Highly Secured Reversible Data Hiding in AES Encrypted Images by Reserving Room before Encryption with Authentication  
  Authors : Deepthi C.

 

We are living in an Electronics World. The advancements in World Wide Web and the explosive growth in communication techniques in recent years have created a lot of conveniences in our day-today life. Here we have to give the prime importance to security and the confidentiality of the sensitive data we are transmitting across the world. To protect this data from unauthorized access and tampering, various methods have been developed and are in practice today. Data hiding technique, is the process of concealing sensitive information in any media to transfer it securely over the underlying unreliable and unsecured communication network. Recently, more and more attention is paid to Reversible Data Hiding (RDH) in encrypted images, since it offers the excellent property that the original cover can be recovered without any loss after embedded data is extracted while protecting the image content’s confidentiality. RDH in the encrypted images by allocating memory before encryption method is used to recover the original cover without any loss & errors. It is basically used in the medical metaphors, military metaphors and law forensics, where no distortion of the original image is allowed.

 

Published In : IJCAT Journal Volume 1, Issue 4

Date of Publication : 31 May 2014

Pages : 77 - 86

Figures : 13

Tables : 02

Publication Link : Highly Secured Reversible Data Hiding in AES Encrypted Images by Reserving Room before Encryption with Authentication

 

 

 

Deepthi C : Received her B.Tech Degree in Electronics and Communication Engineering from SNGCET, Kannur University, Kerala, India in 2011. She has successfully undergone the Industrial Training on Telecom Technology from BSNL and Android Technology from KELTRON, Kerala, India. Currently doing her M.Tech in Digital Electronics and Communication Engineering at SDIT, Visvesvaraya Technological University, Karnataka, India.

 

 

 

 

 

 

 

Reversible Data Hiding (RDH)

Advanced Encryption Standard (AES)

Histogram Shift (HS)

Reversible data hiding in AES Encrypted images by Reserving room before encryption can achieve real reversibility with high confidentiality for the secret data because of the use of multiple keys during the process ie, encryption key as well as data hiding key. With AES encryption, the secret key is known to both the sender and the receiver. The AES algorithm remains secure, the key cannot be determined by any known means, even if an eavesdropper knows the plaintext and the cipher text. AES is extremely fast compared to other block ciphers.

 

 

 

 

 

 

 

 

 

[1] W. Bender, D. Gruhl, N. Morimoto, A. Lu, - “Techniques for Data Hiding”, IBM Systems Journal, Vol 35, Nos 3&4, 1996.

[2] Zhicheng Ni, Yun-Qing Shi, Nirwan Ansari, and Wei Su, “Reversible Data Hiding”, IEEE Transactions On Circuits And Systems For Video Technology, Vol. 16, No. 3, March 2006.

[3] Anagha Markandey, “A Review On Data Hiding Techniques In Encrypted Images”, International Journal of Computer Trends and Technology (IJCTT) – volume 4 Issue10 – Oct 2013.

[4] W. Puech, M. Chaumont and O. Strauss.“A Reversible Data Hiding Method for Encrypted Images”, "IS&T/SPIE Electronic Imaging 2008 - Security, Forensics, Steganography, and Watermarking of Multimedia Contents, San Jose, CA : United States".

[5] Weiming Zhang, Biao Chen, and Nenghai Yu, “Improving Various Reversible Data Hiding Schemes Via Optimal Codes for Binary Covers”, IEEE Transactions on Image Processing, Vol. 21, No. 6, June 2012.

[6] Xinpeng Zhang, “Separable Reversible Data Hiding in Encrypted Image”, IEEE Transactions OnInformation Forensics And Security, Vol. 7, No. 2, April 2012.

[7] Kede Ma, Weiming Zhang, Xianfeng Zhao, Nenghai Yu, and Fenghua Li,“Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption”, IEEE Transactions On Information Forensics And Security, Vol. 8, No. 3, March 2013.

[8] Dalel Bouslimi, Gouenou Coatrieux, Michel Cozic, And Christian Roux, Fellow, IEEE, “A Joint Encryption/Watermarking System For Verifying The Reliability Of Medical Images”, IEEE Transactions On Information Technology In Biomedicine, Vol. 16, No. 5, September 2012.

[9] Min Wu, Member, IEEE, and Bede Liu, Fellow, IEEE, “Data Hiding in Binary Image for Authentication and Annotation”, IEEE Transactions On Multimedia, Vol. 6, No. 4, August 2004

[10] P. Radhadevi, P. Kalpana, Assistant Professors, Dept Of CA, “Secure Image Encryption Using AES” IJRET , Volume 1 Issue 2,Oct 2012.