Pre Encryption Data hiding techniques using Reserving Room Approach

The data hiding may easily embed data along with a visible watermark in an encrypted picture thanks to a novel approach suggested in this research that involves room reservation prior to encryption using a typical RDH algorithm. People pay greater care these days while transferring secure data. Sinc...

Full description

Saved in:
Bibliographic Details
Published in2022 IEEE International Conference for Women in Innovation, Technology & Entrepreneurship (ICWITE) pp. 1 - 7
Main Authors Deepthi, Jangam, Gopal, T.Venu
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.12.2022
Subjects
Online AccessGet full text
DOI10.1109/ICWITE57052.2022.10176238

Cover

Loading…
Abstract The data hiding may easily embed data along with a visible watermark in an encrypted picture thanks to a novel approach suggested in this research that involves room reservation prior to encryption using a typical RDH algorithm. People pay greater care these days while transferring secure data. Since it preserves the feature that the original picture is retrieved from an encrypted image and embedded data without investigation into it, the Reversible Data Hiding technique is often used in this situation. The current technique, however, embeds data by reversibly removing space from encrypted pictures, which further causes data loss at the receiving end. As a result, the authors provide a way that uses the Reversible Data Hiding (RDH) algorithm to make space for data transfer from sender to receiver. This approach makes it simple for data hider to embed data reversibly in an encrypted picture. As a result, the sections of the suggested approach for data extraction and picture recovery are error-free. Additionally, investigation demonstrates that the suggested technology may incorporate data 10 times larger payloads for the same quality picture as the existing method. Hidden data is extremely lossless and recovered from the encrypted picture and the visible watermark using pixel prediction. With this technique, it is possible to extract secret data, remove apparent watermarks, and restore images without making any mistakes. This modification of the encrypted data may be subject to some errors on data extraction and/or image restoration, but those errors can also be eliminated by using error-correcting codes. Because the PSNR of the restored picture vs the original image is high in comparison to the prior approaches, the suggested methodology in this case offers greater embedding bit-rates at lesser distortion.
AbstractList The data hiding may easily embed data along with a visible watermark in an encrypted picture thanks to a novel approach suggested in this research that involves room reservation prior to encryption using a typical RDH algorithm. People pay greater care these days while transferring secure data. Since it preserves the feature that the original picture is retrieved from an encrypted image and embedded data without investigation into it, the Reversible Data Hiding technique is often used in this situation. The current technique, however, embeds data by reversibly removing space from encrypted pictures, which further causes data loss at the receiving end. As a result, the authors provide a way that uses the Reversible Data Hiding (RDH) algorithm to make space for data transfer from sender to receiver. This approach makes it simple for data hider to embed data reversibly in an encrypted picture. As a result, the sections of the suggested approach for data extraction and picture recovery are error-free. Additionally, investigation demonstrates that the suggested technology may incorporate data 10 times larger payloads for the same quality picture as the existing method. Hidden data is extremely lossless and recovered from the encrypted picture and the visible watermark using pixel prediction. With this technique, it is possible to extract secret data, remove apparent watermarks, and restore images without making any mistakes. This modification of the encrypted data may be subject to some errors on data extraction and/or image restoration, but those errors can also be eliminated by using error-correcting codes. Because the PSNR of the restored picture vs the original image is high in comparison to the prior approaches, the suggested methodology in this case offers greater embedding bit-rates at lesser distortion.
