Reversible Data Concealing in Encrypted Images using Binary- Square Embedding
Narendrababu Thumati1, Kavitha Chaduvula2
1Narendrababu Thumati, Research Scholar, JNTUK, Kakinada (Andhra Pradesh), India.
2Kavitha Chaduvula, Professor & Head, Department of IT, GEC, Gudlavalleru (Andhra Pradesh), India.
Manuscript received on 15 September 2019 | Revised Manuscript received on 24 September 2019 | Manuscript Published on 10 October 2019 | PP: 866-869 | Volume-8 Issue-6S2, August 2019 | Retrieval Number: F12130886S219/19©BEIESP | DOI: 10.35940/ijeat.F1213.0886S219
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: The primary objective of this paper is to embed secret information using Binary-Square Embedding (BSE) technique in binary image. Using BSE, we intend to use an associate rule for Reversible Data Concealing in Encipher Images (BSE-RDCEI). This approach use BSE to implant binary bits in subordinate bit -planes of the first picture into its superior bitplanes such that the subordinate bit-planes be able to be kept back for concealing undisclosed information in resulting progression. BSE-RDCEI utilize bit- stage scrambling method when undisclosed information implant to unfold implant undisclosed information to the complete noticeable encipher image so it will forestall undisclosed information as of failure. A safety key style method is projected to reinforce the safety stage of BSE-RDCEI. Procedures of BSE-RDCEI be totally revertible. The key information & unique picture will exist remade in various ways. Examinations and correlations demonstrate that BSE-RDCEI has relate implanting rate about doubly bigger than the dynamic calculations, creates the checked decoded pictures with prime quality, and is in a situation to oppose the animal power, differential, commotion and data misfortune assaults.
Keywords: Binary-Square , Concealing, Encryption, Image, Scrambling.
Scope of the Article: Image Processing and Pattern Recognition