Reversible data hiding in image encryption with efficient compression and enhanced security

In Recent years, more and more attention is paid to Reversible Data Hiding (RDH) in encrypted images, since it maintains the excellent property that the original cover can be lossless recovered after embedded data is extracted while protecting the image content's confidentiality. All previous m...

Full description

Saved in:
Bibliographic Details
Published inInternational Conference on Information Communication and Embedded Systems (ICICES2014) pp. 1 - 5
Main Authors Elang Kavin, B., Latha, B.
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.02.2014
Subjects
Online AccessGet full text

Cover

Loading…
Abstract In Recent years, more and more attention is paid to Reversible Data Hiding (RDH) in encrypted images, since it maintains the excellent property that the original cover can be lossless recovered after embedded data is extracted while protecting the image content's confidentiality. All previous methods embed data by reversibly vacating room from the encrypted images, which may be subject to some errors on data extraction and/or image restoration. This work proposes a novel method by reserving room before encryption with a traditional RDH, and thus it is easy for the data hider to reversibly embed data in the encrypted image. Image compression is also achieved through this method. The proposed method can achieve real reversibility, where the data extraction and image recovery are free of any error. This method can embed more than 10 times as large payloads for the same image quality as the previous methods, such as for Peak Signal to Noise Ratio.
AbstractList In Recent years, more and more attention is paid to Reversible Data Hiding (RDH) in encrypted images, since it maintains the excellent property that the original cover can be lossless recovered after embedded data is extracted while protecting the image content's confidentiality. All previous methods embed data by reversibly vacating room from the encrypted images, which may be subject to some errors on data extraction and/or image restoration. This work proposes a novel method by reserving room before encryption with a traditional RDH, and thus it is easy for the data hider to reversibly embed data in the encrypted image. Image compression is also achieved through this method. The proposed method can achieve real reversibility, where the data extraction and image recovery are free of any error. This method can embed more than 10 times as large payloads for the same image quality as the previous methods, such as for Peak Signal to Noise Ratio.
Author Latha, B.
Elang Kavin, B.
Author_xml – sequence: 1
  givenname: B.
  surname: Elang Kavin
  fullname: Elang Kavin, B.
  organization: Dept. of Comput. Sci. & Eng., Sri Sai Ram Eng. Coll., Chennai, India
– sequence: 2
  givenname: B.
  surname: Latha
  fullname: Latha, B.
  organization: Dept. of Comput. Sci. & Eng., Sri Sai Ram Eng. Coll., Chennai, India
BookMark eNotj71OwzAAhI0EAy08QRe_QIId58cZUVQgUqVK0I2hcuxzY6l1IseA8vYE0emGO313tyK3fvAgZMNZyjmrn9qmbbYfacZ4nlZM5CznN2TF86quhRQFvyef7_hGmFx3BjUqKto74_yJOk_dRZ1A4XWYx-gGT39c7CmsddrBR6qHyxgwTX-W8mZJ9sprGDpBfwUX5wdyZ9V5wuNV1-Twsj00b8lu_9o2z7vE1SwmhkN0KJFZWaIoRMZZZ6BgSolCSGkrvnSaqkTJGKukBlilVZbZTpiSWbEmm3-sA3Acw7I7zMfrXfELkZdR4A
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICICES.2014.7034041
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Xplore Digital Library
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 1479938351
9781479938346
9781479938353
1479938343
EndPage 5
ExternalDocumentID 7034041
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i90t-d1e3be6e2f86e553210bdeaed68e5388f71effd76e600078cee07ca22fb3d60f3
IEDL.DBID RIE
IngestDate Thu Jun 29 18:37:47 EDT 2023
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-d1e3be6e2f86e553210bdeaed68e5388f71effd76e600078cee07ca22fb3d60f3
PageCount 5
ParticipantIDs ieee_primary_7034041
PublicationCentury 2000
PublicationDate 2014-Feb.
PublicationDateYYYYMMDD 2014-02-01
PublicationDate_xml – month: 02
  year: 2014
  text: 2014-Feb.
PublicationDecade 2010
PublicationTitle International Conference on Information Communication and Embedded Systems (ICICES2014)
PublicationTitleAbbrev ICICES
PublicationYear 2014
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.5624924
Snippet In Recent years, more and more attention is paid to Reversible Data Hiding (RDH) in encrypted images, since it maintains the excellent property that the...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Data mining
Educational institutions
Encryption
Histograms
Image coding
Image compression
image encryption
Reversible data hiding
Servers
Title Reversible data hiding in image encryption with efficient compression and enhanced security
URI https://ieeexplore.ieee.org/document/7034041
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFA5zJ08qm_ibHDzarmmbtDmPjU1QRCcMPIymeWFF7cZsD_rXm5fWieLBW2jSvpCU9_Jevu89Qi4jnuaxZrHHGVJyFOOeNEhg5ilIlQVCGYe2uBWTx_h6zucdcrXlwgCAA5-Bj013l69XeY2hsoH9O-MAWeo71nFruFptIiEWyMF0OB2OHhCtFfvtyB8lU5zFGO-Rmy9ZDVDk2a8r5ecfv9Iw_ncy-6T_zc2jd1urc0A6UPbI0z04eIV6AYqYT7ossJcWJS1ercag9rXNu9MOFCOvFFzmCCuAIqa8wcKWNCu1Hbl0oAD61la265PZeDQbTry2bIJXyKDyNINIgYDQpAI4R46O0pCBFilY7ZaahFkZOhEg3AHBzjdI8iwMjYq0CEx0SLrlqoQjQpX9FCRaKhaim2J9D5Wl0kipwji3B79j0sN1WaybxBiLdklO_n58SnZxbxrI8xnpVpsazq1Fr9SF28pPsdmkaQ
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjZ3PT4MwFMebZR70pGYz_rYHj8Io0ELPy5ZNt8XoTJZ4WCh9ZERlZrKD_vX2FZzRePBGoNCmJe_1x-f7HiGXAY_TULPQ4QwlOYpxR2YoYOYxSJV4QmWWtpiIwUN4PeOzBrnaaGEAwMJn4OKlPcvXy3SNW2Ud83eGHqrUt4zf56xSa9WhhJgnO8PusNu7R14rdOuyP5KmWJ_R3yXjr9oqVOTJXZfKTT9-BWL8b3P2SPtbnUdvN35nnzSgaJHHO7CAhXoGitQnXeT4lOYFzV-MzaDmtdW7tQ8U914p2NgRpgKKVHlFwxY0KbQpubBYAH2rc9u1ybTfm3YHTp04wcmlVzqaQaBAgJ_FAjhHlY7SkIAWMRj7FmcRM3XoSICwUwTTXi9KE9_PVKCFlwUHpFksCzgkVJlPQaSlYj4uVMzqQyWxzKRUfpiaqd8RaWG_zF-r0BjzukuO_759QbYH0_FoPhpObk7IDo5TBUCfkma5WsOZ8e-lOrfD-glx2aey
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=International+Conference+on+Information+Communication+and+Embedded+Systems+%28ICICES2014%29&rft.atitle=Reversible+data+hiding+in+image+encryption+with+efficient+compression+and+enhanced+security&rft.au=Elang+Kavin%2C+B.&rft.au=Latha%2C+B.&rft.date=2014-02-01&rft.pub=IEEE&rft.spage=1&rft.epage=5&rft_id=info:doi/10.1109%2FICICES.2014.7034041&rft.externalDocID=7034041