Survey on Image Data Hiding Based on Block Histogram Shifting Encryption Algorithm (original) (raw)

Improved Reversible Data Hiding in Encrypted Images by Histogram Shifting Algorithm

In this work an improved reversible data hiding scheme based on histogram shifting algorithm is proposed. Initially, the original image is encrypted by the sender by using a suitable encryption key. Then the data hider hides the data into the encrypted image without the knowledge of the sender by using a data hiding key to generate the marked image. Finally, the receiver by using both the keys can retrieve the data, as well as recover the original image without any distortion from the marked image. This algorithm divides the encrypted image into two blocks and the histogram shifting is performed for each block. The proposed method proves to be efficient compared to the other methods. Both the Peak Signal to Noise Ratio (PSNR) as well as the embedding rate has been highly improved.

Secured Reversible Data Hiding using Histogram Shifting Method

2021

The Internet has become one of the significant ways of communication. Sending medical information from one place to another sometimes may cause leakage or interruption in the messages that are being sent. Thus it is necessary to protect the patient's medical information being sent through the network. Cryptography, Steganography are some of the various techniques that are being used to protect data from the outside world. Here, the patient's information is encrypted using chaotic encryption and the image is compressed by The Absolute Moment Block Truncation Coding (AMBTC) compression method. The chaotic encryption is employed in the system to improve robustness against security vulnerabilities. The compressed image is embedded into the cover image by the histogram modified embedding method. Various keys are used for encrypting and embedding the information into the image. The reverse process is done on the receiver side to retrieve the original image and the patient's information without any loss or distortion by using the same key. The Peak Signal to Noise Ratio (PSNR) of this method is obtained above 50dB.

Reversible Data Hiding in Encrypting Images - An System

International Journal of Engineering and Advanced Technology

In today’s technology data hiding has become an essential need due to the availability of the internet all over the world. Nowadays, it has become necessary task for the people to communicate through networks and share contents with each other. In the meanwhile, transferring the data in a secured manner has become a challenge and also a paradigm. Still there exists many ways for hiding the data in an encrypted images. Hiding information at the back end of the image should not affect the original data or image pixels. It is one type of steganographical method where the data can be hidden inside the images and original data can be losslessly retrieved after extracting the embedded text.The proposed work discusses encryption using reversible data hiding and produces an outlineof various reversible data hiding techniques which includes quantization technique, histogram shifting, expansion technique, compression technique anddual image technique

A Review of Reversible Data Hiding Technique Based on Steganography

2018

This paper describes the concept of Reversible Data Hiding (RDH) method is based on steganography. Recently more attention is paid to RDH in encrypted image. Generally when a secured /confidential data is transmitted over an insecure channel, loss in data occurs. To secure the data, encrypt the wrap data and embed is secret data into cover media. Since RDH manages the outstanding secured property, the original picture can be recovered without any loss. In this survey paper, different RDH methods are analyzed. All the existing methods in RDH have some limitations. In Vacating Room after Encryption method, during data extraction or image restoration, some errors occurs and in vacating Room previous to Encryption is easy for the data hider to reversibly embed the data in the encrypted image but highly complex in retrieval of the image. Cryptography is also used to maintain the security. Many researchers find difficulty in attaining the cover image and therefore different methods implem...

Reversible Data Hiding in Encrypted Image Using Histogram Modification

2017

I. Abstract: In the past two decades, reversible data hiding (RDH), also referred to as lossless o invertible data hiding, has gradually become a very active research area in the field of data hiding. This has been verified by more and more papers on increasingly wide-spread subjects in the field of RDH research that have been published these days. In this paper, the various RDH algorithms and researches have been classified into the following six categories: 1) RDH into image spatial domain; 2) RDH into image compressed domain (e.g., JPEG); 3) RDH suitable for image semi-fragile authentication; 4) RDH with image contrast enhancement; 5) RDH into encrypted images, which is expected to have wide application in the cloud computation; and 6) RDH into video and into audio. For each of these six categories, the history of technical developments, the current state of the arts, and the possible future researches are presented and discussed. It is expected that the RDH technology and its ap...

