Reversable Afore Encoding For Revocable Data Spanking In Encoded Images

Anupama Chowdary Ganipineni, Lakshmi Prasad Koyi

Abstract


Nowadays, information is rapidly available through the Internet. Companies have the ability to communicate with a worldwide audience through the World Wide Web. The extraction is performed in the reverse order as the embedding process. The side information (peak/zero points) should be additionally transmitted to the receiver for reversible recoveryThe original cover can be losslessly restored after the embedded information is extracted. In some applications, even any degradation of the original cover is not allowed, such as medical imagery, military imagery and law forensics.All early methods embed assemblage by reversibly vacating space from the encrypted reflections, which may be thing to both errors on data extraction and or appearance refurbishment. Data hacking is very challenging problem in today’s internet world. There are number of techniques to secure the data. So, the data hiding in the encrypted reflection comes into the picture, but occurrence of distortion at the time of data extraction is a main problem. In this article, Due to the modification on the pixel differences to hide secret data, the marked differences may be not in the normal range [0, 255] for a 8-bit grayscale image.


References


M. Johnson, P. Ishwar, V. M. Prabhakaran, D. Schonberg, and K. Ramchandran, "On compressing encrypted data," IEEE Trans. Signal Process., vol. 52, no.10, pp. 2992-3006, Oct. 2004.

Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, "Reversible data hiding," IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354-362, Mar.2006.

C.-C. Chang, C.-C.Lin, and Y.-H. Chen, "Reversible data-embedding scheme using differences between original and predicted pixel values, "IET Inform. Security, vol. 2, no. 2, pp.35-46, 2008.

T. Bianchi, A. Piva, and M. Barni, "On the implementation of the discrete Fourier transform in the encrypted domain," IEEE Trans. Inform. Forensics Security, vol. 4, no. 1, pp. 86-97, Feb. 2009.

W. Liu, W. Zeng, L. Dong, and Q. Yao, "Efficient compression of encrypted gray scale reflections," IEEE Trans. Reflection Process., vol. 19, no. 4, pp. 1097-1102, Apr. 2010.

T. Bianchi, A. Piva, and M. Barni, "Composite signal representation for fast and storage- efficient processing of encrypted signals," IEEE Trans. Inform. Forensics Security, vol. 5, no. 1, p. 180-187, Feb. 2010.

X. Zhang, "Lossy compression and iterative reconstruction for encrypted reflection," IEEE Trans. Inform. Forensics Security, vol. 6, no.1, pp. 53-58, Feb. 2011.

Xinpeng Zhang “Separable Reversible Data Hiding in Encrypted Reflection” IEEE Trans. VOL. 7, no. 2, Apr 2012.


Full Text: PDF [FULL TEXT]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.