Commutative reversible data hiding and encryption

Size: px
Start display at page:

Download "Commutative reversible data hiding and encryption"

Transcription

1 SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 3; 6: Published online March 3 in Wiley Online Library (wileyonlinelibrary.com)..74 RESEARCH ARTICLE Xinpeng Zhang* School of Communication and Information Engineering, Shanghai University, 49 Yanchang Road, Shanghai 7, China ABSTRACT This work proposes a novel scheme of commutative reversible data hiding and encryption. In encryption part, the gray values of two neighboring pixels are masked by same pseudo-random bits. In data-hiding part, the additional data are embedded into various bit planes with a reversible manner, and a parameter optimization method based on a capacity distortion criterion is used to ensure a good performance. Because the data space used for accommodating the additional data is not affected by the encryption operation, the data embedded in plain/encrypted domain can be extracted from encrypted/plain domain, and the way of insertion/extraction of additional data in plain domain is same as that in encrypted domain. Furthermore, the original image can be recovered without any error from an image containing additional data. Copyright 3 John Wiley & Sons, Ltd. KEYWORDS reversible data hiding; image encryption; image recovery *Correspondence Xinpeng Zhang, School of Communication and Information Engineering, Shanghai University, 49 Yanchang Road, Shanghai 7, China. xzhang@shu.edu.cn. INTRODUCTION As well known, encryption technique aims to convert plaintexts into unintelligible data, whereas the purpose of data-hiding technique is to embed additional data into cover signal for copyright protection or covert communication. In recent years, the joint data hiding and encryption has attracted considerable research interests. A number of particular data-hiding methods with the aid of encryption mechanism have been developed. In a buyer seller watermarking protocol [], the seller of digital multimedia product encrypts the original data by using a public key and then permutes and embeds an encrypted fingerprint provided by the buyer in the encrypted domain on the basis of the homomorphic properties of cryptosystem. After decryption with a private key, the buyer can obtain a watermarked product. This protocol ensures that the seller cannot know the buyer s watermarked version, whereas the buyer cannot know the original version. An anonymous fingerprinting scheme presented in [] improves the enciphering rate by exploiting Okamoto Uchiyama encryption method. By introducing the composite signal representation mechanism, both the computation complexity and the communication bandwidth due to the homomorphic public key encryption are significantly reduced [3]. In [4], the content owner encrypts the signs of host discrete cosine transform (DCT) coefficients, and each content user uses a different key to decrypt only a subset of the coefficients, so that a series of versions containing different fingerprints are generated for the users. In another type of joint data-hiding and encryption schemes, a part of cover data is used to carry the additional data, and the rest of the data are encrypted, so that both the copyright and the privacy can be protected. For example [5], the intraprediction mode, motion vector difference, and signs of DCT coefficients are encrypted, whereas a watermark is embedded into the amplitudes of DCT coefficients. In [6], the image data in higher and lower bit planes of transform domain are, respectively, encrypted and watermarked. In [7], after wavelet transform, the coefficients in the lowest level and the signs of coefficients in other levels are encrypted, whereas the amplitudes of coefficients in middle level are used to carry the watermark data. With these schemes, the data-hiding and encryption operations are commutative because watermarking an encrypted signal is equivalent to encrypting a watermarked signal. In most cases, data-hiding operations introduce slight distortion to the original covers. For some special media such as medical or military images, the distortion due to data hiding, no matter how small it is, cannot be tolerated. On the other hand, in some application scenarios, when a content owner encrypts a secret image to conceal its content, for conveniently managing the plain/encrypted image, an ability to embed and extract additional message, such as the origin information, image annotation, or authentication data, in both the plain and encrypted domains is required. 396 Copyright 3 John Wiley & Sons, Ltd.

2 X. Zhang For example, when some additional message is embedded into a secret image and the image containing additional message is encrypted, a receiver without the knowledge of cryptographic key may hope to obtain the embedded message from the encrypted image when keeping its content unrevealed, and another receiver with the knowledge of cryptographic key may hope to perfectly recover the original secret image. In short, a commutative reversible data-hiding and encryption scheme is desired. Most works on reversible data hiding focus on the data insertion and extraction in plain spatial domain, in which the additional data are embedded with a reversible manner so that the original contents can be restored without any error after the extraction of hidden data. The reversible data-hiding techniques can be roughly classified into three types: lossless compression-based methods, difference expansion methods, and histogram shift methods. The lossless compression-based methods make use of statistical redundancy of the host media by performing lossless compression to create a spare space for data embedding [8]. In the difference expansion method [9], differences between two adjacent pixels are doubled so that a new bit plane is generated to accommodate the additional data. A typical histogram shift method presented in [] utilizes the zero and peak points of the histogram of an image and slightly modifies the pixel grayscale values to embed data into the image. Furthermore, various mechanisms have been introduced into the reversible data-hiding schemes for performance improvement, including generalized integer transform [], smarter value prediction [], simplification of location map [3], and binary codes [4]. A reversible data-hiding scheme for encrypted image is proposed in [5]. With this scheme, while a content owner encrypts the original image using an encryption key, a data hider can embed additional data into the encrypted image by using a data-hiding key, although he does not know the original content. When having an encrypted image containing additional data, a receiver may first decrypt it according to the encryption key and then extract the embedded data and recover the original image according to the data-hiding key. Whereas the data insertion can be implemented in encrypted domain, the data extraction must be implemented on a decrypted image. That means the reversible data-hiding and encryption operations in [5] are not commutative. This paper proposes a novel scheme of commutative reversible data hiding and encryption on digital images. In encryption part, the gray values of two neighboring pixels are masked by same pseudo-random bits. In datahiding part, the additional data are embedded into various bit planes with a reversible manner, and a parameter optimization method is used to ensure a good payload distortion performance. Because the data space used for accommodating the additional data is not affected by the encryption operation, the data insertion/extraction can be performed in both the plain and encrypted domains, and the ways of data insertion/extraction in the two domains are same. That implies the data embedded in the plain/encrypted domain can be extracted from the encrypted/plain domain. Furthermore, the original plain/ encrypted image can be recovered without any error from a plain/encrypted image containing additional data.. PROPOSED SCHEME Denote the original plain image, the additional data to be embedded, the encryption operation, the data-embedding operation, the encrypted image, and the image containing the additional data as I, M, E, W, I E and I W. That means and EðÞ¼I I E () WðI; MÞ ¼ I W () We also denote the decryption operation as D and the operation integrating data extraction and image recovery as R. As the decryption is an inverse operation of encryption, DðI E Þ ¼ I (3) When the additional data are embedded with a reversible manner, the original image and the additional data can be perfectly recovered and extracted from I W, RðI W Þ ¼ ði; MÞ (4) This paper proposes a commutative reversible data-hiding and encryption scheme that also meets the following properties. () The embedding encryption and encryption embedding operations produce a same result, EW ½ ði; MÞŠ ¼ WEI ½ ðþ; MŠ ¼ I WE (5) () Decrypting an encrypted image containing additional data results in a plain image containing additional data, DðI WE Þ ¼ I W (6) (3) From an encrypted image containing additional data, the additional data can be extracted, and an encrypted image without additional data can be obtained, RðI WE Þ ¼ ði E ; MÞ (7) In other words, the data-hiding and encryption operations do not affect mutually, meaning that the data embedding, data extraction, and image recovery can be implemented in both the plain and the encrypted domains. The detailed Security Comm. Networks 3; 6: John Wiley & Sons, Ltd. 397

