Data Recovery from Encrypted Image and Recovering Image
Shiva Kumar R.Naik1, Kshitij Yadav2, Hariom Yadav3, Niha.C.Gowda4, Mounika5
1Mr. Shiva Kumar R. Naik, Assistant Professor, School of Computing & Information Technology, REVA University, Bangalore (Karnataka), India.
2Kshitij Yadav, B.Tech Student, School of Computing & Information Technology, REVA University, Bangalore (Karnataka), India.
3Hari Om yadav, B.Tech Student, School of Computing & Information Technology, REVA University, Bangalore (Karnataka), India.
4Niha C. Gowda, B.Tech Student, School of Computing & Information Technology, REVA University, Bangalore (Karnataka), India.
5Mounika, B.Tech Student, School of Computing & Information Technology, REVA University, Bangalore (Karnataka), India.
Manuscript received on 04 June 2019 | Revised Manuscript received on 12 June 2019 | Manuscript Published on 29 June 2019 | PP: 76-79 | Volume-8 Issue-5S, May 2019 | Retrieval Number: E10160585S19/19©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: This paper refers to the data hiding technique in an encrypted image and restoring image as it was before to its fullest. There are three bids of the framework to this process, which are a content owner, data hiding and recipient. The content owner encrypts the image with ciphertext making it an encrypted image. Data hider channelizes encrypted image into 3 different channels and adds each with additional bits in order to obtain marked encrypted image. At the recipient end, the noise from the image could be removed consuming the extraction key and the image obtained will be intact as original. Utilizing RDH_EI method, we not only receive secret information but also, the image is recovered using progressive recovery.
Keywords: Data Hiding, Information Hiding, Encrypting Images, Recovering Encrypted Image.
Scope of the Article: Image Security