reversible data hiding in encrypted images by image partitioning

International Journal of Science Technology & Engineering

The concept of reversible data hiding technique is based on steganography and related to internet security. When it is desired to send the confidential or secure data over an insecure medium it is necessary to encrypt the cover data and then embed the confidential or secure data into that cover data. For achieving this features there are various data hiding techniques, compression techniques, and encryption or decryption techniques available. Also it is important that the data hiding should be reversible in nature, should be suitable for encryption/decryption domain. The main issues regarding the data hiding are Distortion, Noise condition and uneven distribution of embedding capacity. In this work, we propose a novel method for data hiding in encrypted image with less distortion and high embedding capacity. Here we used Histogram shifting as the data hiding technique. Histogram Shifting utilizes zero and peak points of histogram of an image to embed the data. In order to improve security of hidden data, Encryption technique is applied so that intruder cannot predict the presence of hidden data. Also as a striking feature ‘Image partitioning’ prior to image encryption at content owner side is introduced, thus RDH tasks in encrypted images would be more natural and much easier which leads us to the novel framework,” Reversible data hiding by image partitioning”. And as a result the performance is measured in terms of PSNR values.

A Comparative Study on Reversible Data Hiding in Encrypted Images

Data hiding is a major issue of concern while exchanging secret information in an untrusted network. Reversible data hiding plays a vital role in secure secret data transmission. For many applications such as medical image processing and military application every bit of data is important .Even a small amount of distortion is unacceptable and any change can affect the intelligence of the image. RDH-EI is the process of hiding secret information in a cover medium and the lossless extraction of the same ensuring increased payload capacity, better protection and better visual quality of the recovered image. This paper presents a survey on various data hiding techniques and related works.

A Review Paper on Data Hiding in Encrypted Image by Reversible Image Transformation

—Presently, a new reversible image transformation technique is proposed, this technique not only enhances the quality of the encrypted image but also it can restore the secret image in lossless manner. Furthermore, is delegate data to the cloud. Therefore, the cloud can easily add additional data into the encrypted image by any RDH methods. It is very crucial to secure data and allow the cloud server to manage the data at the meantime. Under such demands, proposes a method of Reversible Data Hiding in Encrypted Image based on Reversible Image Transformation. Other from all existing encryption methods, RIT based method allow user to transmute the data of original image into another target image with the same size. Which secure the original image, the transmuted image which appears like the target image which is used as the encrypted image, and the transmutation can be done between the micro blocks with small size, which enhance the quality of the encrypted image.

Encrypted Reversible Data Hiding on Compressed Image

International Journal of Computer Applications, 2013

The paper presents a new approach in Image steganography. Information security is the important research field. Steganography process hides message into cover file and forms a stego file. In image steganography there is a need of method which will increase the security, reduce the distortion in the stego file and recovers the data without any loss. In the era of multimedia and internet there is need of reducing time for transmission. The proposed approach is combination of compression, data hiding technique and encryption. To make the transmission and storage of digital data faster, lossy compression is used. On the compressed image data hiding is done. The stego image is encrypted using AES to ensure user authentication. If the receiver has encryption key and data hiding key then only he can obtain the secret message. Nodes are selected randomly in data hiding stage. On the randomly selected nodes lossless LSB steganography is used.

A Novel Approach for Reversible Data Hiding

acceptable for legal purposes. Reversible data hiding (RDH) [18] has the capability to erase the distortion introduced by embedding step after cover restoration. It is an important property that can be applied to many scenarios, such as medical (Online) 237 | P a g e imagery, military imagery and law forensics. For this reason, RDH becomes a hot research topic and is extensively studied over (Online) 240 | P a g e 4.