Improved Reversible Data Hiding Using Histogram Shifting Method

被引:0
作者
Mohan, Arun K. [1 ]
Saranya, M. R. [1 ]
Anusudha, K. [1 ]
机构
[1] Pondicherry Univ, Sch Engn & Technol, Dept Elect Engn, Pondicherry, India
来源
2015 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, INFORMATICS, COMMUNICATION AND ENERGY SYSTEMS (SPICES) | 2015年
关键词
Reversible data hiding; Image encryption; PSNR; Chaotic sequence; Logistic Map Function; Histogram shifting; Key generation; CRYPTANALYSIS; SECURITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A reversible data hiding (RDH) algorithm with improved security, which can reacquire the cover in separable manner from the marked stego-image is presented in this paper. In the content owner side cover image is encrypted by deploying user-defined security key derived-chaotic based transposition algorithm. Then the data hider conceals secret data into the encrypted image by perturbing its histogram, by utilizing another user defined data hiding key. At the receiver side, the recuperation of the cover can be implemented directly or indirectly which depends on shared key. Lower bound of Peak Signal to Noise Ratio (PSNR) for direct recuperation method is set to 48.13dB. This technique has improved security & achieved higher data hiding capacity than the existing methods.
引用
收藏
页数:5
相关论文
共 19 条
[1]  
Acharya Bibhudendra, 2008, 2008 1st International Conference on Emerging Trends in Engineering and Technology (ICETET), P77, DOI 10.1109/ICETET.2008.110
[2]  
Gonzalez Rafael C., DIGITAL IMAGE PROCES
[3]  
HiralRathod Mahendra Singh Sisodia, International Journal of Computer Technology and Electronics Engineering (IJCTEE), V1
[4]   Cryptanalysis of some multimedia encryption schemes [J].
Jakimoski, Goce ;
Subbalakshmi, K. P. .
IEEE TRANSACTIONS ON MULTIMEDIA, 2008, 10 (03) :330-338
[5]   Cryptanalysis of a data security protection scheme for VoIP [J].
Li, CQ ;
Li, S ;
Zhang, D ;
Chen, G .
IEE PROCEEDINGS-VISION IMAGE AND SIGNAL PROCESSING, 2006, 153 (01) :1-10
[6]   Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption [J].
Ma, Kede ;
Zhang, Weiming ;
Zhao, Xianfeng ;
Yu, Nenghai ;
Li, Fenghua .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (03) :553-562
[7]  
Mohan Arun K, 2014, INT C CONT COMP INF
[8]  
Nayak Chinmaya Kumar, 2011, INT J RES REV COMPUT, V2
[9]  
Nicole R., J. Name Stand. Abbrev.
[10]  
Schneier B., 2015, Applied Cryptography, VSecond