Separable Reversible Data Hiding using XOR and Permutation Encryption in Image”

Authors

  • Chandrikapure R M. Tech , Department. of Computer Science & Engineering, Jhulelal Institute of Technology, Nagpur, India
  • Dhore P M. Tech , Department. of Computer Science & Engineering, Jhulelal Institute of Technology, Nagpur, India
  • Balani N M. Tech , Department. of Computer Science & Engineering, Jhulelal Institute of Technology, Nagpur, India

Keywords:

separable-reversible data hidinG, encrypted images, , RDH-EI, classification permutation

Abstract

To perk up the security as well as the quality of decrypted, recovered images, this paper proposes a classification permutation based separable-reversible data hiding in encrypted images. A classification permutation encryption in combination with the XOR-encryption is initially designed to advance the privacy of both pixel-value and pixel location. Then, each bit in the further data is embedded in the most significant bit (MSB) of the encrypted pixels which are indiscriminately chosen based on the data-hiding key in the smooth set. The quality of decrypted and recovered image can be significantly improved by exploiting the spatial correlation as the MSBs of smooth pixels are used to embed the additional data. Results of experimentation exhibit that the quality of decrypted image obtained by the proposed method is superior than to the existing methods. There is 100% probability for lossless recovery from proposed method.

References

[1] F. Huang, J. Huang and Y. Shi, “New framework for reversible data hiding in encrypted domain,” IEEE Trans. Inf. Forensics Security, vol. 11, no. 12, pp. 2777-2789, Dec. 2016.

[2] X. Zhang, “Reversible data hiding in encrypted image,” IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255-258, April. 2011.

[3] W. Hong, T. Chen and H. Wu, “An improved reversible data hiding in encrypted images using side match,” IEEE Signal Process. Lett., vol. 19, no. 4, pp. 199-202, April. 2012.

[4] X. Liao and C. Shu. “Reversible data hiding in encrypted images based on absolute mean difference of neighboring pixels,” J. Vis. Commun. Image Represent., vol. 28, pp. 21-27, 2015.

[5] C. Qian and X. Zhang. “Effective reversible data hiding in encrypted image with privacy protection for image content,” J. Vis. Commun. Image Represent., vol. 31, pp. 154-164, 2015.

[6] K. Ma, W. Zhang, X. Zhao, et al., “Reversible data hiding in encrypted images by reserving room before encryption,” IEEE Trans. Inf. Forensics Security, vol. 8, no. 3, pp. 553-562, Mar. 2013.

[7] D. Xu and R. Wang, “Separable and error-free reversible data hiding in encrypted images,” Signal Process. vol. 123, pp. 9-21, 2016.

[8] T. Nguyen, C. Chang and W. Chang, “High capacity reversible data hiding scheme for encrypted images,” Signal Process.: Image Commun., vol. 44, pp. 84-91, 2016.

[9] X. Zhang, “Separable reversible data hiding in encrypted image,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 826-832, April. 2012.

[10] X. Wu andW. Sun, “High-capacity reversible data hiding in encrypted images by prediction error,” Signal Process., vol. 104, pp. 387-400, 2014.

[11] F. Chen, H. He, Y. Huo, “Self-embedding watermarking scheme against JPEG compression with superior imperceptibility”, Multimed Tools Appl., DOI 10.1007/s 11042-016-3574-0, 2016.

[12] Z. Ni, Y.Q. Shi, N. Ansari, and W.Su, Reversible data hiding, IEEE Transactions on Circuits and Systems for Video Technology, Vol 16, no.3, Mar 2006, pp 354-362.

[13] Shilpa Sreekumar and Vincy Salam, Advanced Reversible Data Hiding with Encrypted Data, IJETT, Vol.13, no.7, Jul 2014, pp 310-313.

[14] VinitAgham and TareekPattewar, A Survey on Separable Reversible Data Hiding Technique, IMACST, Vol.4, no.1, May 2013, pp 9-13.

[15] M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, Reversible data hiding, International Conference on Image Processing, ISSN 1522-4880, Vol.2, Oct.2002, pp 157-160.

[16] C. W. Honsinger, P. Jones, M. Rabbani, and J. C. Stoffel, “Lossless Recoveryof an Original Image Containing Embedded Data,” U.S. Patent6 278 791 B1, Aug. 21, 2001.

[17] B. Macq and F. Deweyand, “Trusted headers for medical images” DFG VIII-D II Watermarking Workshop, Erlangen, Germany,Oct. 1999.

[18] J. Fridrich, M. Goljan, and R. Du, “Invertible authentication,”Proc.SPIE Security Watermarking Multimedia Contents, San Jose, CA, Jan.2001, pp. 197–208.

[19] M. Goljan, J. Fridrich, and R. Du, Distortion-free data embedding,Proc. 4th Inf. Hiding Workshop, Pittsburgh, PA, Apr. 2001, pp. 27–41.

[20] A. R. Calderbank, I. Daubechies, W. Sweldens, and B. Yeo, Wavelettransforms that map integers to integers,Appl. Comput. HarmonicAnal., vol. 5, no. 3, pp. 332–369, 1998.

[21] LalitDhande, PriyaKhune, VinodDeore and DnyaneshwarGawade, Hide Inside-Separable Reversible Data hiding in Encrypted Image, IJITEE, ISSN:2278-3075, Vol. 3, Issue 9, Feb 2014, pp 88-91.

Downloads

Published

2025-11-25

How to Cite

[1]
R. Chandrikapure, P. Dhore, and N. Balani, “Separable Reversible Data Hiding using XOR and Permutation Encryption in Image””, Int. J. Comp. Sci. Eng., vol. 7, no. 12, pp. 105–110, Nov. 2025.