Reversible Data Hiding by Utilizing AES Encryption and LZW Compression

  • Akshay Kumar Joshi
  • Sanjay SharmaEmail author
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 34)


The Increase of digital media transfer made the modification of the image very easy. So one major issue of proprietorship is raised, as copying and transferring are very soft practices. Here this paper has to resolve proprietorship problem by embedding the digital data with encryption. In this work, embedding of data is done applying the LZW algorithm. Then robustness is provided by using the AES algorithm. Finally by using spatial technique, embedding of digital data is done in encrypted image. Experiment is done on real dataset image. Evaluation parameter values show that proposed work has maintained the SNR and PSNR values with high robustness of the data.


Color format Digital watermarking Frequency domain LSB 


  1. 1.
    Yadav, S., Tiwari, V., Tiwari, B.: Privacy preserving data mining with abridge time using vertical partition decision tree. In: Proceedings of the ACM Symposium on Women in Research 2016, pp. 158–164. ACM (2016)Google Scholar
  2. 2.
    Masry, M.A.: A Watermarking algorithm for map and chart images. In: Proceedings of the SPIE Conference on Security, Steganography and Watermarking of Multimedia Contents VII, pp. 495–504 (2005)Google Scholar
  3. 3.
    EL-Emam, N.N.: Hiding a large amount of data with high security using steganography algorithm. J. Comput. Sci., 223–232 (2007)Google Scholar
  4. 4.
    Chandramouli R., Memon. N.D.: Analysis of LSB based image steganography techniques. In: International Conference on Image Processing, vol. 3, pp. 1019–1022 IEEE (2001)Google Scholar
  5. 5.
    Khalilian, H., Bajic, I.V.: Video watermarking with empirical PCA-based decoding. IEEE Trans. Image Process. 22(12) (2013)Google Scholar
  6. 6.
    Chang, C.C., Chou, Y.C., Kieu, D.: An information hiding scheme using Sudoku. In: The 3rd International Conference on Innovative Computing Information and Control, Liaoning, Dalian (2008)Google Scholar
  7. 7.
    Piper, A., Safavi-Naini, R.: Scalable fragile watermarking for image authentication. IET Inf. Secur. (2012)Google Scholar
  8. 8.
    Korus, P., Dziech, A.: Efficient method for content reconstruction with self-embedding. IEEE Trans. Image Process. 22(3) (2013)Google Scholar
  9. 9.
    Chimanna, M.A., Kho, S.R.: Digital video watermarking techniques for secure multimedia creation and delivery. 3(2), 839–844 (2013)Google Scholar
  10. 10.
    Cao, X., Du, L., Wei, X., Meng, D., Guo, X.: High capacity reversible data hiding in encrypted images by patch-level sparse representation. IEEE Trans. Cybern. 46, 1132–1143 (2016)Google Scholar
  11. 11.
    Makbol, N.M., Khoo1, B.E., Rassem, T.H.: Block-based discrete wavelet transform singular value decomposition image watermarking scheme using human visual system characteristics. IET Image Process. 10(1), 34–52 (2016)Google Scholar
  12. 12.
    Brandão, S., Jorge, D.C.: Artificial neural networks applied to image steganography. IEEE Latin Am. Trans. 14(3) (2016)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Computer Science & EngineeringOIST, RGPVBhopalIndia

Personalised recommendations