3 X. Zhang procedures of encryption/decryption, data embedding, data extraction, and image recovery are presented as follows... Image encryption and decryption Assume the original image I is in uncompressed format and the gray values of pixels fall into [, 55]. Before encryption, the image is segmented into a series of nonoverlapping blocks, each of which including two neighboring pixels. The way of segmentation is public, such as scanning all pixels in a row-by-row or column-by-column manner and dividing them into two-pixel blocks. Denoting the number of blocks as N and the pixels in the N blocks as {p,, p, }, {p,, p, },...,{p N,, p N, }, decompose each pixel into 8bits, t b ðþ n;i ¼ p n;i = t mod ; t ¼ ; ;...; 7; n ¼ ; ;...; N; i ¼ ; ð8þ where t is the index of bit planes. Equation (8) implies that p n;i ¼ X7 t¼ b ðþ t n;i t ð9þ According to an encryption key, generate a bit sequence with alengthof8n by using a pseudo-random number generator and divide the pseudo-random bit sequence into N pieces, each of which containing 8 bits. It is well known that there is no probability polynomial time algorithm to distinguish pseudo-random number sequence and random number sequence until now. We denote the nth piece as {r () n, r () n,..., r (7) n } and calculate the exclusive-or between the bits of two pixels in the nth block and the pseudo-random bits, B ðþ t n;i ¼ b ðþ t ðþ t n;i r n ðþ Note that the two pixels in a block are encrypted by the same pseudo-random bits. Then, B n,i are concatenated orderly as the encrypted data I E. Although the correlation between two bits in a same plane and a same block still exists, it is unpractical for an attacker without the encryption key to reveal the content of plain image. Figure gives an original image Lena and its encrypted version. Here, the 8 encrypted bits of each pixel are converted into a gray value for showing the disorder of I E. Clearly, the procedure of decryption is same as that of encryption. With the same key and exclusive-or calculation, the original image I can be retrieved from the encrypted data I E... Data embedding With an original image I or an encrypted image I E, a data space unaffected by encryption will be exploited to carry the additional data. In the data-embedding procedure, a capacity distortion criterion is also employed to calculate the optimal values of parameters, and according to the optimal parameters, the additional data are embedded into various bit planes of the invariant data with a reversible manner. The detailed data-embedding procedure is as follows. The data hider first segments the original or encrypted image into N blocks with two neighboring pixels and calculates the exclusive-or of two bits in a same plane and a same block. For an original image, the exclusive-or is calculated as x ðþ t n ¼ b ðþ t ðþ t n; b n; ðþ For an encrypted image, the exclusive-or is calculated as Because B ðþ t n; B ðþ t n; ¼ x ðþ t n ¼ B ðþ t ðþ t n; B n; b ðþ t ðþ t n; r n ¼ b ðþ t ðþ t n; b n; t b n; ðþ ðþ t r n ðþ ð3þ the original image and its encrypted version have same x n. Actually, x n will be used to carry the additional data to be embedded. (a) (b) Figure. (a) Original image Lena and (b) its encrypted version. 398 Security Comm. Networks 3; 6: John Wiley & Sons, Ltd.

4 X. Zhang The data hider collects x n in various planes to form 8 binary sequences, and pseudo-randomly permutes the elements in each sequence according to a data-hiding key. The purpose of pseudo-randomly permutation is to ensure that an attacker without knowledge of the datahiding key cannot extract the embedded data and to remove the correlation between x n. Denote the permuted sequences of the tth plane as x and the rate of zero in x as r. Generally, because of the spatial correlation in natural image, r are more than /, and a larger t corresponds to a larger r. Table I gives the values of r of the original/encrypted image Lena. The upper bound of performance on reversible data hiding in a binary sequence has been discussed in [6]. Considering the binary sequence x as cover data, if the rate of bit alteration caused by reversible data hiding, that is, the rate of flipping cover bit from to and from to, is Δ, the capacity of reversible data hiding is given in [6], h i ðþ ¼ N H max r ðþ t Δ ðþ t ; = H r ðþ t C t where H() is a binary entropy function ð4þ HðrÞ ¼ r log r ð rþlog ð rþ ð5þ Clearly, when Δ r /, h i ðþ ¼ N H r ðþ t Δ ðþ t H r ðþ t C t ð6þ and, when Δ > r /, the capacity does not increase with an increasing Δ. It is also concluded in [6] that, if Δ [, r /], for achieving the embedding capacity, all the alteration on cover data should be from to. When the data hider performs the reversible data hiding in the 8 sequences, the total capacity is C ¼ X7 t¼ C ðþ t ð7þ Because a bit alteration in the tth sequence x implies a flip in the tth bit plane of cover image and the bit alterations caused by data hiding in different sequences are independent mutually, the total energy of distortion is Δ ¼ N X7 t¼ Δ ðþ t t So, the value of peak signal-to-noise ratio (PSNR) is Table I. Values of r of original/encrypted Lena. ð8þ r () r () r () r (3) r (4) r (5) r (6) r (7) PSNR ¼ log N55 Δ ð9þ The data hider always hopes to maximize the payload with a certain distortion level or to minimize the distortion with a certain payload. Define a Lagrange function, L ¼ C lδ When meeting the optimal case, there ¼ ðþ t If Δ [, r /], Equation (8) implies that In other words, r ðþ Δ ðþ log r ðþ þ Δ ðþ r ðþ t Δ ðþ t ¼ l ðþ ðþ t ð Þ¼ 4 log ¼ 4 log r ðþ Δ ðþ r ðþ þ Δ ð Þ Δ ðþ 7 r 7 ðþ¼ r ð7þ þ Δ ðþ 7 ð3þ So, we may employ the following steps to find the optimal values of Δ. () With the given r,define the functions f f ðþ t Δ ðþ t ¼ t log r ðþ t Δ ðþ t r ðþ t þ Δ ðþ t ð4þ for Δ [, r /]. Clearly, f are monotonic decreasing functions of Δ. () For a given positive value l, if l > f (), the sequence x is not used to carry the additional data. Otherwise, find Δ to satisfy f ðþ t Δ ðþ t ¼ l ð5þ Then, the found Δ is the optimal values that should be used for the reversible data embedding. (3) Calculate the capacity and PSNR by using Equations (7) and (9). Here, if x is not used, C = and Δ =. Then, the calculated capacity PSNR is an upper bound of performance on reversible data hiding. In the previously described steps, the smaller the value of l, the higher the capacity and the lower the PSNR. The data hider may select a suitable l to obtain a desired capacity or distortion. Figure gives the curves of f (Δ ) with the original/encrypted Lena. Because both Security Comm. Networks 3; 6: John Wiley & Sons, Ltd. 399

