Home   >   CSC-OpenAccess Library   >    Manuscript Information
Secured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
T M Amarunnishad, Aslam Nazeer
Pages - 423 - 433     |    Revised - 07-10-2014     |    Published - 10-11-2014
Volume - 8   Issue - 6    |    Publication Date - November / December 2014  Table of Contents
Reversible Data Hiding, Encrypted Image, Self-reversible Embedding, Digital Watermarks, Hyper Chaotic System, Peak Signal To Noise Ratio.
Recently, more and more attention is paid to reversible data hiding (RDH) in encrypted images, since it maintains the excellent property that the original cover can be losslessly recovered after embedded data is extracted while protecting the image content’s confidentiality. All previous methods embed data by reversibly vacating room from the encrypted images, which may be subject to some errors on data extraction and/or image restoration. Here a novel method is proposed by reserving room before encryption with a traditional RDH algorithm, and thus it is easy for the data hider to reversibly embed data in the encrypted image. Moreover data to be embedded is shuffled using a hyper chaotic function which is difficult to be extracted from the stego image without original key. A digital water mark is also embedded which ensures integrity of the data. The proposed method has been validated against three other available RDH schemes and it is observed that the proposed scheme outperforms these RDH schemes both in visual quality and payload. The proposed method can achieve real reversibility, that is, data extraction and image recovery are free of any error.
1 Google Scholar 
2 CiteSeerX 
3 refSeek 
4 Scribd 
5 SlideShare 
6 PdfSR 
A. M. Alattar, “Reversible watermark using the difference expansion of a generalized integer transform,” IEEE Transactions on Image Processing, Vol. 13, 2004, pp. 1147-1156.
D. M Thodi and J. Rodriguez, “Expansion embedding techniques for reversible watermarking,” IEEE Trans. Image Process., vol. 16, no. 3,pp. 721–730, Mar. 2007.
I. Cox,M. Miller M, J. Bloom, J. Fridrich, T. Kalker. Digital Watermarking and Steganography Second Edition. Elsevier, 2008
J. Hwang , Kim and J. U Choi , “A reversible watermarking based on histogram shifting,” Int. Workshop on Digital Watermarking, Lecture Notes in Computer Science, Jeju Island, Korea, 2006, vol. 4283,pp. 348–361, Springer-Verlag.
J. Tian, “Reversible data embedding using a difference expansion” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896,Aug. 2003.
Johnson, Z. Duric, S. Jajodia Information Hiding. Steganography and Watermarking - Attacks and Countermeasures: Kluwer Academic Press. Norwall, 2000.
K. H Jung and K. Y Yoo, “Data hiding method using image interpolation,” Journ. of Compute standard and interfaces, vol. 31, pp. 465–470, 1996
V. Sachnev, H. J. Kim, J. Nam, S. Suresh, and Y.-Q. Shi, “Reversible watermarking algorithm using sorting and prediction,” IEEE Trans.Circuits Syst. Video Technol., vol. 19, no. 7, pp. 989–999, Jul.2009.
W. Hong, T. Chen, and H.Wu, “An improved reversible data hiding in encrypted images using side match,” IEEE Signal Process. Lett., vol.19, no. 4, pp. 199–202, Apr. 2012.
W. Zhang, K. Ma, X. Zhao, N. Yu, F. Li “Reversible data hiding in encrypted images by reserving room before encryption, ”IEEE trans. Info. forensics and security ,vol. 8, no. 3, pp. 553–558, March 2013.
X. Zhang, “Reversible data hiding in encrypted images,” IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255–258, Apr. 2011.
X. Zhang, “Separable reversible data hiding in encrypted image,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 826–832, Apr. 2012.
Y. Hu, H.K Lee, Chen and J. Li, “Difference Expansion based reversible data hiding using two embedding direction,” IEEE trans. multimedia, vol. 10, no. 8, pp. 1500–1512, 2008
Y. Wang, K. W Wong, X. F Liao, T. Xiang, G. R Chen , “A chaos based image encryption algorithm with variable control parameters “, Chaos ,solutions and Fractals 41(4) 1773- 1783, 2009.
Z. Ni, Y. Shi, N. Ansari, and S. Wei, “Reversible data hiding,” IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354–362, Mar.2006.
Zhu, C. Zhao, X. Zhang “A novel image encryption-compression scheme using hyper- chaos and Chinese remainder theorem”, Elsevier,Image communication 670-680, 2013.
[13] L. Luo et al., “Reversible image watermarking using interpolation technique, ”IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 187–193,Mar. 2010.
Professor T M Amarunnishad
T K M College of Engineering - India
Mr. Aslam Nazeer
Research Scholar T K M College of Engineering Kollam, Kerala, India - India

View all special issues >>