Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  Separable & Secure Data Hiding & Image Encryption Using Hybrid Cryptography  
  Authors : Vinay Wadekar; Ajinkya Jadhavrao; Sharad Ghule; Akshay Kapse
  Cite as:

 

This work proposes a technique for separable data hiding in encrypted images. In the first phase, a content owner encrypts the original uncompressed image using an encryption key. Then, a data-hider encrypts image using key and add data into it. With an encrypted image containing additional data, if a receiver has the data-hiding key, he can extract the additional data though he does not know the image content. If the receiver has the encryption key, he can decrypt the received data to obtain an image similar to the original one, but cannot extract the additional data. If the receiver has both the data-hiding key and the encryption key, he can extract the additional data and recover the original content without any error by exploiting the spatial correlation in natural image when the amount of additional data is not too large.

 

Published In : IJCSN Journal Volume 3, Issue 6

Date of Publication : December 2014

Pages : 502 - 506

Figures : 10

Tables : --

Publication Link : Separable & Secure Data Hiding & Image Encryption Using Hybrid Cryptography

 

 

 

Vinay Wadekar : Studying in Final Year Computer Science Engineering, at University Of Pune in 2014-15. Current research interest in security of data, hacking.

Ajinkya Jadhavrao : Studying in Final Year Computer Science Engineering, at University Of Pune in 2014-15. Current research interest in data encryption.

Sharad Ghule : Studying in Final Year Computer Science Engineering, at University Of Pune in 2014-15. Current research interest in data embedding in image.

Akshay Kapse : Studying in Final Year Computer Science Engineering, at University Of Pune in 2014-15. Current research interest in image processing.

 

 

 

 

 

 

 

encryption

data hiding

separable

hybrid cryptography

The encrypted data can hide in encrypted image by sender. There may be image encryption and data hiding two separate functions. There are two different encryption keys for data and image.

 

 

 

 

 

 

 

 

 

[1] Kede Ma, Weiming Zhang, Xianfeng Zhao, Member, IEEE, Nenghai Yu, and Fenghua Li, “Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption” IEEE Trans. Inform. Forensics Security, vol. 8, no. 3, pp. 53–58, March. 2013. [2] Xinpeng Zhang , “Separable Reversible Data Hiding in Encrypted Image” IEEE Trans. Inform. Forensics Security, vol. 7, no. 2, pp. 53–58, April. 2012. [3] Shrikant Khaire, DR. SANJAY L. ALBALWAR “Review: Steganography – Bit Plane Complexity Segmentation (BPCS) Technique” International Journal of Engineering Science and Technology Vol. 2(9), 2010, 4860-4868