5 X. Zhang f.5 x -3.5 t= t=3 t=4 f x t=5 t=6 t= Figure. Curves of f (Δ ) with different t for original/encrypted Lena. r () and r () are approximately /, the curves of f () (Δ () ) and f () (Δ () ) are very close to the point (,) and therefore ignored in Figure. Table II lists the optimal values of Δ, PSNR, and capacity with respect to different l. Define h t ¼ ; if ΔðÞ t ¼ ; if Δ ðþ t t ¼ ; ;...; 7 ð6þ > and denote the number of h t being as g and a vector made up of h t as tag vector h. For most images, r () /, leading to Δ () =. The data hider takes g subsequences from the beginning of x (). For each subsequence, let it correspond to a positive Δ and name the subsequence c. The length of the subsequences will be given later. Then, the data hider performs the reversible data embedding in binary sequences x with Δ >. Divide x into a number of subsequences with a same size, and denote the number of subsequences as M, their length as L and the subsequences as x, x,..., x M (M L = N). That means x = x x x M. Note that, for successful data-embedding in x, c will be also exploited and the length of c is also L. For each subsequence x m (m =,,..., M), collect the elements with zero values in it and denote the number of the collected elements as L m, L ðþ t m Lr ðþ t ð7þ Suppose the probabilities of and in the data to be embedded are /. By employing arithmetic coding technique, the data hider may take a number of bits to be embedded and convert them into a binary sequence with a length L m, where the probabilities of and in the binary sequence are (r Δ )/r and Δ /r, respectively. This way, the number of taken bits is approximately b E Lr ðþ t H Δ ðþ t =r ðþ t ð8þ Then, replace the L m zero elements in subsequence x m with the elements in the binary sequence to obtain a new x m. In the new x m, the elements with zero values must be also zero in old x m, whereas the elements with one values include two types: the elements whose old values are also one and the elements that are zero in old x m and changed to one by the replacement. Denoting the number of elements in the two parts as a and a, a L r ðþ t ð9þ a LΔ ðþ t ð3þ Then, label the elements in the first and the second types as and, respectively. Using arithmetic coding technique, the labels can be compressed as a binary sequence with a uniform distribution of {, }, and the length of the compressed data is approximately b A L r ðþ t þ Δ ðþ t Δ ðþ t H ð3þ r ðþ t þ Δ ðþ t Actually, the compressed data will be used to recover the original subsequence x m at receiver side, and we name them as auxiliary information (AI). From Equations (8) and (3), Table II. Optimal values of Δ, peak signal-to-noise ratio (PSNR), and capacity with respect to l. l Δ () Δ () Δ () Δ (3) Δ (4) Δ (5) Δ (6) Δ (7) PSNR (db) C (bits) Security Comm. Networks 3; 6: John Wiley & Sons, Ltd.

6 X. Zhang h i b E b A L H r ðþ t Δ ðþ t H r ðþ t Because r > r Δ /, b E b A > ð3þ ð33þ That means the amount of data carried by a subsequence is larger than that of data used for recovering it. Figure 3 sketches the relationship between the subsequences and the payload hidden in them. The payload on the tth plane, P, is made up of the original data of c and the additional data. The auxiliary information generated from x m is denoted as AI m. Whereas the data embedded into the first subsequence are purely the payload, the data embedded into subsequences x, x 3,..., x M consist of the auxiliary information generated from the previous subsequences and the payload. Furthermore, c is used to accommodate the values of r and Δ,AI M, and a part of payload by simple bit replacement. Note that there are g subsequences c at the beginning of x (). For the first c, the data accommodated in it also include the tag vector h. For few images with strong spatial correlation, r () is significantly more than /. Then, the optimization steps may result in a positive Δ (), meaning that x () should be also used for data hiding. In this case, the reversible data embedding is also implemented in x () except c with a similar way. At last, the data hider makes an inverse permutation on x and, for each x n having been changed, flips b n, or B n, from to or from to. After converting the 8 bits of each pixel into a gray value, a new image containing the additional data is finally produced. This way, the data hider can embed the additional data into a plain image I to produce I W or into an encrypted image I E to produce I WE. Because the sequences x are not affected by encryption, the embedding encryption and encryption embedding operations produce a same result, that is, W(I E, M)=E(I W )=I WE..3. Data extraction and image recovery When having a plain image containing additional data I W or an encrypted image containing additional data I WE, the receiver first segments the image into blocks and calculates the exclusive-or of two bits in a same plane and a same block to generate x n. According to the data-hiding key, pseudo-randomly permute x n in each plane to yield the sequences x. From the first c at the beginning of x (), the receiver can retrieve the tag vector h and know the g sequences x and g corresponding subsequences c that are used for carrying the additional data. Then, the receiver may recover the original x and c and extract the additional data hidden in them. After obtaining the values of r and Δ,AI M, and a part of payload from c, the receiver decompresses AI M to retrieve the labels that are used to distinguish the two types of elements being one in x M. Then, flip the second type of elements from to to recover the original x M. With the original x M, the receiver can retrieve the payload hidden in x M by arithmetic decoding. Then, the auxiliary information extracted from a subsequence is always used to recover the original elements of the previous subsequence, and the embedded data in the previous subsequence are always extracted by using the recovered original elements. So, the original subsequences x are recovered, and the data hidden in them are extracted with an inverse order. Collect the extracted data and divide them into two parts: the original data of c and the pure payload. This way, all the sequences x are recovered, and the pure payload in the sequences are extracted. At last, by retrieving the original b n,i or B n,i on the basis of the recovered x, the original plain image I or the original encrypted image I E is reconstructed, and by concatenating the extracted pure payload, the entire additional data are restored. Note that the data extraction and image recovery may be not successful when the plain/encrypted image containing additional data has been compressed or processed. 3. EXPERIMENTAL RESULTS The test image Lena sized 5 5 shown in Figure (a) was used as the original image in the experiment. Its encrypted version is also given in Figure (b). We let l =. and embedded the additional data into the original Lena and its encrypted version to produce a plain image containing additional data and an encrypted image containing additional data, which are shown in Figure 4. Original data of c Additional data (pure payload) Payload P P AI P AI M P M, AI M P M+ Subsequence x Subsequence x Subsequence x M c Figure 3. Components of the hidden data and the relationship between the subsequences and the hidden data. Security Comm. Networks 3; 6: John Wiley & Sons, Ltd. 4

7 X. Zhang (a) (b) Figure 4. (a) A plain Lena containing additional data and (b) an encrypted image containing additional data. The additional data embedded into the original Lena and its encrypted version were same, and their amount was bits. Also, both the values of PSNR in Figure 4 (a) when regarding Figure (a) as a reference and in Figure 4(b) when regarding Figure (b) as a reference are 4. db. The amount and PSNR are close to the upper performance bound, bits and 4.3 db, which are listed in Table II. When we encrypted Figure 4(a) with an encryption key that was used to encrypt Figure (a) to produce Figure (b), Figure 4(b) was also produced. That means the data-embedding and the encryption operations are commutative. When we implemented the data extraction and image recovery procedure on Figure 4(a) or (b), the entire additional data were retrieved, and Figure (a) or (b) was recovered without any error. That means the additional data embedded in plain/encrypted domain can be extracted from encrypted/plain domain and completely separated from the cover image. Figures 5 8 show the amount of embedded additional data and PSNR caused by data embedding on the four 5 5 gray images Lena, Man, Baboon, and Couple. By employing different values of l, the various amounts of additional data were embedded into the individual image, and a number of versions with various qualities were produced. Whereas the ordinate represents the amount of embedded data, the abscissa is the values of PSNR. The more the embedded additional data, a lower the PSNR. Also, a smoother plain image implies larger values of r, leading to a better payload distortion Amount of additional data (bits) 5 x Upper bound Actual performance PSNR (db) Figure 6. Actual performance and upper bound on Man. Amount of additional data (bits) 5 x Upper bound Actual performance PSNR (db) Figure 5. Actual performance and upper bound on Lena. Amount of additional data (bits) Upper bound Actual performance PSNR (db) Figure 7. Actual performance and upper bound on Baboon. 4 Security Comm. Networks 3; 6: John Wiley & Sons, Ltd.

8 X. Zhang Amount of additional data (bits) x PSNR (db) performance. The upper bounds of performance are also given in these figures. It can be seen that the actual performance is very close to the upper bound. 4. CONCLUSION In this work, a novel commutative reversible data-hiding and encryption scheme is proposed, which consists of image encryption, data embedding, and data-extraction/imagerecovery parts. In the encryption part, the gray values of two neighboring pixels belonging to a same block are masked by same pseudo-random bits. With an original image or an encrypted version, a data hider can generate a data space that is not affected by encryption and embed additional data into various bit planes of the invariant space with a reversible manner. Also, a capacity distortion criterion is employed to find the optimal values of parameters to ensure a good performance. Using this scheme, the data embedded in plain/encrypted domain can be extracted from encrypted/plain domain, and the way of insertion/extraction of additional data in plain domain is same as that in encrypted domain. Furthermore, the original image can be perfectly recovered from an image containing additional data. ACKNOWLEDGEMENTS This work was supported by the National Natural Science Foundation of China under Grants 6739 and 6787, by the Research Fund for the Doctoral Program of Higher Education of China under Grant 38, and by the Program for Professor of Special Appointment (Eastern Scholar) at Shanghai Institutions of Higher Learning. REFERENCES Upper bound Actual performance Figure 8. Actual performance and upper bound on Couple.. Memo N, Wong PW. A buyer seller watermarking protocol. IEEE Trans. on Image Processing ; (4): Kuribayashi M, Tanaka H. Fingerprinting protocol for images based on additive homomorphic property. IEEE Trans. on Image Processing 5; 4(): Deng M, Bianchi T, Piva A, Preneel B. An efficient buyer seller watermarking protocol based on composite signal representation, in Proceedings of the th ACM Workshop on Multimedia and Security, 9; Kundur D, Karthik K. Video fingerprinting and encryption principles for digital rights management. Proceedings of the IEEE 4; 9(6): Lian S, Liu Z, Ren Z, Wang H. Commutative encryption and watermarking in video compression. IEEE Trans. on Circuits and Systems for Video Technology 7; 7(6): Cancellaro M, Battisti F, Carli M, Boato G, Natale FGB, Neri A. A commutative digital image watermarking and encryption method in the tree structured Haar transform domain. Signal Processing: Image Communication ; 6():. 7. Lian S, Liu Z, Zhen R, Wang H. Commutative watermarking and encryption for media data. Optical Engineering 6; 45(8). 8. Celik MU, Sharma G, Tekalp AM, Saber E. Lossless generalized-lsb data embedding. IEEE Trans. on Image Processing 5; 4(): Tian J. Reversible data embedding using a difference expansion. IEEE Trans. on Circuits and Systems for Video Technology 3; 3(8): Ni Z, Shi Y-Q, Ansari N, Su W. Reversible data hiding. IEEE Trans. on Circuits and Systems for Video Technology 6; 6(3): Wang X, Li X, Yang B, Guo Z. Efficient generalized integer transform for reversible watermarking. IEEE Signal Processing Letters ; 7(6): Luo L, Chen Z, Chen M, Zeng X, Xiong Z. Reversible image watermarking using interpolation technique. IEEE Trans. on Information Forensics and Security ; 5(): Kim HJ, Sachnev V, Shi YQ, Nam J, Choo H-G. A novel difference expansion transform for reversible data embedding. IEEE Trans. on Information Forensics and Security 8; 3(3): Zhang W, Chen B, Yu N. Capacity-approaching codes for reversible data hiding. in Proceedings of the 3th Information Hiding Conference, Lecture Notes in Computer Science,, 6958, Zhang X. Reversible data hiding in encrypted image. IEEE Signal Processing Letters ; 8(4): Kalker T, Willems FM. Capacity bounds and constructions for reversible data-hiding. in Proceedings of 4th International Conference on Digital Signal Processing, ; Security Comm. Networks 3; 6: John Wiley & Sons, Ltd. 43

Reversible Data Hiding in Encrypted color images by Reserving Room before Encryption with LSB Method

Reversible Data Hiding in Encrypted color images by Reserving Room before Encryption with LSB Method ISSN (e): 2250 3005 Vol, 04 Issue, 10 October 2014 International Journal of Computational Engineering Research (IJCER) Reversible Data Hiding in Encrypted color images by Reserving Room before Encryption

More information

Watermarking patient data in encrypted medical images

Watermarking patient data in encrypted medical images Sādhanā Vol. 37, Part 6, December 2012, pp. 723 729. c Indian Academy of Sciences Watermarking patient data in encrypted medical images 1. Introduction A LAVANYA and V NATARAJAN Department of Instrumentation

More information

Histogram Modification Based Reversible Data Hiding Using Neighbouring Pixel Differences

Histogram Modification Based Reversible Data Hiding Using Neighbouring Pixel Differences Histogram Modification Based Reversible Data Hiding Using Neighbouring Pixel Differences Ankita Meenpal*, Shital S Mali. Department of Elex. & Telecomm. RAIT, Nerul, Navi Mumbai, Mumbai, University, India

More information

High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction

High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction Pauline Puteaux and William Puech; LIRMM Laboratory UMR 5506 CNRS, University of Montpellier; Montpellier, France Abstract

More information

A Reversible Data Hiding Scheme Based on Prediction Difference

A Reversible Data Hiding Scheme Based on Prediction Difference 2017 2 nd International Conference on Computer Science and Technology (CST 2017) ISBN: 978-1-60595-461-5 A Reversible Data Hiding Scheme Based on Prediction Difference Ze-rui SUN 1,a*, Guo-en XIA 1,2,

More information

Local prediction based reversible watermarking framework for digital videos

Local prediction based reversible watermarking framework for digital videos Local prediction based reversible watermarking framework for digital videos J.Priyanka (M.tech.) 1 K.Chaintanya (Asst.proff,M.tech(Ph.D)) 2 M.Tech, Computer science and engineering, Acharya Nagarjuna University,

More information

Reversible Data Hiding in Encrypted Images based on MSB. Prediction and Huffman Coding

Reversible Data Hiding in Encrypted Images based on MSB. Prediction and Huffman Coding Reversible Data Hiding in Encrypted Images based on MSB Prediction and Huffman Coding Youzhi Xiang 1, Zhaoxia Yin 1,*, Xinpeng Zhang 2 1 School of Computer Science and Technology, Anhui University 2 School

More information

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning Advances in Engineering Research (AER), volume 116 International Conference on Communication and Electronic Information Engineering (CEIE 016) Reversible data hiding based on histogram modification using

More information

A New Compression Method for Encrypted Images

A New Compression Method for Encrypted Images Technology, Volume-2, Issue-2, March-April, 2014, pp. 15-19 IASTER 2014, www.iaster.com Online: 2347-5099, Print: 2348-0009 ABSTRACT A New Compression Method for Encrypted Images S. Manimurugan, Naveen

More information

Fragile Watermarking With Error-Free Restoration Capability Xinpeng Zhang and Shuozhong Wang

Fragile Watermarking With Error-Free Restoration Capability Xinpeng Zhang and Shuozhong Wang 1490 IEEE TRANSACTIONS ON MULTIMEDIA, VOL 10, NO 8, DECEMBER 2008 Fragile Watermarking With Error-Free Restoration Capability Xinpeng Zhang and Shuozhong Wang Abstract This paper proposes a novel fragile

More information

Reversible Data Hiding in JPEG Images Based on Adjustable Padding

Reversible Data Hiding in JPEG Images Based on Adjustable Padding Reversible Data Hiding in JPEG Images Based on Adjustable Padding Ching-Chun Chang Department of Computer Science University of Warwick United Kingdom Email: C.Chang.@warwick.ac.uk Chang-Tsun Li School

