Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Implementing Novel Cryptography Technique in Image Encryption and Secure Data Hiding


Affiliations
1 Anna University, Madurai, India
     

   Subscribe/Renew Journal


This work proposes a Secure and authenticated discrete reversible data hiding in images deals with security and authentication. In the first phase, a content owner encrypts the original image using an encryption key. Then, a data hider may compress the least significant bits of the encrypted image using a data hiding key to create a sparse space to accommodate some additional data. With an encrypted image containing additional data, if a receiver has the data hiding key, receiver can extract the additional data though receiver does not know the image content. If the receiver has the encryption key, can decrypt the received data to obtain an image similar to the original one, but cannot extract the additional data. If the receiver has both the data hiding key and the encryption key, can extract the additional data and recover the original content without any error. In order to achieve authentication AES algorithm is being used. And also compare the efficiency using PSNR and MSE.


Keywords

Image Encryption, Data Embedding, Image Extraction, Reversible Data Hiding.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 284

PDF Views: 3




  • Implementing Novel Cryptography Technique in Image Encryption and Secure Data Hiding

Abstract Views: 284  |  PDF Views: 3

Authors

D. Sujatha
Anna University, Madurai, India

Abstract


This work proposes a Secure and authenticated discrete reversible data hiding in images deals with security and authentication. In the first phase, a content owner encrypts the original image using an encryption key. Then, a data hider may compress the least significant bits of the encrypted image using a data hiding key to create a sparse space to accommodate some additional data. With an encrypted image containing additional data, if a receiver has the data hiding key, receiver can extract the additional data though receiver does not know the image content. If the receiver has the encryption key, can decrypt the received data to obtain an image similar to the original one, but cannot extract the additional data. If the receiver has both the data hiding key and the encryption key, can extract the additional data and recover the original content without any error. In order to achieve authentication AES algorithm is being used. And also compare the efficiency using PSNR and MSE.


Keywords


Image Encryption, Data Embedding, Image Extraction, Reversible Data Hiding.