IJMTES – AN EFFICIENT TECHNIQUE IN CRYPTOGRAPHY BASED ON RGB COLOR PRESERVING METHOD

INTERNATIONAL JOURNAL OF MODERN TRENDS IN ENGINEERING AND SCIENCE

Author’s Name : Anchal.A , Dr. S. A. Ladhake   

Volume 01 Issue o1  January 2014

ISSN no:  2348-3121

Page no: 26-31

Abstract— To maintaining the secrecy and confidentiality of images is a vibrant area of research, with two different approaches being followed, the first being encrypting the images through encryption algorithms using keys, the other approach involves hiding the data using data hiding algorithm to maintain the images secrecy.A content owner encrypts the original image using an encryption key, and a data-hider can embed additional data into the encrypted image using a data-hiding key though he does not know the original content. With an encrypted image containing additional data, a receiver may first decrypt it according to the encryption key, and then extract the embedded data and recover the original image according to the data-hiding key.

Keywords— Cover image, data hiding, data extraction,  Image encryption, Image decryption, Data recovery 

Reference

[1] Lini Abraham, Neenu Daniel ,” Secure Image Encryption Algorithms: A Review”, International Journal of Scientific & Technology Research volume 2, issue 4, April (2013), pp. 186-189.
[2] Mohanraj Arumugam and Rabindra Kumar Singh, “Data Hiding and Extraction Using a Novel Reversible Method for Encrypted Image” IJREAT International Journal of Research in Engineering & Advanced Technology, Vol. 1, Issue 1, March(2013), pp. 1-5.
[3] Kim.H.J, Sachnev.V, Shi.Y.Q, Nam.J, Choo.H.G,(2008). A novel difference expansion transform for reversible data embedding. IEEE Transaction Information Forensics and Security 3 (3), 456–465.
[4] M. Johnson, P. Ishwar, V. M. Prabhakaran, D. Schonberg, and K. Ramchandran, “On compressing encrypted data,” IEEE Trans. SignalProcess., Vol. 52, No. 10, pp. 2992-3006, Oct.(2004).
[5] W. Liu, W. Zeng, L. Dong, and Q. Yao, “Efficient compression of encrypted grayscale images,” IEEE Trans. Image Process., Vol. 19, No. 4, pp. 1097–1102, Apr(2010).
[6] X. Zhang, “Lossy compression and iterative reconstruction for encrypted image,” IEEE Trans. Inform. Forensics Security, Vol. 6, No. 1,pp. 53–58, Feb.(2011).
[7] X. Zhang, “Reversible data hiding in encrypted images,” IEEE Signal Process. Lett., Vol. 18, No. 4, pp. 255-258,(2011).
[8] X. Zhang, “Separable reversible data hiding in encrypted image,” IEEE Trans. Inf. Forensics Security, Vol 7, No. 2, pp. 826–832, Apr.(2012).
[9] Chang.C.C, Lu.T.C,(2006)”, A difference expansion oriented data hiding scheme for restoring the original host images” Journal of Systems and Software 79 (12), 1754-1766.
[10] W. Puech” Image Encryption and Compression for Medical Image Security” PROCEEDING OF IEEE Image Processing Theory, Tools & Applications.
[11] W. Puech, M. Chaumont and O. Strauss “A Reversible Data Hiding Method for Encrypted Images” Author manuscript, published in “IS&T/SPIE Electronic Imaging (2008)- Security, Forensics, Steganography, and Watermarking of Multimedia Contents, San Jose, CA : United States”.
[12] Saurabh Singh and Gaurav Agarwal,”Hiding image to video: A new approach of LSB replacement”, International Journal of Engineering Science and Technology Vol. 2(12), (2010), 6999-7003.
[13] Steganography on new generation of mobile phones with image and video processing abilities, as appeared Computational Cybernetics and Technical Informatics (ICCCCONTI),(2010) International Joint Conference on 27-29 May(2010) in Timisoara, Romania ISBN: 978-14244-7432-5.

Full Pdf Paper-Click Here