Logo PTI
Polish Information Processing Society
Logo RICE

Annals of Computer Science and Information Systems, Volume 10

Proceedings of the Second International Conference on Research in Intelligent and Computing in Engineering

Lossless and Reversible Data Hiding in Encrypted Images With Public Key Cryptography

,

DOI: http://dx.doi.org/10.15439/2017R88

Citation: Proceedings of the Second International Conference on Research in Intelligent and Computing in Engineering, Vijender Kumar Solanki, Vijay Bhasker Semwal, Rubén González Crespo, Vishwanath Bijalwan (eds). ACSIS, Vol. 10, pages 127134 ()

Full text

Abstract. The Lossless data hiding provides the embedding of data in a host image without any loss of data. This research explain a lossless data hiding and image cryptography method based on Choas - Block to image encryption the lossless means if the marked image is considered reliable, the embedding distortion can be totally removed from marked image afterward the embedded data has been extract. This procedure uses features of the pixel difference to embed more data than other randomly partition using Block based Sharpness Index Filtering and refine with single level wavelet decomposition shifting technique to prevent image distortion problems. In this work also manages reversible data hiding based on chaotic technique. In which initially image histogram processes to perceive the pixels which is chosen for hiding each bit of secret data, then by the logistic chaotic map compute an order of hiding each bit stream. Performances differentiate with other exist lossless data hiding plan providing show the superiority of the research. In this proposed research PSNR is found nearly 5.5*103 and existing 4.8*103 at 100 embedding rate which enhance for our existing technique that simulated in MATLAB 2014Ra.

References

  1. Xinpeng Zhang, Jing Long, Zichi Wang, and Hang Cheng “Lossless and Reversible Data Hiding in Encrypted Images with Public Key Cryptography” 1051-8215 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
  2. Shamim Ahmed Laskar and Kattamanchi Hemachandran “High Capacity data hiding using LSB Steganography and Encryption” Department of Computer Science International Journal of Database Management Systems ( IJDMS ) Vol. 4, No. 6, December 2012.
  3. M. Ushanandhini and D. Chitra “Optimal Prediction Scheme Using Reversible Information Hiding” International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) ISSN: 0976-1353 Volume 23 Issue 4 –August 2016.
  4. Ashwak Mahmood Alabaichi “Color Image Encryption using 3D Chaotic Map with AES key Dependent S-Box” IJCSNS International Journal of Computer Science and Network Security, VOL.16 No.10, October 2016.
  5. Patil K. U. 1 & Nandwalkar B. R. “GA Based Reversible Data Hiding in Encrypted Images by Reserving Room before Encryption” IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-ISSN: 2278-2834, p-ISSN: 2278-8735
  6. X. L. Li, B. Yang, and T. Y. Zeng, “Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection,” IEEE Trans. Image Process., vol. 20, no. 12, pp. 3524–3533, December.2011.
  7. Lokesh Kumar, Novel Security Scheme for Image Steganography using Cryptography Technique, Volume 2, Issue 4, April 2012.
  8. Z. Ni, Y. Shi, N. Ansari, and S. Wei, ―Reversible data hiding, IEEETrans. CircuitsSyst. VideoTechnol.,vol.16,no.3,pp.354–362,Mar. 2006.
  9. Anchal Jain, Navin Rajpal, “A Two Layer Chaotic Neural Network based Image Encryption Technique”, IEEE National conference on computing and Communication systems, ISBN 978-1-4673-1952-2, 2012.
  10. Grasha Jacob, A. Murugan, "An Encryption Scheme with DNA Technology and JPEG Zigzag Coding for Secure Transmission of Images”, https://arxiv.org/abs/ 1305.1270v1, 2013.
  11. Grasha Jacob, Murugan A, “A Hybrid Encryption Scheme using DNA Technology”, IJCSCS Vol 3, Feb 2013.
  12. Zhang Yunpeng, Zhu Yu, Wang Zhong, Richard O.Sinnott, “Index-Based Symmetric DNA Encryption Algorithm”, IEEE (4th CISP), DOI 10.1109/CISP.2011.6100690.
  13. C. E. Shannon, “Communication theory of secrecy systems, Bell System” Technical Journal 28–4 (1949) 656–715.
  14. Xingyuan Wang · Qian Wang “A novel image encryption algorithm based on dynamic S-boxes constructed by chaos”, Nonlinear Dyn (2014) 75:567-576.