Skip to main content

Completely Separable Reversible Data Hiding with Increased Embedding Capacity Using Residue Number System

  • Conference paper
  • First Online:
Proceedings of the Second International Conference on Computer and Communication Technologies

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 380))

Abstract

Separable reversible data hiding techniques facilitate hiding and extraction of data in the encrypted domain. This paper proposes a novel method to embed binary data in an encrypted cover image that provides complete independence of data extraction and covers image recovery. This allows the content owner to retrieve the host signal without any distortion regardless of the embedded data and the data hider to perform lossless extraction of embedded message. The method also provides a high data-embedding capacity using Residue number system (RNS) technique and ensures that only an authorized person can access the contents of the plain image.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Nosrati, M., Karimi, R., Hariri, M.: Reversible data hiding: principles, techniques, and recent studies. World Appl. Program. 2(5), 349–353 (2012)

    Google Scholar 

  2. Shi, Y.Q.: Reversible data hiding. Cox, I.J., et al. (eds.): IWDW 2004, LNCS 3304, pp. 1–12 (2005)

    Google Scholar 

  3. Honsinger, C.W., Jones, P., Rabbani, M., Stoffel, J.C.: Lossless recovery of an original image containing embedded data. US Patent: 6,278,791 (2001)

    Google Scholar 

  4. Goljan, M., Fridrich, J., Du, R.: Distortion-free data embedding. In: Proceedings of 4th Information Hiding Workshop, pp. 27–41. Pittsburgh, April (2001)

    Google Scholar 

  5. Xuan, G., Zhu, J., Chen, J., Shi, Y.Q., Ni, Z., Su, W.: Distortionless data hiding based on integer wavelet transform. In: IEE J. Electron. Lett. 38(25), 1646–1648 (2002)

    Google Scholar 

  6. Xuan, G., Shi, Y.Q., Ni, Z.: Lossless data hiding using integer wavelet transform and spread spectrum. In: IEEE International Workshop on Multimedia Signal Processing, Siena, Sept 2004

    Google Scholar 

  7. G. Xuan, Shi, Y.Q., Ni, Z.: Reversible data hiding using integer wavelet transform and companding technique. In: Proceedings of IWDW04, Korea, Oct 2004

    Google Scholar 

  8. Ma, K., Zhang, W., Zhao, X., Yu, N., Li, F.: Reversible data hiding in encrypted images by reserving room before encryption. In: IEEE Trans. Inf. Forensics Secur. 8(3) 553–562 (2013)

    Google Scholar 

  9. Coatrieux, G., Lecornu, L., Sankur, B., Roux, C: A review of image watermarking applications in healthcare. In: 28th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, pp. 4691—4694. EMBS ’06, 30 Aug–3 Sept 2006

    Google Scholar 

  10. Zhang, X.: Reversible data hiding in encrypted image. IEEE Signal Process. Lett. 18(4), 255,258 (2011)

    Google Scholar 

  11. Zhang, X.: Separable reversible data hiding in encrypted image. In: IEEE Trans. Inf. Forensics Secur. 7(2), 826–832 (2012)

    Google Scholar 

  12. Fujiyoshi, M: Separable reversible data hiding in encrypted images with histogram permutation. In: IEEE International Conference on Multimedia and Expo Workshops (ICMEW), pp.1–4. 15–19 July (2013)

    Google Scholar 

  13. Grigoras, V., Grigoras, C.: Chaos encryption method based on large signal modulation in additive nonlinear discrete-time systems. In: Proceedings of the 5th WSEAS International Conference on Non-Linear Analysis, Non-Linear Systems and Chaos, Bucharest, 16–18 Oct 2006

    Google Scholar 

  14. Prasad, M., Sudha, K.L.: Chaos Image Encryption using Pixel shuffling. In: Wyld, D.C. et al. (eds) CCSEA 2011, CS & IT 02, pp. 169–179 (2011)

    Google Scholar 

  15. Garner, H.L: The residue number system. IRE Trans. Electron. Comput. EC-8(2), 140–147 (1959)

    Google Scholar 

  16. Banerjee, S., Chakraborty, S., Dey, N., Pal, A.K., Ray, R.: High payload watermarking using residue number system. Int. J. Image Gr. Signal Process. 3, 1–8 (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Geethu Mohan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer India

About this paper

Cite this paper

Mohan, G., Sikha, O.K. (2016). Completely Separable Reversible Data Hiding with Increased Embedding Capacity Using Residue Number System. In: Satapathy, S., Raju, K., Mandal, J., Bhateja, V. (eds) Proceedings of the Second International Conference on Computer and Communication Technologies. Advances in Intelligent Systems and Computing, vol 380. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2523-2_43

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2523-2_43

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2522-5

  • Online ISBN: 978-81-322-2523-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics