In-Dependable Data hiding in an Encrypted Image using FCM-DH Algorithm

Authors

  • Vinodhkumar L  Dhanalakshmi College of Engineering, Chennai, Tamilnadu, India
  • Vinoth B S  Dhanalakshmi College of Engineering, Chennai, Tamilnadu, India
  • SivaGanesh S   Dhanalakshmi College of Engineering, Chennai, Tamilnadu, India

Keywords:

Image Encryption, In-Dependable Data Hiding, FCM-DH algorithm

Abstract

In this paper, a data mining technique, Fuzzy C Means Clustering (FCM) based data hiding algorithm (FCM-DH) is used to divide pixels into classes or clusters from the encrypted image. Clustering of pixels in an encrypted image is considered in the proposed approach for creating a space to accommodate data. Before applying the FCM-DH, a content owner prepares a cover image by encrypting the pixels of an image with encryption key. Then, group the pixels to compress the least significant bits of the encrypted image using a proposed FCM-DH technique with data-hiding key and form a partition matrix to create space to accommodate data. With a received cover image containing hidden data, if the receiver can extract the data with data-hiding key or decrypt the cover image with encryption key to obtain original image independently. If the receiver applying both the data-hiding key and the encryption key, then extract the data and recover the original image without any error by exploiting the spatial correlation in natural image

References

[1] Padmanaban K, Dr. R. JagadeeshKannan, “Localization of Optic Disc using Fuzzy C Means Clustering” IEEE Conference Current Trends in Engineering and Technology, 2013.

[2] W. Bender D. Gruhl N. Morimoto A. Lu, “Techniques for Data Hiding” Ibm Systems Journal, Vol 35, Nos 3&4, 

[3] Jawad Ahmad and Fawad Ahmed, “Efficiency Analysis and Security Evaluation of Image Encryption Schemes” International Journal of Video & Image Processing and Network Security IJVIPNS-IJENS Vol: 12 No: 04.

[4] Mehmet Utku Celik, Gaurav Sharma, Ahmet Murat Tekalp, Eli Saber, "Lossless generalized-LSB data embedding", IEEE Transaction. on Image Processing, vol.14, No.2, Feb. 2005. 

[5] Jun Tian, "Reversible data embedding using a difference expansion", IEEE Trans. on Cirut and sys, vol. 13, No. 8, Aug. 2003.

[6] M. Kiran Kumar, S. Mukthyar Azam, Shaik Rasool, "Efficient digital encryption algorithm based on matrix scrambling technique", International Journal of Network Security & its Applications, vol.2, No.4, Oct. 2010.

[7] Shiguo Lian, Zhongxuan Liu, Zhen Ren, Haila Wang, "Commutative encryption and watermarking in video compression", IEEE Trans. on Circuits and Systems for Video Technology, vol. 17, No. 6, Jun 2007. 

[8] Chinmaya Kumar Nayak, Anuja Kumar Acharya, Satyabrata Das, "Image encryption using an enhanced block based transformation algorithm", International Journal of Research and Reviews in Computer Science, vol. 2, No. 2, Apr. 2011.

[9] X. Zhang, "Lossy compression and iterative reconstruction for encrypted image," IEEE Trans. Inform. Forensics Security, vol. 6, no. 1, pp. 53-58, Feb. 2011. 

[10] Mazhar Tayel, Hamed Shawky, Alaa El-Din Sayed Hafez," A New Chaos Steganography Algorithm for Hiding Multimedia Data" Feb. 19-22, 2012 ICACT 2012.


Downloads

Published

2015-04-25

Issue

Section

Research Articles

How to Cite

[1]
Vinodhkumar L, Vinoth B S, SivaGanesh S , " In-Dependable Data hiding in an Encrypted Image using FCM-DH Algorithm , International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 2, pp.159-161, March-April-2015.