Author Gopal, T.Venu
Deepthi, Jangam
Author_xml – sequence: 1
  givenname: Jangam
  surname: Deepthi
  fullname: Deepthi, Jangam
  email: jangamdeepthi121@gmail.com
  organization: JNTUH Hyderabad,Dept. of CSE,India
– sequence: 2
  givenname: T.Venu
  surname: Gopal
  fullname: Gopal, T.Venu
  organization: JNTUH Hyderabad,Dept. of CSE,In
BookMark eNo1j81KxDAURiPowhl9AxfxAVpzkzZtlkOtWhhQZMTlcE1ubMBJa9oR5u39X52Ps_jgLNhxHCIxdgkiBxDmqmueu01bVqKUuRRS5iCg0lLVR2wBWpeFLowwp6x5SMTbaNNhnMMQ-TXOyPvgQnzlM9k-hvc9TXw_fYtHmih9_Kxh2PHVOKYBbX_GTjy-TXT-xyV7umk3zV22vr_tmtU6CwBmzhSAQ0WEpNB67ZQk76Co3Ish7wuhjHGOhCPltPDgvryutPM1AtZopVqyi9_fQETbMYUdpsP2P0x9At5ySu0
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICWITE57052.2022.10176238
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 1665464909
9781665464901
EndPage 7
ExternalDocumentID 10176238
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i119t-311da3eeae3acf6d32efd147db9eff40399dde0de3d60f1ddb9676df8a1a8ac23
IEDL.DBID RIE
IngestDate Thu Jan 18 11:14:50 EST 2024
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i119t-311da3eeae3acf6d32efd147db9eff40399dde0de3d60f1ddb9676df8a1a8ac23
PageCount 7
ParticipantIDs ieee_primary_10176238
PublicationCentury 2000
PublicationDate 2022-Dec.-1
PublicationDateYYYYMMDD 2022-12-01
PublicationDate_xml – month: 12
  year: 2022
  text: 2022-Dec.-1
  day: 01
PublicationDecade 2020
PublicationTitle 2022 IEEE International Conference for Women in Innovation, Technology & Entrepreneurship (ICWITE)
PublicationTitleAbbrev ICWITE
PublicationYear 2022
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.8173482
Snippet The data hiding may easily embed data along with a visible watermark in an encrypted picture thanks to a novel approach suggested in this research that...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Distortion
Encryption
Entrepreneurship
image encryption
Image restoration
insert visible watermark
pixel prediction
Prediction methods
Receivers
reversible data hiding
Watermarking
Title Pre Encryption Data hiding techniques using Reserving Room Approach
URI https://ieeexplore.ieee.org/document/10176238
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEB5sD-JJxYpvInjd7WYf2d2j1JbqofRgsbeSx0SLsJXtrqC_3iS7rSgI3kII5D0zSb7vC8ANo9RYPE09RZn2Yim0l2USPZlSIc1Gz4VwKN8JG8_ih3kyb8nqjguDiA58hr5Nurd8tZK1vSrr2-Vj3HXWgY45uTVkrV24bnUz-_eDJ7PdkzRILMMqDP1N-R8_pzjHMdqHyabKBi_y6teV8OXnLzXGf7fpAHrfHD0y3XqfQ9jB4ggG0xLJsJDlh7ME5I5XnLwsbQmyVWtdEwt2fyYWdFe-u5SJnsltqy7eg9lo-DgYe-03Cd6S0rwyVpQqHiFyjLjUTEUhakXjVIkctY4DE4IYGxYojBQLNFUmn6VM6YxTnnEZRsfQLVYFngDJExmjDGWQYBArIXjOk4wLamUHTVzAT6FnR2Dx1ihhLDadP_sj_xz27EQ08I8L6FZljZfGiVfiyk3eF2D7n_I
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1dS8MwFL3oBPVJxYnfRvC1tel3H2VubDrHHjbc28jHjQ6hk9oJ-utN0m6iIPgWQkqTprnnkpxzAnAVU6ojnqKOpLFyQsGVk6YCHZFQLvRCzzi3LN9B3B2Hd5NoUovVrRYGES35DF1TtGf5ci4WZqvs2vw-Gq7TddjQwB_RSq61CZe1c-Z1r_WoF3yUeJHRWPm-u3zix90pFjo6OzBYvrRijLy4i5K74vOXH-O_e7ULzW-VHhmu8GcP1jDfh9awQNLORfFhYwG5ZSUjzzPTgqz8Wt-Iobs_EUO7K95tSefP5Kb2F2_CuNMetbpOfVGCM6M0K3UcpZIFiAwDJlQsAx-VpGEieYZKhZ5OQnQU8yQGMvYUlbo-TmKpUkZZyoQfHEAjn-d4CCSLRIjCF16EXig5ZxmLUsapMR7UmQE7gqb5AtPXygtjuhz88R_1F7DVHT30p_3e4P4Ets2kVGSQU2iUxQLPNKSX_NxO5BfpVKM7
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2022+IEEE+International+Conference+for+Women+in+Innovation%2C+Technology+%26+Entrepreneurship+%28ICWITE%29&rft.atitle=Pre+Encryption+Data+hiding+techniques+using+Reserving+Room+Approach&rft.au=Deepthi%2C+Jangam&rft.au=Gopal%2C+T.Venu&rft.date=2022-12-01&rft.pub=IEEE&rft.spage=1&rft.epage=7&rft_id=info:doi/10.1109%2FICWITE57052.2022.10176238&rft.externalDocID=10176238