Evaluate The Quality Of Marked Decrypted Image Quantitatively To Encrypted Images Using Rdh
Abstract
Encryption is an effectual and popular means as it converts the original and significant content to incomprehensible one. Even though few RDH methods in encrypted images have been published yet there are some talented applications if RDH can be applied to encrypted images. Hwang et al. supported a reputation-based trust-management system enhanced with data colouring a way of embedding data into covers and software watermarking in which data encryption and colouring offer potential for upholding the content owner’s privacy and data integrity. Apparently the cloud service provider has no right to commence everlasting distortion during data colouring into encrypted data. Therefore a reversible data colouring technique based on encrypted data is preferred. Suppose a medical image database is stored in a data centre and a server in the data centre can implant notations into an encrypted version of a medical image through a RDH technique. With the notations the server can handle the image or confirm its integrity without having the knowledge of the original content and thus the patient’s privacy is protected. On the other hand a doctor having the cryptographic key can decrypt and reinstate the image in a reversible manner for the reason of additional diagnosing.
Keywords
References
T. Kalker and F.M.Willems, “Capacity bounds and code constructions for reversible data-hiding,†in Proc. 14th Int. Conf. Digital Signal Processing (DSP2002), 2002, pp. 71–76.
W. Zhang, B. Chen, and N. Yu, “Capacity-approaching codes for reversible data hiding,†in Proc 13th Information Hiding (IH’2011),LNCS 6958, 2011, pp. 255–269, Springer-Verlag.
W. Zhang, B. Chen, and N. Yu, “Improving various reversible data hiding schemes via optimal codes for binary covers,†IEEE Trans. Image Process., vol. 21, no. 6, pp. 2991–3003, Jun. 2012.
J. Fridrich and M. Goljan, “Lossless data embedding for all image formats,†in Proc. SPIE Proc. Photonics West, Electronic Imaging, Security and Watermarking of Multimedia Contents, San Jose, CA, USA, Jan. 2002, vol. 4675, pp. 572–583.
J. Tian, “Reversible data embedding using a difference expansion,†IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896, Aug. 2003.
Z. Ni, Y. Shi, N. Ansari, and S. Wei, “Reversible data hiding,†IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354–362, Mar. 2006.
D.M. Thodi and J. J. Rodriguez, “Expansion embedding techniques for reversible watermarking,†IEEE Trans. Image Process., vol. 16, no. 3, pp. 721–730, Mar. 2007.
X. L. Li, B. Yang, and T. Y. Zeng, “Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection,†IEEE Trans. Image Process., vol. 20, no. 12, pp. 3524–3533, Dec. 2011.
P. Tsai, Y. C. Hu, and H. L. Yeh, “Reversible image hiding scheme using predictive coding and histogram shifting,†Signal Process., vol. 89, pp. 1129–1143, 2009.
L. Luo et al., “Reversible imagewatermarking using interpolation technique,†IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 187–193, Mar. 2010.
V. Sachnev, H. J. Kim, J. Nam, S. Suresh, and Y.-Q. Shi, “Reversible watermarking algorithm using sorting and prediction,†IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 7, pp. 989–999, Jul. 2009.
A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography. Boca Raton, FL, USA: CRC, 1996.
K. Hwang and D. Li, “Trusted cloud computing with secure resources and data coloring,†IEEE Internet Comput., vol. 14, no. 5, pp. 14–22, Sep./Oct. 2010.
M. Johnson, P. Ishwar, V. M. Prabhakaran, D. Schonberg, and K. Ramchandran, “On compressing encrypted data,†IEEE Trans. Signal Process., vol. 52, no. 10, pp. 2992–3006, Oct. 2004.
W. Liu, W. Zeng, L. Dong, and Q. Yao, “Efficient compression of encrypted grayscale images,†IEEE Trans. Image Process., vol. 19, no. 4, pp. 1097–1102, Apr. 2010.
Refbacks
- There are currently no refbacks.
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â