More information

REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING

REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING S.Mounika 1, M.L. Mittal 2 1 Department of ECE, MRCET, Hyderabad, India 2 Professor Department of ECE, MRCET, Hyderabad, India ABSTRACT

More information

Enhance Image using Dynamic Histogram and Data Hiding Technique

Enhance Image using Dynamic Histogram and Data Hiding Technique _ Enhance Image using Dynamic Histogram and Data Hiding Technique 1 D.Bharadwaja, 2 Y.V.N.Tulasi 1 Department of CSE, Gudlavalleru Engineering College, Email: bharadwaja599@gmail.com 2 Department of CSE,

More information

A Lossless Large-Volume Data Hiding Method Based on Histogram Shifting Using an Optimal Hierarchical Block Division Scheme *

A Lossless Large-Volume Data Hiding Method Based on Histogram Shifting Using an Optimal Hierarchical Block Division Scheme * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 27, 1265-1282 (2011) A Lossless Large-Volume Data Hiding Method Based on Histogram Shifting Using an Optimal Hierarchical Block Division Scheme * CHE-WEI

More information

Digital Image Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel)

Digital Image Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel) Digital Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel) Abdelmgeid A. Ali Ahmed A. Radwan Ahmed H. Ismail ABSTRACT The improvements in Internet technologies and growing requests on

More information

Reversible Watermarking on Histogram Pixel Based Image Features

Reversible Watermarking on Histogram Pixel Based Image Features Reversible Watermarking on Histogram Pixel Based Features J. Prisiba Resilda (PG scholar) K. Kausalya (Assistant professor) M. Vanitha (Assistant professor I) Abstract - Reversible watermarking is a useful

More information

Contrast Enhancement Based Reversible Image Data Hiding

Contrast Enhancement Based Reversible Image Data Hiding Contrast Enhancement Based Reversible Image Data Hiding Renji Elsa Jacob 1, Prof. Anita Purushotham 2 PG Student [SP], Dept. of ECE, Sri Vellappally Natesan College, Mavelikara, India 1 Assistant Professor,

More information

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise Kamaldeep Joshi, Rajkumar Yadav, Sachin Allwadhi Abstract Image steganography is the best aspect

More information

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT Luis Rosales-Roldan, Manuel Cedillo-Hernández, Mariko Nakano-Miyatake, Héctor Pérez-Meana Postgraduate Section,

More information

An Implementation of LSB Steganography Using DWT Technique

An Implementation of LSB Steganography Using DWT Technique An Implementation of LSB Steganography Using DWT Technique G. Raj Kumar, M. Maruthi Prasada Reddy, T. Lalith Kumar Electronics & Communication Engineering #,JNTU A University Electronics & Communication

More information

REVERSIBLE data hiding, or lossless data hiding, hides

REVERSIBLE data hiding, or lossless data hiding, hides IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 16, NO. 10, OCTOBER 2006 1301 A Reversible Data Hiding Scheme Based on Side Match Vector Quantization Chin-Chen Chang, Fellow, IEEE,

More information

Journal of mathematics and computer science 11 (2014),

Journal of mathematics and computer science 11 (2014), Journal of mathematics and computer science 11 (2014), 137-146 Application of Unsharp Mask in Augmenting the Quality of Extracted Watermark in Spatial Domain Watermarking Saeed Amirgholipour 1 *,Ahmad

More information

Authentication of grayscale document images using shamir secret sharing scheme.

Authentication of grayscale document images using shamir secret sharing scheme. IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. VII (Mar-Apr. 2014), PP 75-79 Authentication of grayscale document images using shamir secret

More information

Forward Modified Histogram Shifting based Reversible Watermarking with Reduced Pixel Shifting and High Embedding Capacity

Forward Modified Histogram Shifting based Reversible Watermarking with Reduced Pixel Shifting and High Embedding Capacity International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 5, Number 2 (2012), pp. 185-191 International Research Publication House http://www.irphouse.com Forward Modified

More information

International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES

International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES Scientific Journal of Impact Factor (SJIF) : 3.134 ISSN (Print) : 2348-6406 ISSN (Online): 2348-4470 ed International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW

More information

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS 44 Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS 45 CHAPTER 3 Chapter 3: LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING

More information

ISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-11,

ISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-11, FPGA IMPLEMENTATION OF LSB REPLACEMENT STEGANOGRAPHY USING DWT M.Sathya 1, S.Chitra 2 Assistant Professor, Prince Dr. K.Vasudevan College of Engineering and Technology ABSTRACT An enhancement of data protection

More information

ScienceDirect. A Novel DWT based Image Securing Method using Steganography

ScienceDirect. A Novel DWT based Image Securing Method using Steganography Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 46 (2015 ) 612 618 International Conference on Information and Communication Technologies (ICICT 2014) A Novel DWT based

More information

An Integrated Image Steganography System. with Improved Image Quality

An Integrated Image Steganography System. with Improved Image Quality Applied Mathematical Sciences, Vol. 7, 2013, no. 71, 3545-3553 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013.34236 An Integrated Image Steganography System with Improved Image Quality

More information

An Efficient Data Security System Using Reserve Room Approach on Digital Images for Secret Sharing

An Efficient Data Security System Using Reserve Room Approach on Digital Images for Secret Sharing An Efficient Data Security System Using Reserve Room Approach on Digital Images for Secret Sharing Mrs.V.P.Kavitha (Asst. professor, Dept. of ECE in Velammal Engineering College) M.Suganya, K.Suganya,

More information

Meta-data based secret image sharing application for different sized biomedical

Meta-data based secret image sharing application for different sized biomedical Biomedical Research 2018; Special Issue: S394-S398 ISSN 0970-938X www.biomedres.info Meta-data based secret image sharing application for different sized biomedical images. Arunkumar S 1*, Subramaniyaswamy

More information

Color PNG Image Authentication Scheme Based on Rehashing and Secret Sharing Method

Color PNG Image Authentication Scheme Based on Rehashing and Secret Sharing Method Journal of Information Hiding and Multimedia Signal Processing c 015 ISSN 073-41 Ubiquitous International Volume 6, Number 3, May 015 Color PNG Image Authentication Scheme Based on Rehashing and Secret

More information

A New Secure Image Steganography Using Lsb And Spiht Based Compression Method M.J.Thenmozhi 1, Dr.T.Menakadevi 2

A New Secure Image Steganography Using Lsb And Spiht Based Compression Method M.J.Thenmozhi 1, Dr.T.Menakadevi 2 A New Secure Image Steganography Using Lsb And Spiht Based Compression Method M.J.Thenmozhi 1, Dr.T.Menakadevi 2 1 PG Scholar, Department of ECE, Adiyamaan college of Engineering,Hosur, Tamilnadu, India

More information

Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers

Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers P. Mohan Kumar 1, Dr. M. Sailaja 2 M. Tech scholar, Dept. of E.C.E, Jawaharlal Nehru Technological University Kakinada,

More information

Progressive sharing of multiple images with sensitivity-controlled decoding

Progressive sharing of multiple images with sensitivity-controlled decoding Chang et al. EURASIP Journal on Advances in Signal Processing (2015) 2015:11 DOI 10.1186/s13634-015-0196-z RESEARCH Progressive sharing of multiple images with sensitivity-controlled decoding Sheng-Yu

More information

Progressive secret image sharing scheme using meaningful shadows

Progressive secret image sharing scheme using meaningful shadows SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 2016; 9:4075 4088 Published online 30 August 2016 in Wiley Online Library (wileyonlinelibrary.com)..1589 RESEARCH ARTICLE Progressive secret

More information

LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE THE METHOD

LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE THE METHOD LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE J.M. Rodrigues, W. Puech and C. Fiorio Laboratoire d Informatique Robotique et Microlectronique de Montpellier LIRMM,

More information

DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON

DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON K.Thamizhazhakan #1, S.Maheswari *2 # PG Scholar,Department of Electrical and Electronics Engineering, Kongu Engineering College,Erode-638052,India.

