Separable reversible data hiding using Rc4 algorithm

In this paper, the problem of transmitting redundant data over an insecure, bandwidth-constrained communications channel is discussed. A content owner encrypts the original uncompressed image using an encryption key. Then, a data-hider may compress the least significant bits of the encrypted image using a data-hiding key to create a sparse space to accommodate some additional data. Using data hiding key the receiver can extract additional data even the receiver has no information about the original image content. Using the decryption key the receiver can extract data to obtain an image similar to the original one, but cannot extract the additional data. If the receiver has both the data-hiding key and the encryption key, the receiver can extract the additional data and the original imagewithout any loss.

[1]  Alessandro Neri,et al.  A commutative digital image watermarking and encryption method in the tree structured Haar transform domain , 2011, Signal Process. Image Commun..

[2]  A. Murat Tekalp,et al.  Reversible data hiding , 2002, Proceedings. International Conference on Image Processing.

[3]  Wenjun Zeng,et al.  Efficient Compression of Encrypted Grayscale Images , 2010, IEEE Transactions on Image Processing.

[4]  Xinpeng Zhang,et al.  Lossy Compression and Iterative Reconstruction for Encrypted Image , 2011, IEEE Transactions on Information Forensics and Security.

[5]  Vinod M. Prabhakaran,et al.  On compressing encrypted data , 2004, IEEE Transactions on Signal Processing.

[6]  Mauro Barni,et al.  Composite Signal Representation for Fast and Storage-Efficient Processing of Encrypted Signals , 2010, IEEE Transactions on Information Forensics and Security.

[7]  A. Bovik,et al.  A universal image quality index , 2002, IEEE Signal Processing Letters.

[8]  Shiguo Lian,et al.  Commutative Encryption and Watermarking in Video Compression , 2007, IEEE Transactions on Circuits and Systems for Video Technology.

[9]  J.E. Mazo,et al.  Digital communications , 1985, Proceedings of the IEEE.