Reversible Data Hiding using RIT, AES and UES Frame Work
DOI:
https://doi.org/10.26438/ijcse/v6i10.211215Keywords:
AES, UES, public channel, , image encryption, reversible image transformation, privacy protection, imperceptible, secret key, stego, scrambling, PSNR, MSQE, SSIMAbstract
Image Steganography is an emerging field in computer science. There is a need of secured data transmission system to protect the data and maintain the privacy. This work is based on multilevel security method. The reversible data hiding has been implemented using a robust method. The secret image is encrypted using Reversible Image transformation, followed by AES (Advanced Encryption Standard) algorithm and finally the UES( Unified Encryption and Scrambling) is applied for data embedding into the carrier image. The secret key is also added to the encrypted image and it further makes the frame work more robust. The frame work is simulated using MATLAB and the statistical results like PSNR, MSQE and SSIM confirm the proposition
References
[1] K. Hwang, D. Li, “Trusted cloud computing with secure resources and data coloring,” IEEE Internet Computing, vol. 14, no. 5, pp. 14-22, Sept.-Oct. 2010.
[2] F. Bao, R. H. Deng, B. C. Ooi, et al., “Tailored reversible watermarking schemes for authentication of electronic clinical atlas,” IEEE Trans. on Information Technology in Biomedicine, vol. 9, no. 4, pp. 554-563, Dec. 2005.
[3] F. Willems, D. Maas, and T. Kalker, “Semantic lossless source coding,” 42nd Annual Allerton Conference on Communication, Control and Computing, Monticello, Illinois, USA, pp. 1411-1418, 2004.
[4] W. Zhang, X. Hu, N. Yu, et al. “Recursive histogram modification: establishing equivalency between reversible data hiding and lossless data compression,” IEEE Trans. on Image Processing, vol. 22, no. 7, pp. 2775-2785, Jul. 2013.
[5] V. Sachnev, H. J. Kim, J. Nam, S. Suresh, and Y. Q. Shi, “Reversible watermarking algorithm using sorting and prediction,” IEEE Trans. on Circuits and Systems for Video Technology, vol.19, no.7, pp. 989-999, Jul. 2009.
[6] B.ou, X. Li, Y. Zhao, R. Ni, Y. Shi, “Pairwise prediction-error expansion for efficient reversible data hiding,” IEEE Trans. on Image Processing, vol. 22, no.12, pp. 5010-5021, Dec. 2013.
[7] Ioan-CatalinDragoi, DinuColtuc, “Local-prediction-based difference expansion reversible watermarking,” IEEE Trans. on Image Processing, vol. 23, no. 4, pp. 1779-1790, Apr. 2014.
[8] Z. Ni, Y. Shi, N. Ansari, and S. Wei, “Reversible data hiding,” IEEE Trans. on Circuits and Systems for Video Technology, vol. 16, no. 3, pp. 354-362, Mar. 2006.
[9] J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. on Circuits and Systems for Video Technology, vol. 13, no.8, pp. 890-896, Aug. 2003.
[10] X. Hu, W. Zhang, X. Li, N. Yu, “Minimum rate prediction and optimized histograms modification for reversible data hiding,” IEEE Trans. on Information Forensics and Security, vol. 10, no. 3, 653-664, Mar. 2015.
[11] X. Cao, L. Du, X. Wei, et al., “High capacity reversible data hiding in encrypted images by patch-level sparse representation,” IEEE Trans. on Cybernetics, vol. 46, no. 5, pp. 1132-1143, May. 2016.
[12] S. Yu, C. Wang and K. Ren, “Achieving secure, scalable, and finegrained data access control in cloud computing,” IEEE Proceeding of INFOCOM 2010, pp. 1-9, Mar. 2010.
[13] I. Lai and Wen. Tsai,“Secret-fragment-visible mosaic image-a new computer art and its application to information hiding,” IEEE Trans. on Information Forensics and Security, vol. 6, no. 3, pp. 936-945, Sept. 2011.
[14] Y. Lee and W. Tsai,“A new secure image transmission technique via secret-fragment-visible mosaic images by nearly reversible color transformation,” IEEE Trans. on Circuits and Systems for Video Technology, vol. 24, no. 4, pp. 695-703, Apr. 2014.
[15] BossBase image database, [Online]. Available: http://agents.fel.cvut.cz/stegodata/RAWS
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
