REVERSIBLE DATA-HIDING SCHEMES FOR ENCRYPTED IMAGE: A REVIEW
Main Article Content
Abstract
In this paper, we present a review work on reversible data hiding in images which
deals with secure multimedia data and its authenticity. The purpose of preserving content and
tampering of image we need to embed some encrypted data image for security and privacy. In
the data hiding process, a content is encrypted in the original image using an encryption key.
There are entities primarily used in data hiding, image provider (content owner), data hider
and receiver they particularly shared a key for encryption. Using some encryption method
encrypt sample pixels to non-sample pixels, the data hider who may or may not knows about
actual image embed the secret data and then data extraction is done either from encrypted or
decrypted domain. Encrypted/hiding key play an important role since if a receiver has the data
hiding key, receiver can extract the data though receiver does not know the image content. If
the receiver has the encryption key, can decrypt the received data to obtain an image similar to
the original one. If the receiver has both the data hiding key and the encryption key, can
extract the additional data and recover the original content. In this paper we studies and
compared some data hiding scheme.
deals with secure multimedia data and its authenticity. The purpose of preserving content and
tampering of image we need to embed some encrypted data image for security and privacy. In
the data hiding process, a content is encrypted in the original image using an encryption key.
There are entities primarily used in data hiding, image provider (content owner), data hider
and receiver they particularly shared a key for encryption. Using some encryption method
encrypt sample pixels to non-sample pixels, the data hider who may or may not knows about
actual image embed the secret data and then data extraction is done either from encrypted or
decrypted domain. Encrypted/hiding key play an important role since if a receiver has the data
hiding key, receiver can extract the data though receiver does not know the image content. If
the receiver has the encryption key, can decrypt the received data to obtain an image similar to
the original one. If the receiver has both the data hiding key and the encryption key, can
extract the additional data and recover the original content. In this paper we studies and
compared some data hiding scheme.
Downloads
Download data is not yet available.
Article Details
Section
Articles
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.