Pre Encryption Data hiding techniques using Reserving Room Approach
The data hiding may easily embed data along with a visible watermark in an encrypted picture thanks to a novel approach suggested in this research that involves room reservation prior to encryption using a typical RDH algorithm. People pay greater care these days while transferring secure data. Sinc...
Saved in:
Published in | 2022 IEEE International Conference for Women in Innovation, Technology & Entrepreneurship (ICWITE) pp. 1 - 7 |
---|---|
Main Authors | , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.12.2022
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | The data hiding may easily embed data along with a visible watermark in an encrypted picture thanks to a novel approach suggested in this research that involves room reservation prior to encryption using a typical RDH algorithm. People pay greater care these days while transferring secure data. Since it preserves the feature that the original picture is retrieved from an encrypted image and embedded data without investigation into it, the Reversible Data Hiding technique is often used in this situation. The current technique, however, embeds data by reversibly removing space from encrypted pictures, which further causes data loss at the receiving end. As a result, the authors provide a way that uses the Reversible Data Hiding (RDH) algorithm to make space for data transfer from sender to receiver. This approach makes it simple for data hider to embed data reversibly in an encrypted picture. As a result, the sections of the suggested approach for data extraction and picture recovery are error-free. Additionally, investigation demonstrates that the suggested technology may incorporate data 10 times larger payloads for the same quality picture as the existing method. Hidden data is extremely lossless and recovered from the encrypted picture and the visible watermark using pixel prediction. With this technique, it is possible to extract secret data, remove apparent watermarks, and restore images without making any mistakes. This modification of the encrypted data may be subject to some errors on data extraction and/or image restoration, but those errors can also be eliminated by using error-correcting codes. Because the PSNR of the restored picture vs the original image is high in comparison to the prior approaches, the suggested methodology in this case offers greater embedding bit-rates at lesser distortion. |
---|---|
DOI: | 10.1109/ICWITE57052.2022.10176238 |