Lossless and Reversible Data Hiding in Encrypted Images with Public Key Cryptography

Authors

  • Zaroon Ul Hakamin Faculty of Technology, Prince Mohammad Bin Fahd University, Saudi Arabia
  • Perseus Mary Faculty of Engineering, University of Arad, Romania
  • Kumar K Kirshnakanth Addis Ababa University, Ethiopia

Keywords:

cryptography, losses trasmission, PKC, public key encryption

Abstract

Image processing is one of the ever green field for computation and data intelligence under MATLAB environment. In this paper, the authors have discussed on reversible and reliable data hiding. The data is most preferred to be hidden under cover and through this paper, the system has successfully achieved an improved SNR and PSNR under an active transmission channel.

References

Erkin, Z., Piva, A., Katzenbeisser, S., Lagendijk, R. L., Shokrollahi, J., Neven, G., & Barni, M. (2007). Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing. EURASIP Journal on Information Security, 2007, 1-20.

Liu, W., Zeng, W., Dong, L., & Yao, Q. (2009). Efficient compression of encrypted grayscale images. IEEE Transactions on Image Processing, 19(4), 1097-1102.

Zhang, X., Feng, G., Ren, Y., & Qian, Z. (2012). Scalable coding of encrypted images. IEEE transactions on image processing, 21(6), 3108-3114.

Deng, M., Bianchi, T., Piva, A., & Preneel, B. (2009, September). An efficient buyer-seller watermarking protocol based on composite signal representation. In Proceedings of the 11th ACM Workshop on Multimedia and Security (pp. 9-18).

Ahmed, S. S. T., Thanuja, K., Guptha, N. S., & Narasimha, S. (2016, January). Telemedicine approach for remote patient monitoring system using smart phones with an economical hardware kit. In 2016 international conference on computing technologies and intelligent data engineering (ICCTIDE'16) (pp. 1-4). IEEE.

Lian, S., Liu, Z., Ren, Z., & Wang, H. (2007). Commutative encryption and watermarking in video compression. IEEE Transactions on Circuits and Systems for Video Technology, 17(6), 774-778.

Puech, W., Chaumont, M., & Strauss, O. (2008, March). A reversible data hiding method for encrypted images. In Security, forensics, steganography, and watermarking of multimedia contents X (Vol. 6819, pp. 534-542). SPIE.

Zhang, X., Long, J., Wang, Z., & Cheng, H. (2015). Lossless and reversible data hiding in encrypted images with public-key cryptography. IEEE Transactions on Circuits and Systems for Video Technology, 26(9), 1622-1631.

Zhang, W., Ma, K., & Yu, N. (2014). Reversibility improved data hiding in encrypted images. Signal Processing, 94, 118-127.

Kalker, T. O. N., & Willems, F. M. (2002, July). Capacity bounds and constructions for reversible data-hiding. In 2002 14th International Conference on Digital Signal Processing Proceedings. DSP 2002 (Cat. No. 02TH8628) (Vol. 1, pp. 71-76). IEEE..

Downloads

Published

2022-08-08

How to Cite

Zaroon Ul Hakamin, Perseus Mary, & Kumar K Kirshnakanth. (2022). Lossless and Reversible Data Hiding in Encrypted Images with Public Key Cryptography. International Journal of Human Computations & Intelligence, 1(1), 13–17. Retrieved from https://milestoneresearch.in/JOURNALS/index.php/IJHCI/article/view/18