Protection Reversible Data Hiding in Encrypted Images by Distributing Memory before Encryption

Authors

  • Jambhulkar S Department of Computer Science & Engineering, Jhulelal Institute of Technology, Nagpur, India
  • Dudhe P Department of Computer Science & Engineering, Jhulelal Institute of Technology, Nagpur, India

Keywords:

Encryption, Decryption and Reversible Data hiding

Abstract

Electronic image and data inserting framework have number of critical interactive media applications. Now a days, consideration is paid to reversible data hiding (RDH) in encoded images is more, since it maintains the highest quality property that the original cover can be losslessly recovered after inserted data is extracted while securing the image content’s confidentiality. RDH is a technology used to hide data inside image for high security and can fully recover the original image and private data . All earlier methods fixed data by reversibly vacating room from the encrypted images, which may result to some errors on data extraction and/or image restoration. In this paper, we put forward another method in which we simply encrypt an image without its header by using our new technique. Hence it is easy for the data hider to reversibly fixed data in the encrypted image. The projected technique can achieve real reversibility, that is, data extraction and image recovery are free of any error.

References

[1] T. Kalker and F.M.Willems, “Capacity bounds and code constructions for reversible data-hiding,” in Proc. 14th Int. Conf. Digital Signal Processing (DSP2002), 2002, pp. 71–76.

[2] W. Zhang, B. Chen, and N. Yu, “Capacity-approaching codes for reversible data hiding,” in Proc 13th Information Hiding (IH’2011),LNCS 6958, 2011, pp. 255–269, Springer-Verlag.

[3] W. Zhang, B. Chen, and N. Yu, “Improving various reversible data hiding schemes via optimal codes for binary covers,” IEEE Trans.

[4] J. Fridrich and M. Goljan, “Lossless data embedding for all image formats,” in Proc. SPIE Proc. Photonics West, Electronic Imaging, Security and Watermarking of Multimedia Contents, San Jose, CA, USA, Jan. 2002, vol. 4675, pp. 572–583.

[5] Z. Ni, Y. Shi, N. Ansari, and S. Wei, “Reversible data hiding,” IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354–362, Mar. 2006.

[6] X. Zhang, “Reversible data hiding in encrypted images,” IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255–258, Apr. 2011.

[7] W. Hong, T. Chen, and H.Wu, “An improved reversible data hiding in encrypted images using side match,” IEEE Signal Process. Lett., vol. 19, no. 4, pp. 199–202, Apr. 2012.

[8] X. Zhang, “Separable reversible data hiding in encrypted image,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 826–832, Apr. 2012.

[9] M. Johnson, P. Ishwar, V. M. Prabhakaran, D. Schonberg, and K. Ramchandran, “On compressing encrypted data,” IEEE Trans. Signal Process., vol. 52, no. 10, pp. 2992–3006, Oct. 2004. 562 IEEE Transactions On Information Forensics And Security, Vol. 8, No. 3, March 2013

[10] W. Liu, W. Zeng, L. Dong, and Q. Yao, “Efficient compression of encrypted grayscale images,” IEEE Trans. Image Process., vol. 19, no. 4, pp. 1097–1102, Apr. 2010

[11] Miscelaneous Gray Level Images [Online]. Availabe:http://decsai.ugr.es/cvg/dbimagenes/g512.php

Downloads

Published

2025-11-25

How to Cite

[1]
S. Jambhulkar and P. Dudhe, “Protection Reversible Data Hiding in Encrypted Images by Distributing Memory before Encryption”, Int. J. Comp. Sci. Eng., vol. 7, no. 12, pp. 145–147, Nov. 2025.