Secure Data Transmission Through Reversible Data Hiding

被引:0
|
作者
Tomy, Linnet [1 ]
Namitha, T. N. [1 ]
机构
[1] Jyothi Engn Coll, Dept Comp Sci, Trichur, India
关键词
Reversible data hiding; histogram shift; image encryption;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Data hacking is very difficult to deal with today's electronic world. There are large numbers of technique used, for the secure communication of data. Images are widely used in different-different processes. So data hiding is used in the encrypted image, but the main problem is that distortion at the time of data extraction. Reversible data hiding in encrypted image is used to solve this problem. SDS Algorithm gives more security to secret data. RDH recovers the original image after the extraction of the embedded data. In this paper, XOR ciphering technique used for encryption and decryption process. All existing mechanisms embed data by reversibly vacating room after the encrypted images. However, this may result in some errors on data extraction and/or image restoration. In this paper, we suggest a method by holding a space before encryption with a RDH algorithm. Thus, the data hider can embed data in the encrypted image. The embedded data can be data or image. Both data extraction and image recovery will be formed without any error. The transmission and exchange of image also demands high security. Cryptography is used to maintain security
引用
收藏
页数:4
相关论文
共 50 条
  • [31] Reversible data hiding in encrypted images without additional information transmission
    Yu, Mingji
    Yao, Heng
    Qin, Chuan
    Signal Processing: Image Communication, 2022, 105
  • [32] Reversible data hiding in encrypted images without additional information transmission
    Yu, Mingji
    Yao, Heng
    Qin, Chuan
    SIGNAL PROCESSING-IMAGE COMMUNICATION, 2022, 105
  • [33] Concurrent data transmission through analog speech channel using data hiding
    Chen, SY
    Leung, H
    IEEE SIGNAL PROCESSING LETTERS, 2005, 12 (08) : 581 - 584
  • [34] A reversible data hiding scheme for sharing medical data
    Singh, Upasana
    Singh, V. B.
    BIOMEDICAL SIGNAL PROCESSING AND CONTROL, 2023, 85
  • [35] Secure data hiding techniques: a survey
    Singh, Laxmanika
    Singh, A. K.
    Singh, P. K.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (23-24) : 15901 - 15921
  • [36] Secure modulus data hiding scheme
    Kuo, W.-C. (simonkuo@yuntech.edu.tw), 1600, Korean Society for Internet Information (07):
  • [37] Secure Modulus Data Hiding Scheme
    Kuo, Wen-Chung
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (03): : 600 - 612
  • [38] Secure data hiding techniques: a survey
    Laxmanika Singh
    A. K. Singh
    P. K. Singh
    Multimedia Tools and Applications, 2020, 79 : 15901 - 15921
  • [39] Secure Reversible Image Data Hiding Over Encrypted Domain via Key Modulation
    Zhou, Jiantao
    Sun, Weiwei
    Dong, Li
    Liu, Xianming
    Au, Oscar C.
    Tang, Yuan Yan
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2016, 26 (03) : 441 - 452
  • [40] CPA-Secure Privacy-Preserving Reversible Data Hiding for JPEG Images
    Sheidani, Sorour
    Mahmoudi-Aznaveh, Ahmad
    Eslami, Ziba
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 3647 - 3661