JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Design of Fluctuation Function to Improve BER Performance of Data Hiding in Encrypted Image
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Design of Fluctuation Function to Improve BER Performance of Data Hiding in Encrypted Image
Kim, Young-Hun; Lim, Dae-Woon; Kim, Young-Sik;
  PDF(new window)
 Abstract
Reversible data hiding is a technique to hide any data without affecting the original image. Zhang proposed the encryption of original image and a data hiding scheme in encrypted image. First, the encrypted image is decrypted and uses the fluctuation function which exploits the spatial correlation property of decrypted image to extract hidden data. In this paper, the new fluctuation function is proposed to reduce errors which arise from the process extracting hidden data and the performance is verified by simulation.
 Keywords
encrypted image;image recovery;reversible data hiding;fluctuation function;
 Language
Korean
 Cited by
1.
영역 분할을 이용한 변형된 스위칭 필터에 관한 연구,권세익;김남호;

한국통신학회논문지, 2016. vol.41. 10, pp.1284-1289 crossref(new window)
2.
암호화된 영상의 가역적 데이터 은닉을 위한 일반화된 섭동 함수 설계,김영훈;임대운;김영식;

한국통신학회논문지, 2016. vol.41. 11, pp.1329-1340 crossref(new window)
 References
1.
W. Stallings, Cryptography and Network Security: Principles and Practice. New Jersey: Pearson Education, 2003.

2.
M. Park, E. Cho, and T. T. Kwon, "Multi server password authenticated key exchange using attribute-based encryption," J. KICS, vol. 40, no. 8, pp. 1597-1605, Aug. 2015.

3.
J.-H. Kim, S.-K. Yoo, and S.-H. Lee, "Fully homomorphic encryption scheme without key switching," J. KICS, vol. 38, no. 5, pp. 428-433, May 2015.

4.
Fabien A. P. Petitcolas, Ross J. Anderson and Markus G. Kuhn "Information hiding-a survey," in Proc. IEEE, special issue on protection of multimedia content, May 1999. Invited paper.

5.
R. J. Anderson and F. A. P. Petitcolas. "On the limits of steganography," IEEE J. Sel. Areas on Commun., vol. 16, pp. 474-481, 1998. crossref(new window)

6.
J. Tian, "Reversible data embedding using a difference expansion," IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890-896, Aug. 2003. crossref(new window)

7.
M. U. Celik, G. Sharma, A. M. Tekalp, and E.Saber, "Lossless generalized-lsb data embedding," IEEE Trans. Image Process., vol. 14, no. 2, pp. 253-266, Feb. 2005. crossref(new window)

8.
Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, "Reversible data hiding," IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354-362, 2006. crossref(new window)

9.
L. Luo, Z. Chen, M. Chen, X. Zeng, and Z. Xiong, "Reversible image watermarking using interpolation technique," IEEE Trans. Inf. Forensics Secur., vol. 5, no. 1, pp. 187-193, 2010. crossref(new window)

10.
X. Zhang, "Reversible data hiding in encrypted image," IEEE Signal Processing Lett., vol. 18, no. 4, pp. 255-258, Apr. 2011. crossref(new window)

11.
W. Hong, T.-S. Chen, and H.-Y. Wu, "An improved reversible data hiding in encrypted images using side match," IEEE Signal Processing Lett., vol. 19, no. 4, pp. 199-202, Apr. 2012. crossref(new window)

12.
J. Fridirich, M. Goljan, and R Du, "Lossless data embedding for all image formats," SPIE Proc. photonics West, Electronic Imaging, Security and Watermarking of multimedia Contents, vol. 4675, pp. 572-583, 2002.

13.
Y. C. Li, C. M. Yeh, and C. C. Chang, "Data hiding based on the similarity between neighboring pixels with reversibility," Digital Signal Processing, vol. 20, pp. 1116-1128, 2010.

14.
P. Tsai, Y. C. Hu, and H. L. Yeh, "Reversible image hiding scheme using predictive coding and histogram shifting," Signal Processing, vol. 89, no. 6, pp. 1129-1143, 2009.

15.
W. L. Tai, C. M. Yeh, and C. C. Chang, "Reversible data hiding based on histogram modification of pixel differences," IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 6, pp. 906-910, Jun. 2009. crossref(new window)

16.
H. C. Wu, H. C. Wang, C. S. Tsai, and C. M. Wang, "Reversible image steganographic scheme via predictive coding," Displays, vol. 31, no. 1, pp. 35-43, Jan. 2010. crossref(new window)

17.
C.-C. Chang, C.-C. Lin, and Y.-H. Chen, "Reversible data-embedding scheme using differences between original and predicted pixel values," Inf. Secur., vol. 2, no. 2, pp. 35-46, 2008. crossref(new window)

18.
S. Lian, Z. Liu, Z. Ren, and H. Wang, "Commutative encryption and watermarking in video compression," IEEE Trans. Circuits Syst. Video Technol., vol. 17, no. 6, pp. 774-778, 2007. crossref(new window)

19.
Y.-S. Kim, C.-J. Ryu, and S.-J. Han, "Refined reversible data hiding scheme in encrypted image," in Proc. KIIT Summer Conf. 2011, pp. 78-82, May 2011.

20.
J.-H. Jeong, K.-J. Kang, Y.-S. Kim, and D.-W. Lim, "Reversible data hiding scheme using dynamic bit selection in encrypted image," in Proc. KIISC Int. Conf. 2012, pp. 56-59, Dec. 2012.

21.
Y.-S. Kim and D.-W. Lim, "Reversible data hiding scheme based on lattices," J. KMMS, vol. 16, no. 4, pp. 27-33, Dec. 2012.

22.
S.-H. Cho, D.-S. Kim, and K.-Y. Yoo, "Improved reversible data hiding scheme based on difference value of adjacent pixels," in Proc. KICS Int. Conf. Commun., pp. 205-206, Jeju Island, Korea, Jun. 2013.

23.
T.-S. Kim, M.-H. Jang, and S.-H. Kim, "Transmission methods using RS codes to improve spatial relationship of images in reversible data hiding systems," J. KICS, vol. 40, no. 8, pp. 1477-1484, Aug. 2015.