Pre Encryption Data hiding techniques using Reserving Room Approach

The data hiding may easily embed data along with a visible watermark in an encrypted picture thanks to a novel approach suggested in this research that involves room reservation prior to encryption using a typical RDH algorithm. People pay greater care these days while transferring secure data. Sinc...

Full description

Saved in:
Bibliographic Details
Published in2022 IEEE International Conference for Women in Innovation, Technology & Entrepreneurship (ICWITE) pp. 1 - 7
Main Authors Deepthi, Jangam, Gopal, T.Venu
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.12.2022
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:The data hiding may easily embed data along with a visible watermark in an encrypted picture thanks to a novel approach suggested in this research that involves room reservation prior to encryption using a typical RDH algorithm. People pay greater care these days while transferring secure data. Since it preserves the feature that the original picture is retrieved from an encrypted image and embedded data without investigation into it, the Reversible Data Hiding technique is often used in this situation. The current technique, however, embeds data by reversibly removing space from encrypted pictures, which further causes data loss at the receiving end. As a result, the authors provide a way that uses the Reversible Data Hiding (RDH) algorithm to make space for data transfer from sender to receiver. This approach makes it simple for data hider to embed data reversibly in an encrypted picture. As a result, the sections of the suggested approach for data extraction and picture recovery are error-free. Additionally, investigation demonstrates that the suggested technology may incorporate data 10 times larger payloads for the same quality picture as the existing method. Hidden data is extremely lossless and recovered from the encrypted picture and the visible watermark using pixel prediction. With this technique, it is possible to extract secret data, remove apparent watermarks, and restore images without making any mistakes. This modification of the encrypted data may be subject to some errors on data extraction and/or image restoration, but those errors can also be eliminated by using error-correcting codes. Because the PSNR of the restored picture vs the original image is high in comparison to the prior approaches, the suggested methodology in this case offers greater embedding bit-rates at lesser distortion.
DOI:10.1109/ICWITE57052.2022.10176238