Reversible Secure Image Data Hiding over Encrypted Domain using Key Modulation

Authors

  • Salini S Nair  Assistant Professor, Sree Narayana Institute of Technology, Kollam, Kerala, India
  • Dr. T Mahalakshmi  Principal, Sree Narayana Institute of Technology, Kollam, Kerala, India
  • Chithira R  Student, Sree Narayana Institute of Technology, Vadakkevila, Kollam, Kerala, India

Keywords:

Reversible Image Data Hiding(RIDH), SVM

Abstract

This work proposes a secure reversible image data hiding (RIDH) scheme over encrypted domain. The embedding of data is achieved through a public key mechanism, in which secret encryption key is not needed. At the decoder side, a powerful two-class SVM classifier is designed to differentiate encrypted and non-encrypted image patches, allowing us to jointly decode the embedded message and the original image signal. Compared with the state-of-the-arts, the proposed approach provides higher embedding capacity, and is able to perfectly reconstruct the original image as well as the embedded message. Extensive experimental results are provided to validate the superior performance of our scheme.

References

  1. Jiantao Zhou, Weiwei Sun, Y.-H. Huang, Li Dong, Xianming Liu“ Secure Reversible image data Hiding over Encrypted Domain Via Key Modulation” IEEE Trans. Circuits Syst. Video Technol., vol. 22, no. 7, pp. 1051-8215, 2015.
  2. C. Qin, C.-C. Chang, Y.-H. Huang, and L.-T. Liao “An in painting-assisted reversible steganographic scheme using a histogram shifting mechanism,” IEEE Trans. Circuits Syst. Video Technol., vol. 23, no. 7, pp. 1109-1118, 2013.
  3. Z. Ni, Y. Shi, N. Ansari, and W. Su,“ Reversible data hiding,” IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354-362, 2006.
  4. W. L. Tai, C. M. Yeh, and C. C. Chang, “Reversible data hiding based on histogram modi?cation of pixel differences,” IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 6, pp. 906-910, 2009.
  5. X. Li, W. Zhang, X. Gui, and B. Yang, “A novel reversible data hiding scheme based on two-dimensional difference-histogram modi?cation,” IEEE Trans. Inf. Forensics Secur, vol. 8, no. 7, pp. 1091-1100, 2013.
  6. J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890-896, 2003.
  7. J. MacDonald, “Design methods for maximum minimum-distance error correcting codes,” IBM J., pp. 43-57, 1960.
  8. C.-C. Chang and C.-J. Lin, “Libsvm: A library for support vector machines,” ACM Trans. Intelligent Syst. and Technol., vol. 2, no. 3, pp. 27-53, 2011.
  9. R. Hamming, “Error detecting and error correcting codes,” Bell Sys. Tech. J., vol. 29, pp. 147-160, 1950.
  10. A. Buades, B. Coll, and J. Morel, “A non-local algorithm for image denoising,” in Proc. of CVPR, 2005, pp. 60-65.

Downloads

Published

2019-06-07

Issue

Section

Research Articles

How to Cite

[1]
Salini S Nair, Dr. T Mahalakshmi, Chithira R, " Reversible Secure Image Data Hiding over Encrypted Domain using Key Modulation, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 5, Issue 9, pp.84-88, May-2019.