Beruflich Dokumente
Kultur Dokumente
Mr P. S. Nalwade
CSE Department, SGGSIE & T, Nanded
psnalwade@sggs.ac.in
Abstract
Recently, there are so many research is progressing on
the field such as internet security, steganography,
cryptography. This study describes the concept of
reversible data hiding technique which is established
on steganography and internet security. When to send
the confidential/important/secure data over an insecure
and bandwidth-constrained channel it is habitual to
encrypt as well as compress the cover data and then
embed the confidential data into cover media. For
attaining
this
facility
there
are
various
encryption/decryption
techniques,
compression
techniques, and data hiding techniques available. It is
also important the data hiding should be reversible in
nature, should be suitable for encryption/decryption
domain. Here we are analyzing the data hiding
technique which is reversible in nature by using the
encrypted image as a cover data in which the data is
embedded. Thus, it is termed as a Reversible data
hiding (RDH) technique in encrypted image. In
reversible data hiding technique initially a content
owner encrypts the original uncompressed image, then
a data hider compress the image to create space to
provide some additional data. At the receiver side,
receivers extract the embedded data and recover the
covering image.
1. Introduction
With the recent advances in signal processing
technology produce the possibility of a large variety of
new applications ranging from multimedia content
production and distribution, e.g., advanced health care
systems for continuous health monitoring, confidential
transmissions, video surveillance and military
applications. These developments raise several
important issues concerning the security of the digital
contents (images) to be processed, including
897
ISSN:2229-6093
4.
898
ISSN:2229-6093
899
ISSN:2229-6093
original state. The performance of a reversible dataembedding algorithm can be measured by the
following.
Payload capacity limit: what is the maximal
amount of information can be embedded?
Visual quality: how is the visual quality of the
embedded image?
Complexity:
what
is
the
algorithm
complexity?
The distortion-free data embedding is the motivation
of reversible data embedding. Data will certainly
change the original content by embedding some data
into it. Even a very tenuous change in pixel values may
not be suitable, particular in sensible imagery, such as
military data and medical data. In such an assumption,
every bit of information is important.
From the application point of view, Since the
difference between the embedded image and the
original image is almost unobtrusive from human eyes,
reversible data embedding could be thought as a secret
communication channel since reversible data
embedding can be used as an information carrier.
900
ISSN:2229-6093
901
ISSN:2229-6093
902
ISSN:2229-6093
6. Conclusion
Reversible data hiding is a new topic hiding
attention
because
of
the
privacy-preserving
requirements of cloud data management. In this survey
report I presented how the researcher encrypted image
(theoretically), which consists of image encryption,
data embedding and data-extraction/image-recovery
phases. Also, I studied the literature review of different
compression methods, and give the detailed analysis of
data hiding using image encryption based on image.
Previous methods implement RDH in encrypted images
by vacating room after encryption and it is suitable for
small amounts of additional data, which may be subject
to some errors on data extraction and/or image
restoration. Hence there is need of some easy and large
payload capacity method of RDH which we would be
trying in the future course of our dissertation work.
7. References
[1] M. Johnson, P. Ishwar, V. M. Prabhakaran, D.
Schonberg, and K. Ramchandran, On compressing
encrypted data, IEEE Trans. Signal Process., vol. 52,
no. 10, pp. 29923006, Oct. 2004.
[2] W. Liu, W. Zeng, L. Dong, and Q. Yao, Efficient
compression of encrypted grayscale images, IEEE
Trans. Image Process., vol. 19, no. 4, pp. 10971102,
Apr. 2010.
[3] X. Zhang, Lossy compression and iterative
reconstruction for encrypted image, IEEE Trans.
Inform. Forensics Security, vol. 6, no. 1, pp. 5358, Feb.
2011.
[4] N. Memon and P. W. Wong, A buyer-seller
watermarking protocol, IEEE Trans. Image Process.,
vol. 10, no. 4, pp. 643649, Apr. 2001.
[5] M. Kuribayashi and H. Tanaka, Fingerprinting protocol
for images based on additive homomorphic property,
IEEE Trans. Image Process., vol. 14, no.
[6] M. Deng, T. Bianchi, A. Piva, and B. Preneel, An
efficient buyer-seller watermarking protocol based on
composite signal representation, in Proc. 11th ACM
Workshop Multimedia and Security, 2009, pp. 918.
903