More information

Steganography & Steganalysis of Images. Mr C Rafferty Msc Comms Sys Theory 2005

Steganography & Steganalysis of Images. Mr C Rafferty Msc Comms Sys Theory 2005 Steganography & Steganalysis of Images Mr C Rafferty Msc Comms Sys Theory 2005 Definitions Steganography is hiding a message in an image so the manner that the very existence of the message is unknown.

More information

ISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies

ISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

A Novel Approach of Compressing Images and Assessment on Quality with Scaling Factor

A Novel Approach of Compressing Images and Assessment on Quality with Scaling Factor A Novel Approach of Compressing Images and Assessment on Quality with Scaling Factor Umesh 1,Mr. Suraj Rana 2 1 M.Tech Student, 2 Associate Professor (ECE) Department of Electronic and Communication Engineering

More information

An Enhanced Least Significant Bit Steganography Technique

An Enhanced Least Significant Bit Steganography Technique An Enhanced Least Significant Bit Steganography Technique Mohit Abstract - Message transmission through internet as medium, is becoming increasingly popular. Hence issues like information security are

More information

An Optimal Pixel-level Self-repairing Authentication. Method for Grayscale Images under a Minimax. Criterion of Distortion Reduction*

An Optimal Pixel-level Self-repairing Authentication. Method for Grayscale Images under a Minimax. Criterion of Distortion Reduction* An Optimal Pixel-level Self-repairing Authentication Method for Grayscale Images under a Minimax Criterion of Distortion Reduction* Che-Wei Lee 1 and Wen-Hsiang Tsai 1, 2, 1 Department of Computer Science

More information

Chapter 4 MASK Encryption: Results with Image Analysis

Chapter 4 MASK Encryption: Results with Image Analysis 95 Chapter 4 MASK Encryption: Results with Image Analysis This chapter discusses the tests conducted and analysis made on MASK encryption, with gray scale and colour images. Statistical analysis including

More information

HYBRID MATRIX CODING AND ERROR-CORRECTION CODING SCHEME FOR REVERSIBLE DATA HIDING IN BINARY VQ INDEX CODESTREAM

HYBRID MATRIX CODING AND ERROR-CORRECTION CODING SCHEME FOR REVERSIBLE DATA HIDING IN BINARY VQ INDEX CODESTREAM International Journal of Innovative Computing, Information and Control ICIC International c 2013 ISSN 1349-4198 Volume 9, Number 6, June 2013 pp. 2521 2531 HYBRID MATRIX CODING AND ERROR-CORRECTION CODING

More information

Compendium of Reversible Data Hiding

Compendium of Reversible Data Hiding Compendium of Reversible Data Hiding S.Bhavani 1 and B.Ravi teja 2 Gudlavalleru Engineering College Abstract- In any communication, security is the most important issue in today s world. Lots of data security

More information

Analysis of Secure Text Embedding using Steganography

Analysis of Secure Text Embedding using Steganography Analysis of Secure Text Embedding using Steganography Rupinder Kaur Department of Computer Science and Engineering BBSBEC, Fatehgarh Sahib, Punjab, India Deepak Aggarwal Department of Computer Science

More information

FPGA implementation of LSB Steganography method

FPGA implementation of LSB Steganography method FPGA implementation of LSB Steganography method Pangavhane S.M. 1 &Punde S.S. 2 1,2 (E&TC Engg. Dept.,S.I.E.RAgaskhind, SPP Univ., Pune(MS), India) Abstract : "Steganography is a Greek origin word which

More information

Steganography using LSB bit Substitution for data hiding

Steganography using LSB bit Substitution for data hiding ISSN: 2277 943 Volume 2, Issue 1, October 213 Steganography using LSB bit Substitution for data hiding Himanshu Gupta, Asst.Prof. Ritesh Kumar, Dr.Soni Changlani Department of Electronics and Communication

More information

Data Hiding Algorithm for Images Using Discrete Wavelet Transform and Arnold Transform

Data Hiding Algorithm for Images Using Discrete Wavelet Transform and Arnold Transform J Inf Process Syst, Vol.13, No.5, pp.1331~1344, October 2017 https://doi.org/10.3745/jips.03.0042 ISSN 1976-913X (Print) ISSN 2092-805X (Electronic) Data Hiding Algorithm for Images Using Discrete Wavelet

More information

ON PACKING LASER SCANNING MICROSCOPY IMAGES BY REVERSIBLE WATERMARKING: A CASE STUDY

ON PACKING LASER SCANNING MICROSCOPY IMAGES BY REVERSIBLE WATERMARKING: A CASE STUDY ON PACKING LASER SCANNING MICROSCOPY IMAGES BY REVERSIBLE WATERMARKING: A CASE STUDY Ioan-Catalin Dragoi 1 Stefan G. Stanciu 2 Dinu Coltuc 1 Denis E. Tranca 2 Radu Hristu 2 George A. Stanciu 2 1 Electrical

More information

A Reversible Data Hiding Method with Contrast Enhancement for Medical Images by Preserving Authenticity

A Reversible Data Hiding Method with Contrast Enhancement for Medical Images by Preserving Authenticity GD Journals- Global esearch and Development Journal for Engineering Volume 1 Issue 9 August 2016 ISSN: 2455-5703 A eversible Data Hiding Method with Contrast Enhancement for Medical Images by Preserving

More information

A Novel Image Steganography Based on Contourlet Transform and Hill Cipher

A Novel Image Steganography Based on Contourlet Transform and Hill Cipher Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 5, September 2015 A Novel Image Steganography Based on Contourlet Transform

More information

Modified Skin Tone Image Hiding Algorithm for Steganographic Applications

Modified Skin Tone Image Hiding Algorithm for Steganographic Applications Modified Skin Tone Image Hiding Algorithm for Steganographic Applications Geetha C.R., and Dr.Puttamadappa C. Abstract Steganography is the practice of concealing messages or information in other non-secret

More information

Transform Domain Technique in Image Steganography for Hiding Secret Information

Transform Domain Technique in Image Steganography for Hiding Secret Information Transform Domain Technique in Image Steganography for Hiding Secret Information Manibharathi. N 1 (PG Scholar) Dr.Pauls Engg. College Villupuram Dist, Tamilnadu, India- 605109 Krishnaprasad. S 2 (PG Scholar)

More information

Digital Watermarking Using Homogeneity in Image

Digital Watermarking Using Homogeneity in Image Digital Watermarking Using Homogeneity in Image S. K. Mitra, M. K. Kundu, C. A. Murthy, B. B. Bhattacharya and T. Acharya Dhirubhai Ambani Institute of Information and Communication Technology Gandhinagar

More information

Threshold-based Steganography: A Novel Technique for Improved Payload and SNR

Threshold-based Steganography: A Novel Technique for Improved Payload and SNR 380 The International Arab Journal of Information Technology, Vol. 13, No. 4, July 2016 Threshold-based Steganography: A Novel Technique for Improved Payload and SNR Zakir Khan 1, Mohsin Shah 2, Muhammad

More information

Image Encryption Algorithm based on Chaos Mapping and the Sequence Transformation

