Reversible data hiding technique for stream ciphered and wavelet compressed image

Reversible Data Hiding (RDH) Technique aims in recovering back the original content from the marked media. The original image is desirable in some applications. Thus, RDH plays a vital role in such situations. Securing the multimedia content can be achieved by performing encryption. Transmission time is further decreased by compressing such encrypted images. The process of compression reduces the amount of data required for representing the image. The content owner thus encrypts the original image using Stream Cipher process. The encrypted image is then used as the media for hiding secret image. The embedded image can then be compressed using wavelet compression. The receiver does all the three processes in reverse for getting back the original image and the secret image. Thus the compressed image is first decompressed. Second, the data hiding key is employed to extract the secret message. Third, the encryption key is employed to decrypt and get back the original content. Thus this paper focuses on achieving better security and improved transmission rate.

[1]  A. Murat Tekalp,et al.  Reversible data hiding , 2002, Proceedings. International Conference on Image Processing.

[2]  Sapna Sasidharan,et al.  A FAST PARTIAL IMAGE ENCRYPTION SCHEME WITH WAVELET TRANSFORM AND RC4 , 2011 .

[3]  Yun Q. Shi,et al.  Reversible Data Hiding , 2003, IWDW.

[4]  S. Imaculate Rosaline,et al.  A steganographic substitution technique using APPM for encrypted pixels , 2013, 2013 International Conference on Information Communication and Embedded Systems (ICICES).

[5]  Xinpeng Zhang,et al.  Reversible Data Hiding in Encrypted Image , 2011, IEEE Signal Processing Letters.

[6]  C. Rengarajaswamy,et al.  Separable extraction of concealed data and compressed image , 2013, 2013 International Conference on Emerging Trends in VLSI, Embedded System, Nano Electronics and Telecommunication System (ICEVENT).

[7]  Kamrul Hasan Talukder,et al.  Haar Wavelet Based Approach for Image Compression and Quality Assessment of Compressed Image , 2010, ArXiv.

[8]  B. S. Manjunath,et al.  Robust embedded data from wavelet coefficients , 1997, Electronic Imaging.

[9]  Ziad Alqadi,et al.  Analysis of Stream Cipher Security Algorithm , 2007 .