Skip to main content

Reversible Data Hiding by Utilizing AES Encryption and LZW Compression

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 34))

Abstract

The Increase of digital media transfer made the modification of the image very easy. So one major issue of proprietorship is raised, as copying and transferring are very soft practices. Here this paper has to resolve proprietorship problem by embedding the digital data with encryption. In this work, embedding of data is done applying the LZW algorithm. Then robustness is provided by using the AES algorithm. Finally by using spatial technique, embedding of digital data is done in encrypted image. Experiment is done on real dataset image. Evaluation parameter values show that proposed work has maintained the SNR and PSNR values with high robustness of the data.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Yadav, S., Tiwari, V., Tiwari, B.: Privacy preserving data mining with abridge time using vertical partition decision tree. In: Proceedings of the ACM Symposium on Women in Research 2016, pp. 158–164. ACM (2016)

    Google Scholar 

  2. Masry, M.A.: A Watermarking algorithm for map and chart images. In: Proceedings of the SPIE Conference on Security, Steganography and Watermarking of Multimedia Contents VII, pp. 495–504 (2005)

    Google Scholar 

  3. EL-Emam, N.N.: Hiding a large amount of data with high security using steganography algorithm. J. Comput. Sci., 223–232 (2007)

    Google Scholar 

  4. Chandramouli R., Memon. N.D.: Analysis of LSB based image steganography techniques. In: International Conference on Image Processing, vol. 3, pp. 1019–1022 IEEE (2001)

    Google Scholar 

  5. Khalilian, H., Bajic, I.V.: Video watermarking with empirical PCA-based decoding. IEEE Trans. Image Process. 22(12) (2013)

    Google Scholar 

  6. Chang, C.C., Chou, Y.C., Kieu, D.: An information hiding scheme using Sudoku. In: The 3rd International Conference on Innovative Computing Information and Control, Liaoning, Dalian (2008)

    Google Scholar 

  7. Piper, A., Safavi-Naini, R.: Scalable fragile watermarking for image authentication. IET Inf. Secur. (2012)

    Google Scholar 

  8. Korus, P., Dziech, A.: Efficient method for content reconstruction with self-embedding. IEEE Trans. Image Process. 22(3) (2013)

    Google Scholar 

  9. Chimanna, M.A., Kho, S.R.: Digital video watermarking techniques for secure multimedia creation and delivery. 3(2), 839–844 (2013)

    Google Scholar 

  10. Cao, X., Du, L., Wei, X., Meng, D., Guo, X.: High capacity reversible data hiding in encrypted images by patch-level sparse representation. IEEE Trans. Cybern. 46, 1132–1143 (2016)

    Google Scholar 

  11. Makbol, N.M., Khoo1, B.E., Rassem, T.H.: Block-based discrete wavelet transform singular value decomposition image watermarking scheme using human visual system characteristics. IET Image Process. 10(1), 34–52 (2016)

    Google Scholar 

  12. Brandão, S., Jorge, D.C.: Artificial neural networks applied to image steganography. IEEE Latin Am. Trans. 14(3) (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sanjay Sharma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Joshi, A.K., Sharma, S. (2018). Reversible Data Hiding by Utilizing AES Encryption and LZW Compression. In: Tiwari, B., Tiwari, V., Das, K., Mishra, D., Bansal, J. (eds) Proceedings of International Conference on Recent Advancement on Computer and Communication . Lecture Notes in Networks and Systems, vol 34. Springer, Singapore. https://doi.org/10.1007/978-981-10-8198-9_8

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8198-9_8

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8197-2

  • Online ISBN: 978-981-10-8198-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics