics Security, vol. 8, no. 3, pp. 553–562,Mar. 2013.
[8] Ahmet Murat Tekal, Eli Saber, Mehmet Utku Celik , Gaurav Sharma,”Lossless Generalized-LSB Data Embedding”, IEEE Transactions On Image Processing, Vol. 14, No. 2, February 2005.
[9] J. Tian, “Reversible watermarking by difference expansion,” in Proc.Workshop on Multimedia and Security, J. Dittmann, J. Fridrich, and P.Wohlmacher, Eds., Dec. 2002, pp. 19–22.