Image Encryption Algorithm based on Chaos Mapping and the Sequence Transformation Research Journal of Applied Sciences, Engineering and Technology 5(22): 5308-5313, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2013 Submitted: November 08, 2012 Accepted: December

More information

Chapter 9 Image Compression Standards

Chapter 9 Image Compression Standards Chapter 9 Image Compression Standards 9.1 The JPEG Standard 9.2 The JPEG2000 Standard 9.3 The JPEG-LS Standard 1IT342 Image Compression Standards The image standard specifies the codec, which defines how

More information

Image Compression Supported By Encryption Using Unitary Transform

Image Compression Supported By Encryption Using Unitary Transform Image Compression Supported By Encryption Using Unitary Transform Arathy Nair 1, Sreejith S 2 1 (M.Tech Scholar, Department of CSE, LBS Institute of Technology for Women, Thiruvananthapuram, India) 2 (Assistant

More information

Robust Invisible QR Code Image Watermarking Algorithm in SWT Domain

Robust Invisible QR Code Image Watermarking Algorithm in SWT Domain Robust Invisible QR Code Image Watermarking Algorithm in SWT Domain Swathi.K 1, Ramudu.K 2 1 M.Tech Scholar, Annamacharya Institute of Technology & Sciences, Rajampet, Andhra Pradesh, India 2 Assistant

More information

Lossless Image Watermarking for HDR Images Using Tone Mapping

Lossless Image Watermarking for HDR Images Using Tone Mapping IJCSNS International Journal of Computer Science and Network Security, VOL.13 No.5, May 2013 113 Lossless Image Watermarking for HDR Images Using Tone Mapping A.Nagurammal 1, T.Meyyappan 2 1 M. Phil Scholar

More information

VISUAL CRYPTOGRAPHY for COLOR IMAGES USING ERROR DIFFUSION AND PIXEL SYNCHRONIZATION

VISUAL CRYPTOGRAPHY for COLOR IMAGES USING ERROR DIFFUSION AND PIXEL SYNCHRONIZATION VISUAL CRYPTOGRAPHY for COLOR IMAGES USING ERROR DIFFUSION AND PIXEL SYNCHRONIZATION Pankaja Patil Department of Computer Science and Engineering Gogte Institute of Technology, Belgaum, Karnataka Bharati

More information

Keywords Secret data, Host data, DWT, LSB substitution.

Keywords Secret data, Host data, DWT, LSB substitution. Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Evaluation

More information

Dynamic Collage Steganography on Images

Dynamic Collage Steganography on Images ISSN 2278 0211 (Online) Dynamic Collage Steganography on Images Aswathi P. S. Sreedhi Deleepkumar Maya Mohanan Swathy M. Abstract: Collage steganography, a type of steganographic method, introduced to

More information

Block Wise Data Hiding with Auxilliary Matrix

Block Wise Data Hiding with Auxilliary Matrix Block Wise Data Hiding with Auxilliary Matrix Jyoti Bharti Deptt. of Computer Science & Engg. MANIT Bhopal, India R.K. Pateriya Deptt. of Computer Science & Engg. MANIT Bhopal, India Sanyam Shukla Deptt.

More information

A Steganography Algorithm for Hiding Secret Message inside Image using Random Key

A Steganography Algorithm for Hiding Secret Message inside Image using Random Key A Steganography Algorithm for Hiding Secret Message inside Image using Random Key Balvinder Singh Sahil Kataria Tarun Kumar Narpat Singh Shekhawat Abstract "Steganography is a Greek origin word which means

More information

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Advance Research in Computer Science and Management Studies Volume 3, Issue 2, February 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

FPGA implementation of DWT for Audio Watermarking Application

FPGA implementation of DWT for Audio Watermarking Application FPGA implementation of DWT for Audio Watermarking Application Naveen.S.Hampannavar 1, Sajeevan Joseph 2, C.B.Bidhul 3, Arunachalam V 4 1, 2, 3 M.Tech VLSI Students, 4 Assistant Professor Selection Grade

More information

Steganalytic methods for the detection of histogram shifting data-hiding schemes

Steganalytic methods for the detection of histogram shifting data-hiding schemes Steganalytic methods for the detection of histogram shifting data-hiding schemes Daniel Lerch and David Megías Universitat Oberta de Catalunya, Spain. ABSTRACT In this paper, some steganalytic techniques

More information

A STENO HIDING USING CAMOUFLAGE BASED VISUAL CRYPTOGRAPHY SCHEME

A STENO HIDING USING CAMOUFLAGE BASED VISUAL CRYPTOGRAPHY SCHEME International Journal of Power Control Signal and Computation (IJPCSC) Vol. 2 No. 1 ISSN : 0976-268X A STENO HIDING USING CAMOUFLAGE BASED VISUAL CRYPTOGRAPHY SCHEME 1 P. Arunagiri, 2 B.Rajeswary, 3 S.Arunmozhi

More information

High capacity robust audio watermarking scheme based on DWT transform

High capacity robust audio watermarking scheme based on DWT transform High capacity robust audio watermarking scheme based on DWT transform Davod Zangene * (Sama technical and vocational training college, Islamic Azad University, Mahshahr Branch, Mahshahr, Iran) davodzangene@mail.com

More information

Digital Image Watermarking by Spread Spectrum method

Digital Image Watermarking by Spread Spectrum method Digital Image Watermarking by Spread Spectrum method Andreja Samčovi ović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Belgrade, november 2014. I Spread Spectrum Techniques

More information

Copyright Warning & Restrictions

Copyright Warning & Restrictions Copyright Warning & Restrictions The copyright law of the United States (Title 17, United States Code) governs the making of photocopies or other reproductions of copyrighted material. Under certain conditions

More information

Introduction to More Advanced Steganography. John Ortiz. Crucial Security Inc. San Antonio

Introduction to More Advanced Steganography. John Ortiz. Crucial Security Inc. San Antonio Introduction to More Advanced Steganography John Ortiz Crucial Security Inc. San Antonio John.Ortiz@Harris.com 210 977-6615 11/17/2011 Advanced Steganography 1 Can YOU See the Difference? Which one of

More information

Data Hiding Using LSB with QR Code Data Pattern Image

Data Hiding Using LSB with QR Code Data Pattern Image IJSTE - International Journal of Science Technology & Engineering Volume 2 Issue 10 April 2016 ISSN (online): 2349-784X Data Hiding Using LSB with QR Code Data Pattern Image D. Antony Praveen Kumar M.

More information

Basic concepts of Digital Watermarking. Prof. Mehul S Raval

Basic concepts of Digital Watermarking. Prof. Mehul S Raval Basic concepts of Digital Watermarking Prof. Mehul S Raval Mutual dependencies Perceptual Transparency Payload Robustness Security Oblivious Versus non oblivious Cryptography Vs Steganography Cryptography

More information

Keywords Arnold transforms; chaotic logistic mapping; discrete wavelet transform; encryption; mean error.

