A novel reversible data hiding technique for encrypted images is proposed in this paper. Encryption helps achieving privacy which is a necessity for sensitive imagery such as medical and military images. In encrypted ...
详细信息
A novel reversible data hiding technique for encrypted images is proposed in this paper. Encryption helps achieving privacy which is a necessity for sensitive imagery such as medical and military images. In encrypted domain data embedding capacity remains a big challenge. A dual embedding scheme is proposed to enhance the additional data hiding capability. The general architecture includes a content owner, a data hider, and a receiver. This scheme is subjected to work on 512 x 512 grey-scale image. The encryption is done using a random 512 x 512 key matrix followed by a two phase data hiding technique to embed bits differently in odd and even blocks. Experiments are conducted in different block sizes in the embedding phase to achieve maximum data hiding potential. Experimental results show a huge increase in embedding capability. The error rate has significantly reduced over 50% in the recovered image and visual quality and image recovery is better than the existing methods.
Reversible data hiding has its own significance in medical image systems. Medical imaging has key applications in healthcare systems, where the private information about a person needs to be shared among the authentic...
详细信息
ISBN:
(纸本)9781509067343
Reversible data hiding has its own significance in medical image systems. Medical imaging has key applications in healthcare systems, where the private information about a person needs to be shared among the authenticated persons only without any distortion during data hiding and transmission. RDH is one of most practicable techniques of privacy preservation with lossless recovery at receiver's end. Numerous RDH techniques are proposed on different image domains like, compressed and uncompressed. This paper summarizes the existing RDH algorithms for medical images.
Cryptography is used for secure communication over a media in presence of third party adversaries. If proper encryption algorithm is not used then it will be easy for third party hackers to decrypt the secret message ...
详细信息
ISBN:
(纸本)9781538622155
Cryptography is used for secure communication over a media in presence of third party adversaries. If proper encryption algorithm is not used then it will be easy for third party hackers to decrypt the secret message very easily. This paper presents a strong hybrid image encryption and decryption algorithm. In order to make the encrypted image harder to decrypt Arnold's cat map is combined with two more algorithms, Criss-cross and Random Shuffling technique to make an altogether relatively stronger permutation cipher. Steganography is used to conceal the encrypted secret file within the cover image to get the stego image. In this paper the steganography algorithm will consist of a combination of Continuous Raster C pattern and lsb algorithm. lsb algorithm will be applied based on the scan pattern. The experimental results demonstrate that the image encryption algorithm and steganography algorithm together incorporate the advantages of great level of security.
Digital watermarking using Difference Expansion (DE) is quite popular to embed reversibly the data followed by recovery of the original image. According to this algorithm, the least significant bit (lsb) of inter-pixe...
详细信息
ISBN:
(纸本)9783642315510
Digital watermarking using Difference Expansion (DE) is quite popular to embed reversibly the data followed by recovery of the original image. According to this algorithm, the least significant bit (lsb) of inter-pixel differences (between a pair of neighboring pixel) is used to embed data. It is seen that none of the DE works focuses on structural information retentions for the watermarked image at high embedding capacity. Moreover, security measure of the hidden data is not investigated under distortion constraint scenario. To this aim, a modification in DE is proposed that not only increase embedding space (hence, watermark payload) but also makes little change in structure and contrast comparison (imperceptibility) under similar luminance background. A simple fuzzy function is used to classify the image content into smooth, texture and edge region followed by adaptive distortion control. modification also makes little change in relative entropy between the host and the watermarked data that leads to better security of the hidden data.
暂无评论