Abstract
The Increase of digital media transfer made the modification of the image very easy. So one major issue of proprietorship is raised, as copying and transferring are very soft practices. Here this paper has to resolve proprietorship problem by embedding the digital data with encryption. In this work, embedding of data is done applying the LZW algorithm. Then robustness is provided by using the AES algorithm. Finally by using spatial technique, embedding of digital data is done in encrypted image. Experiment is done on real dataset image. Evaluation parameter values show that proposed work has maintained the SNR and PSNR values with high robustness of the data.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Yadav, S., Tiwari, V., Tiwari, B.: Privacy preserving data mining with abridge time using vertical partition decision tree. In: Proceedings of the ACM Symposium on Women in Research 2016, pp. 158–164. ACM (2016)
Masry, M.A.: A Watermarking algorithm for map and chart images. In: Proceedings of the SPIE Conference on Security, Steganography and Watermarking of Multimedia Contents VII, pp. 495–504 (2005)
EL-Emam, N.N.: Hiding a large amount of data with high security using steganography algorithm. J. Comput. Sci., 223–232 (2007)
Chandramouli R., Memon. N.D.: Analysis of LSB based image steganography techniques. In: International Conference on Image Processing, vol. 3, pp. 1019–1022 IEEE (2001)
Khalilian, H., Bajic, I.V.: Video watermarking with empirical PCA-based decoding. IEEE Trans. Image Process. 22(12) (2013)
Chang, C.C., Chou, Y.C., Kieu, D.: An information hiding scheme using Sudoku. In: The 3rd International Conference on Innovative Computing Information and Control, Liaoning, Dalian (2008)
Piper, A., Safavi-Naini, R.: Scalable fragile watermarking for image authentication. IET Inf. Secur. (2012)
Korus, P., Dziech, A.: Efficient method for content reconstruction with self-embedding. IEEE Trans. Image Process. 22(3) (2013)
Chimanna, M.A., Kho, S.R.: Digital video watermarking techniques for secure multimedia creation and delivery. 3(2), 839–844 (2013)
Cao, X., Du, L., Wei, X., Meng, D., Guo, X.: High capacity reversible data hiding in encrypted images by patch-level sparse representation. IEEE Trans. Cybern. 46, 1132–1143 (2016)
Makbol, N.M., Khoo1, B.E., Rassem, T.H.: Block-based discrete wavelet transform singular value decomposition image watermarking scheme using human visual system characteristics. IET Image Process. 10(1), 34–52 (2016)
Brandão, S., Jorge, D.C.: Artificial neural networks applied to image steganography. IEEE Latin Am. Trans. 14(3) (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Joshi, A.K., Sharma, S. (2018). Reversible Data Hiding by Utilizing AES Encryption and LZW Compression. In: Tiwari, B., Tiwari, V., Das, K., Mishra, D., Bansal, J. (eds) Proceedings of International Conference on Recent Advancement on Computer and Communication . Lecture Notes in Networks and Systems, vol 34. Springer, Singapore. https://doi.org/10.1007/978-981-10-8198-9_8
Download citation
DOI: https://doi.org/10.1007/978-981-10-8198-9_8
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8197-2
Online ISBN: 978-981-10-8198-9
eBook Packages: EngineeringEngineering (R0)