Reversible data hiding in image encryption with efficient compression and enhanced security
In Recent years, more and more attention is paid to Reversible Data Hiding (RDH) in encrypted images, since it maintains the excellent property that the original cover can be lossless recovered after embedded data is extracted while protecting the image content's confidentiality. All previous m...
Saved in:
Published in | International Conference on Information Communication and Embedded Systems (ICICES2014) pp. 1 - 5 |
---|---|
Main Authors | , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.02.2014
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | In Recent years, more and more attention is paid to Reversible Data Hiding (RDH) in encrypted images, since it maintains the excellent property that the original cover can be lossless recovered after embedded data is extracted while protecting the image content's confidentiality. All previous methods embed data by reversibly vacating room from the encrypted images, which may be subject to some errors on data extraction and/or image restoration. This work proposes a novel method by reserving room before encryption with a traditional RDH, and thus it is easy for the data hider to reversibly embed data in the encrypted image. Image compression is also achieved through this method. The proposed method can achieve real reversibility, where the data extraction and image recovery are free of any error. This method can embed more than 10 times as large payloads for the same image quality as the previous methods, such as for Peak Signal to Noise Ratio. |
---|---|
AbstractList | In Recent years, more and more attention is paid to Reversible Data Hiding (RDH) in encrypted images, since it maintains the excellent property that the original cover can be lossless recovered after embedded data is extracted while protecting the image content's confidentiality. All previous methods embed data by reversibly vacating room from the encrypted images, which may be subject to some errors on data extraction and/or image restoration. This work proposes a novel method by reserving room before encryption with a traditional RDH, and thus it is easy for the data hider to reversibly embed data in the encrypted image. Image compression is also achieved through this method. The proposed method can achieve real reversibility, where the data extraction and image recovery are free of any error. This method can embed more than 10 times as large payloads for the same image quality as the previous methods, such as for Peak Signal to Noise Ratio. |
Author | Latha, B. Elang Kavin, B. |
Author_xml | – sequence: 1 givenname: B. surname: Elang Kavin fullname: Elang Kavin, B. organization: Dept. of Comput. Sci. & Eng., Sri Sai Ram Eng. Coll., Chennai, India – sequence: 2 givenname: B. surname: Latha fullname: Latha, B. organization: Dept. of Comput. Sci. & Eng., Sri Sai Ram Eng. Coll., Chennai, India |
BookMark | eNotj71OwzAAhI0EAy08QRe_QIId58cZUVQgUqVK0I2hcuxzY6l1IseA8vYE0emGO313tyK3fvAgZMNZyjmrn9qmbbYfacZ4nlZM5CznN2TF86quhRQFvyef7_hGmFx3BjUqKto74_yJOk_dRZ1A4XWYx-gGT39c7CmsddrBR6qHyxgwTX-W8mZJ9sprGDpBfwUX5wdyZ9V5wuNV1-Twsj00b8lu_9o2z7vE1SwmhkN0KJFZWaIoRMZZZ6BgSolCSGkrvnSaqkTJGKukBlilVZbZTpiSWbEmm3-sA3Acw7I7zMfrXfELkZdR4A |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/ICICES.2014.7034041 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Xplore Digital Library IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 1479938351 9781479938346 9781479938353 1479938343 |
EndPage | 5 |
ExternalDocumentID | 7034041 |
Genre | orig-research |
GroupedDBID | 6IE 6IL CBEJK RIE RIL |
ID | FETCH-LOGICAL-i90t-d1e3be6e2f86e553210bdeaed68e5388f71effd76e600078cee07ca22fb3d60f3 |
IEDL.DBID | RIE |
IngestDate | Thu Jun 29 18:37:47 EDT 2023 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i90t-d1e3be6e2f86e553210bdeaed68e5388f71effd76e600078cee07ca22fb3d60f3 |
PageCount | 5 |
ParticipantIDs | ieee_primary_7034041 |
PublicationCentury | 2000 |
PublicationDate | 2014-Feb. |
PublicationDateYYYYMMDD | 2014-02-01 |
PublicationDate_xml | – month: 02 year: 2014 text: 2014-Feb. |
PublicationDecade | 2010 |
PublicationTitle | International Conference on Information Communication and Embedded Systems (ICICES2014) |
PublicationTitleAbbrev | ICICES |
PublicationYear | 2014 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
Score | 1.5624924 |
Snippet | In Recent years, more and more attention is paid to Reversible Data Hiding (RDH) in encrypted images, since it maintains the excellent property that the... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1 |
SubjectTerms | Data mining Educational institutions Encryption Histograms Image coding Image compression image encryption Reversible data hiding Servers |
Title | Reversible data hiding in image encryption with efficient compression and enhanced security |
URI | https://ieeexplore.ieee.org/document/7034041 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFA5zJ08qm_ibHDzarmmbtDmPjU1QRCcMPIymeWFF7cZsD_rXm5fWieLBW2jSvpCU9_Jevu89Qi4jnuaxZrHHGVJyFOOeNEhg5ilIlQVCGYe2uBWTx_h6zucdcrXlwgCAA5-Bj013l69XeY2hsoH9O-MAWeo71nFruFptIiEWyMF0OB2OHhCtFfvtyB8lU5zFGO-Rmy9ZDVDk2a8r5ecfv9Iw_ncy-6T_zc2jd1urc0A6UPbI0z04eIV6AYqYT7ossJcWJS1ercag9rXNu9MOFCOvFFzmCCuAIqa8wcKWNCu1Hbl0oAD61la265PZeDQbTry2bIJXyKDyNINIgYDQpAI4R46O0pCBFilY7ZaahFkZOhEg3AHBzjdI8iwMjYq0CEx0SLrlqoQjQpX9FCRaKhaim2J9D5Wl0kipwji3B79j0sN1WaybxBiLdklO_n58SnZxbxrI8xnpVpsazq1Fr9SF28pPsdmkaQ |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjZ3PT4MwFMebZR70pGYz_rYHj8Io0ELPy5ZNt8XoTJZ4WCh9ZERlZrKD_vX2FZzRePBGoNCmJe_1x-f7HiGXAY_TULPQ4QwlOYpxR2YoYOYxSJV4QmWWtpiIwUN4PeOzBrnaaGEAwMJn4OKlPcvXy3SNW2Ud83eGHqrUt4zf56xSa9WhhJgnO8PusNu7R14rdOuyP5KmWJ_R3yXjr9oqVOTJXZfKTT9-BWL8b3P2SPtbnUdvN35nnzSgaJHHO7CAhXoGitQnXeT4lOYFzV-MzaDmtdW7tQ8U914p2NgRpgKKVHlFwxY0KbQpubBYAH2rc9u1ybTfm3YHTp04wcmlVzqaQaBAgJ_FAjhHlY7SkIAWMRj7FmcRM3XoSICwUwTTXi9KE9_PVKCFlwUHpFksCzgkVJlPQaSlYj4uVMzqQyWxzKRUfpiaqd8RaWG_zF-r0BjzukuO_759QbYH0_FoPhpObk7IDo5TBUCfkma5WsOZ8e-lOrfD-glx2aey |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=International+Conference+on+Information+Communication+and+Embedded+Systems+%28ICICES2014%29&rft.atitle=Reversible+data+hiding+in+image+encryption+with+efficient+compression+and+enhanced+security&rft.au=Elang+Kavin%2C+B.&rft.au=Latha%2C+B.&rft.date=2014-02-01&rft.pub=IEEE&rft.spage=1&rft.epage=5&rft_id=info:doi/10.1109%2FICICES.2014.7034041&rft.externalDocID=7034041 |