International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 115 | Views: 253 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014 | Popularity: 7 / 10


     

Reversible Data Hiding in Encrypted Images

Chaple Gopal, G Balram


Abstract: In recent times, more attention is paid to reversible data hiding (RDH) in encrypted images, since it preserves the excellent property that the original cover can be losslessly improved after embedded data is extracted while protecting the image contents privacy. All earlier methods embed data by reversibly vacating room from the encrypted images, which may be raise some errors on data extraction and image restoration. In this paper, we proposed a novel method by reserving room before encryption with a traditional RDH algorithm, and thus it is easier for the data hider to reversibly embed data in the encrypted image. Proposed method that can achieve the real reversibility, data extraction and image recovery are free of any error. This Experiments show that this novel method can embed more than 10 times as large payloads for the same image quality as the earlier methods, such as for PSNR dB.


Keywords: Reversible data hiding, image encryption, privacy protection, histogram shift


Edition: Volume 3 Issue 9, September 2014


Pages: 762 - 767



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Chaple Gopal, G Balram, "Reversible Data Hiding in Encrypted Images", International Journal of Science and Research (IJSR), Volume 3 Issue 9, September 2014, pp. 762-767, https://www.ijsr.net/getabstract.php?paperid=SEP14267, DOI: https://www.doi.org/10.21275/SEP14267



Similar Articles

Downloads: 104

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1130 - 1132

Survey On: Reversible Data Hiding in Encrypted JPEG Images

N. B. Pokale, Sanjivani S. Koli

Share this Article

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1640 - 1647

Privacy Preservation Protection for Personalized Web User by k-Anonymity with Profile Construction for Web Search Engines

Uma Maheswari.T, Dr.V. Kavitha

Share this Article

Downloads: 104

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1944 - 1949

A Review of Privacy Protection of Cloud Storage and Steganography Techniques

Alok Ranjan, Mansi Bhonsle

Share this Article

Downloads: 105

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1285 - 1287

Location Based Social Networking in Geo-Social Applications

Shamsiamol K Shaji, Boby Jose

Share this Article

Downloads: 106

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2681 - 2683

Efficient and Confident Sharing of Personal Healthcare Records using Attribute Based Encryption in Cloud Computing

Nitin Raut, Seema Singh

Share this Article



Top