Image Encryption Using Reversible Data Hiding by Reserving Room before Encryption
Shubhangi Kolhe1, Chaitrali Dhumal2, Pratik Kumar3, Achal Badgujar4
1Shubhangi Kolhe, Department of Information Technology, Pune University, India.
2Chaitrali Dhumal, Department of Information Technology, Pune University, India.
3Pratik Kumar, Department of Information Technology, Pune University, India.
4Achal Badgujar, Department of Information Technology, Pune University, India.
Manuscript received on March 09, 2015. | Revised Manuscript received on March 20, 2015. | Manuscript published on April 30, 2015. | PP: 53-55 | Volume-4 Issue-4, April 2015. | Retrieval Number: D3831044415/2013©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: This work proposes a novel scheme for reversible data hiding in encrypted images reserving room before encryption. In the first phase, a content owner performs the image partition and creates space for data accommodation and then encrypts the image using an encryption key. Then, a data-hider accommodates the data inside the image and hide it using data-hiding key to encrypt it. With an encrypted image containing additional data, if a receiver has the data-hiding key, he can extract the additional data though he does not know the image content. If the receiver has the encryption key, he can decrypt the received data to obtain an image similar to the original one, but cannot extract the additional data. If the receiver has both the data-hiding key and the encryption key, he can extract the additional data and recover the original content. The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. There are many transmission media to transfer the data to destination like e-mails; at the same time it is may be easier to modify and misuse the valuable information through hacking. So, in order to transfer the data securely to the destination without any modifications, there are many approaches like cryptography and steganography. This project deals with the image steganography as well as with the different security issues, general overview of cryptography approaches and about the different steganography algorithms like Least Significant Bit (LSB) algorithm and blow fish algorithms. It also compares those algorithms in means of speed, accuracy and security.
Keywords: Encrypted image containing additional data, Data-hiding key, Modifications, Cryptography and steganography, Least Significant Bit (LSB) algorithm.