Hide Inside-Separable Reversible Data Hiding in Encrypted Image
Lalit Dhande1, Priya Khune2, Vinod Deore3, Dnyaneshwar Gawade4
1Mr. Lalit Dhande, Department of Computer, Pune University, Parvatibai Genba Moze College of Engineering, Pune (Maharashtra), India.
2Prof. Mrs. Priya Khune, Department of Computer, Pune University, Parvatibai Genba Moze College of Engineering, Pune (Maharashtra), India.
3Mr. Vinod Deore, Department of Computer, Pune University, Parvatibai Genba Moze College of Engineering, Pune (Maharashtra), India.
4Mr. Dnyaneshwar Gawade, Department of Computer, Pune University, Parvatibai Genba Moze College of Engineering, Pune (Maharashtra), India.
Manuscript received on 13 February 2014 | Revised Manuscript received on 20 February 2014 | Manuscript Published on 28 February 2014 | PP: 88-91 | Volume-3 Issue-9, February 2014 | Retrieval Number: I1487023914/14©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Recently, more and more attention is paid to reversible data hiding (RDH) in encrypted images, since it maintains the excellent property that the original cover can be losslessly recovered after embedded data is extracted while protecting the image content’s confidentiality. All previous methods embed data by reversibly memory space from the encrypted images, which may be subject to some errors on data extraction and/or image restoration. In this paper, we propose a novel method by reserving memory space before encryption with a traditional RDH technique, and thus it is easy for the data hider to reversibly embed data in the image. The proposed method can achieve real reversibility, that is, data extraction and image recovery are free of any error.
Keywords: Data Encryption, Reversible Data Hiding, Image Encryption, Privacy Protection, Data Extraction.
Scope of the Article: Image Security