Keywords Arnold transforms; chaotic logistic mapping; discrete wavelet transform; encryption; mean error. Volume 5, Issue 2, February 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Entropy

More information

Image Steganography using Sudoku Puzzle for Secured Data Transmission

Image Steganography using Sudoku Puzzle for Secured Data Transmission Image Steganography using Sudoku Puzzle for Secured Data Transmission Sanmitra Ijeri, Shivananda Pujeri, Shrikant B, Usha B A, Asst.Prof.Departemen t of CSE R.V College Of ABSTRACT Image Steganography

More information

Sterilization of Stego-images through Histogram Normalization

Sterilization of Stego-images through Histogram Normalization Sterilization of Stego-images through Histogram Normalization Goutam Paul 1 and Imon Mukherjee 2 1 Dept. of Computer Science & Engineering, Jadavpur University, Kolkata 700 032, India. Email: goutam.paul@ieee.org

More information

Digital Image Watermarking

Digital Image Watermarking Digital Image Watermarking Yun Q. Shi Electrical and Computer Engineering New Jersey Institute of Technology shi@njit.edu 19 th November 2004 shi 1 Outline Introduction What is image data hiding? Fundamentals

More information

2. REVIEW OF LITERATURE

2. REVIEW OF LITERATURE 2. REVIEW OF LITERATURE Digital image processing is the use of the algorithms and procedures for operations such as image enhancement, image compression, image analysis, mapping. Transmission of information

More information

Armor on Digital Images Captured Using Photoelectric Technique by Absolute Watermarking Approach

Armor on Digital Images Captured Using Photoelectric Technique by Absolute Watermarking Approach American Journal of Science, Engineering and Technology 2017; 2(1): 33-38 http://www.sciencepublishinggroup.com/j/ajset doi: 10.11648/j.ajset.20170201.16 Methodology Article Armor on Digital Images Captured

More information

Webpage: Volume 4, Issue VI, June 2016 ISSN

Webpage:   Volume 4, Issue VI, June 2016 ISSN 4-P Secret Sharing Scheme Deepa Bajaj 1, Navneet Verma 2 1 Master s in Technology (Dept. of CSE), 2 Assistant Professr (Dept. of CSE) 1 er.deepabajaj@gmail.com, 2 navneetcse@geeta.edu.in Geeta Engineering

More information

Concealing Data for Secure Transmission and Storage

Concealing Data for Secure Transmission and Storage Concealing Data for Secure Transmission and Storage Abirami.P1, Shanmugam.M2 1Department of Civil Engineering, Institute of Remote Sensing, Anna University, Chennai, India 2Scientist, Institute of Remote

More information

A Hybrid Technique for Image Compression

A Hybrid Technique for Image Compression Australian Journal of Basic and Applied Sciences, 5(7): 32-44, 2011 ISSN 1991-8178 A Hybrid Technique for Image Compression Hazem (Moh'd Said) Abdel Majid Hatamleh Computer DepartmentUniversity of Al-Balqa

More information

A New Image Steganography Depending On Reference & LSB

A New Image Steganography Depending On Reference & LSB A New Image Steganography Depending On & LSB Saher Manaseer 1*, Asmaa Aljawawdeh 2 and Dua Alsoudi 3 1 King Abdullah II School for Information Technology, Computer Science Department, The University of

More information

A ROI-based high capacity reversible data hiding scheme with contrast enhancement for medical images

A ROI-based high capacity reversible data hiding scheme with contrast enhancement for medical images DOI 10.1007/s11042-017-4444-0 A ROI-based high capacity reversible data hiding scheme with contrast enhancement for medical images Yang Yang 1,2 Weiming Zhang 2 Dong Liang 1 Nenghai Yu 2 Received: 21 September

More information

Level-Successive Encoding for Digital Photography

Level-Successive Encoding for Digital Photography Level-Successive Encoding for Digital Photography Mehmet Celik, Gaurav Sharma*, A.Murat Tekalp University of Rochester, Rochester, NY * Xerox Corporation, Webster, NY Abstract We propose a level-successive

More information

A SECURE IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT TECHNIQUE

A SECURE IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT TECHNIQUE Int. J. Engg. Res. & Sci. & Tech. 2014 Amit and Jyoti Pruthi, 2014 Research Paper A SECURE IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT TECHNIQUE Amit 1 * and Jyoti Pruthi 1 *Corresponding Author: Amit

More information

AN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES. N. Askari, H.M. Heys, and C.R. Moloney

AN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES. N. Askari, H.M. Heys, and C.R. Moloney 26TH ANNUAL IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING YEAR 2013 AN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES N. Askari, H.M. Heys, and C.R. Moloney

More information

Background Dirty Paper Coding Codeword Binning Code construction Remaining problems. Information Hiding. Phil Regalia

Background Dirty Paper Coding Codeword Binning Code construction Remaining problems. Information Hiding. Phil Regalia Information Hiding Phil Regalia Department of Electrical Engineering and Computer Science Catholic University of America Washington, DC 20064 regalia@cua.edu Baltimore IEEE Signal Processing Society Chapter,

More information

A Rumination of Error Diffusions in Color Extended Visual Cryptography P.Pardhasaradhi #1, P.Seetharamaiah *2

A Rumination of Error Diffusions in Color Extended Visual Cryptography P.Pardhasaradhi #1, P.Seetharamaiah *2 A Rumination of Error Diffusions in Color Extended Visual Cryptography P.Pardhasaradhi #1, P.Seetharamaiah *2 # Department of CSE, Bapatla Engineering College, Bapatla, AP, India *Department of CS&SE,

More information

VARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES

VARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES VARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES Ayman M. Abdalla, PhD Dept. of Multimedia Systems, Al-Zaytoonah University, Amman, Jordan Abstract A new algorithm is presented for hiding information

More information

An Efficient Interception Mechanism Against Cheating In Visual Cryptography With Non Pixel Expansion Of Images

An Efficient Interception Mechanism Against Cheating In Visual Cryptography With Non Pixel Expansion Of Images An Efficient Interception Mechanism Against Cheating In Visual Cryptography With Non Pixel Expansion Of Images Linju P.S, Sophiya Mathews Abstract: Visual cryptography is a technique of cryptography in

More information

International Conference on Advances in Engineering & Technology 2014 (ICAET-2014) 48 Page

International Conference on Advances in Engineering & Technology 2014 (ICAET-2014) 48 Page Analysis of Visual Cryptography Schemes Using Adaptive Space Filling Curve Ordered Dithering V.Chinnapudevi 1, Dr.M.Narsing Yadav 2 1.Associate Professor, Dept of ECE, Brindavan Institute of Technology

More information

Detecting Resized Double JPEG Compressed Images Using Support Vector Machine

Detecting Resized Double JPEG Compressed Images Using Support Vector Machine Detecting Resized Double JPEG Compressed Images Using Support Vector Machine Hieu Cuong Nguyen and Stefan Katzenbeisser Computer Science Department, Darmstadt University of Technology, Germany {cuong,katzenbeisser}@seceng.informatik.tu-darmstadt.de

More information

Robust and Blind Spatial Watermarking in Digital Image

Robust and Blind Spatial Watermarking in Digital Image Robust and lind Spatial Watermarking in Digital Image Santi Prasad Maity Malay Kumar Kundu Dept.of Electronics Telecomm. Machine Intelligence Unit.E.College(D.U.) Indian Statical Institute Howrah -711

More information

A Novel Color Image Cryptosystem Using Chaotic Cat and Chebyshev Map

A Novel Color Image Cryptosystem Using Chaotic Cat and Chebyshev Map www.ijcsi.org 63 A Novel Color Image Cryptosystem Using Chaotic Cat and Chebyshev Map Jianjiang CUI 1, Siyuan LI 2 and Dingyu Xue 3 1 School of Information Science and Engineering, Northeastern University,

More information

A Cost-Effective Private-Key Cryptosystem for Color Image Encryption

A Cost-Effective Private-Key Cryptosystem for Color Image Encryption A Cost-Effective Private-Key Cryptosystem for Color Image Encryption Rastislav Lukac and Konstantinos N. Plataniotis The Edward S. Rogers Sr. Dept. of Electrical and Computer Engineering, University of

More information