International Journal of Computer
& Organization Trends

Research Article | Open Access | Download PDF

Volume 7 | Issue 5 | Year 2017 | Article Id. IJCOT-V47P303 | DOI : https://doi.org/10.14445/22492593/IJCOT-V47P303

A Comparative Study on Reversible Data Hiding in Encrypted Images Using Various Frameworks


Sayeesh, Manjunath Kotari, Harish Kunder, Chanchal Antony

Citation :

Sayeesh, Manjunath Kotari, Harish Kunder, Chanchal Antony, "A Comparative Study on Reversible Data Hiding in Encrypted Images Using Various Frameworks," International Journal of Computer & Organization Trends (IJCOT), vol. 7, no. 5, pp. 15-19, 2017. Crossref, https://doi.org/10.14445/22492593/IJCOT-V47P303

Abstract

We need more security for data transmission in computer networks. Nowadays most popularly we store and manage variety of data in cloud server. We need to protect the privacy of the data that is stored in cloud server. Many robust message encryption methods have been developed to such methods. Reversible data hiding in encrypted images is form of steganography in which we hide data within images. In this paper, we compare vacating room after encryption (VRAE), reserving room before encryption (RRBE) and reversible image transformation (RIT) frameworks for reversible data hiding in encrypted images. In the framework VRAE, the cloud server embeds data by losslessly vacating room from the encrypted images by using the idea of compressing encrypted images. In the framework RRBE, the image owner first empties out room by using reversible data hiding method in the plain images. After that, the image is encrypted and outsourced to the cloud and the cloud server can freely embed data into the reserved room of the encrypted image. RIT-based framework allows the user to transform the content of original image into the content of another target image with the same size. The transformed image, which looks like the target image, is used as the encrypted image and is outsourced to the cloud.

Keywords

Reversible data hiding (RDH), vacating room after encryption (VRAE), reserving room before encryption (RRBE), reversible image transformation (RIT), image encryption, privacy protection.

References

[1] X. Hu, W. Zhang, X. Li, and N. Yu, “Minimum rate prediction and optimized histograms modification for reversible data hiding,” IEEE Trans. Inf. Forensics Security, vol. 10, no. 3, pp. 653–664, Mar. 2015.
[2] X. Li, W. Zhang, B. Ou, and B. Yang, “A brief review on reversible data hiding: Current techniques and future prospects,” in Proc. IEEE ChinaSummit Int. Conf. Signal Inf. Process., 2014, pp. 426–430.
[3] H. Wang, W. Zhang, and N. Yu, “Protecting patient confidential information based on ECG reversible data hiding,” Multimedia Tools Appl.,vol. 75, no. 21, pp. 13733–13747, 2015, doi:10.1007/s11042- 015-2706-2
[4] Z. Fu et al., “Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing,” IEICE Trans. Commun., vol. 98, no. 1, pp. 190–200, 2015.
[5] K. Hwang and D. Li, “Trusted cloud computing with secure resources and data coloring,” IEEE Internet Comput., vol. 14, no. 5, pp. 14–22, Sep./Oct.2010
[6] J. Fridrich and M. Goljan, “Lossless data embedding for all image formats,” in Proc. SPIE Proc. Photonics West, Electronic Imaging, Securityand Watermarking of Multimedia Contents, San Jose, CA, USA,Jan. 2002, vol. 4675, pp. 572–583.
[7] J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896,Aug. 2003.
[8] Z. Ni, Y. Shi, N. Ansari, and S. Wei, “Reversible data hiding,” IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354–362, Mar.2006.