This work proposes a technique for separable data
hiding in encrypted images. In the first phase, a content owner
encrypts the original uncompressed image using an encryption
key. Then, a data-hider encrypts image using key and add data
into it. With an encrypted image containing additional data, if a
receiver has the data-hiding key, he can extract the additional
data though he does not know the image content. If the receiver
has the encryption key, he can decrypt the received data to obtain
an image similar to the original one, but cannot extract the
additional data. If the receiver has both the data-hiding key and
the encryption key, he can extract the additional data and recover
the original content without any error by exploiting the spatial
correlation in natural image when the amount of additional data
is not too large.
Vinay Wadekar : Studying in Final Year Computer Science Engineering, at
University Of Pune in 2014-15.
Current research interest in security of data, hacking.
Ajinkya Jadhavrao : Studying in Final Year Computer Science Engineering, at
University Of Pune in 2014-15.
Current research interest in data encryption.
Sharad Ghule : Studying in Final Year Computer Science Engineering, at
University Of Pune in 2014-15.
Current research interest in data embedding in image.
Akshay Kapse : Studying in Final Year Computer Science Engineering, at
University Of Pune in 2014-15.
Current research interest in image processing.
encryption
data hiding
separable
hybrid
cryptography
The encrypted data can hide in encrypted image by sender.
There may be image encryption and data hiding two
separate functions. There are two different encryption keys
for data and image.
[1] Kede Ma, Weiming Zhang, Xianfeng Zhao, Member,
IEEE, Nenghai Yu, and Fenghua Li, “Reversible Data
Hiding in Encrypted Images by Reserving Room Before
Encryption” IEEE Trans. Inform. Forensics Security, vol.
8, no. 3, pp. 53–58, March. 2013.
[2] Xinpeng Zhang , “Separable Reversible Data Hiding in
Encrypted Image” IEEE Trans. Inform. Forensics
Security, vol. 7, no. 2, pp. 53–58, April. 2012.
[3] Shrikant Khaire, DR. SANJAY L. ALBALWAR
“Review: Steganography – Bit Plane Complexity
Segmentation (BPCS) Technique” International Journal
of Engineering Science and Technology Vol. 2(9), 2010,
4860-4868