American Journal of Networks and Communications

| Peer-Reviewed |

An Improved Data Hiding in Encrypted Images

Received: 08 September 2016    Accepted: 21 September 2016    Published: 11 October 2016
Views:       Downloads:

Share This Article

Abstract

Nowadays in digital world, safeguarding information is an important phase in transmitting messages and doing trades. The increasing growth of computer networks has caused a lot of changes in life style, occupational activities and organizations. Thus, data security has been one of the essential issues in this area. By connecting a local network to global network, outsiders are likely to have access to the organizations’ data. One of the most important challenges about propagating information on internet is to assure inaccessibility of unauthorized people to sensitive information. Various solutions including restricting the use of internet, encoding the data and establishing security have been suggested. To fulfill the security requirements for a safe transaction, operations such as encoding, hiding, etc. are used. Today information is of great importance either in military area or in commercial one. Hence one of the basic needs is to maintain information for transmitting or storing them. Having access to coded information is not possible for unauthorized people and only those having password can decode and use them. Encoding the information is based on the knowledge related to that. On the one hand, hiding is also one of the effective techniques for keeping information since host information is clear and a hidden message may not be discovered. In this study, a new technique is presented for hiding information in encoded images which minimized the error of the previous techniques. In addition, previous techniques have never pointed out to noisy environments and one of the advantages of the introduced technique was to eliminate noise.

DOI 10.11648/j.ajnc.20160505.14
Published in American Journal of Networks and Communications (Volume 5, Issue 5, October 2016)
Page(s) 107-114
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

Storage, Information Security, Encoding, Fractal

References
[1] Busch, Christoph; Funk, Wolfgang; Wolthusen, Stephen: “Digital Watermarking From Concepts to Real-Time Video Applications”, IEEE Computer Graphics and Applications, January/February 1999, pp. 25-35.
[2] Li Yang, Du Sidan: “Research on Wavelet Domain Fractal Coding in Digital Watermarking, Multimedia and Expo”, 2005. ICME 2005. IEEE International Conference on, July 2005, p 61-64.
[3] Kutter, M.; Bhattacharjee, S. K.; Ebrahimi T.: “Towards Second Generation Watermarking Schemes”, 6th International Conference on Image Processing (ICIP’99), Kobe, Japan Vol 1 October 25-28 1999.
[4] Petitcolas, F., R. J. Anderson, M. G. Kuhn (1999). "Information Hiding –ASurvey." IEEE Special Issue on Protection of Multimedia Content., Vol. 87, No. 7, pp. 1062-1078.
[5] Hartung, F., M. Kutter (1999). "Multimedia Watermarking Techniques." Proceeding of IEEE., Vol. 87, No. 7, pp. 1079-1107.
[6] Cox, I., M. L. Miller (1997). "A Review of Watermarking and theImportance of Perceptual Modeling." SPIE Conference on Human Vision & Electronic Imaging., Vol. 3016, pp. 92-99.
[7] Wolfgang, R. B., C. I. Podilchuk, E. J. Delp (1999). "Perceptual Watermarks for Digital Images and Video." Proceedings of the IEEE., Vol. 87, No. 7, pp.1108-1126.
[8] J. Fridrich, M. Goljan, and R. Du, “Lossless data embedding—new paradigm in digital watermarking,” EURASIP J. Appl. Signal Processing, vol. 2002, no. 2, pp. 185–196, Feb. 2002.
[9] J. Tian, “Wavelet-based reversible watermarking for authentication,” in Security and Watermarking of Multimedia Contents IV—Proc. SPIE, E. J. Delp III and P. W. Wong, Eds., Jan. 2002, vol. 4675, pp. 679–690.
[10] J. M. Barton, “Method and Apparatus for Embedding AuthenticationInformation Within Digital Data,” U. S. Patent 5 646 997, 2007.
[11] C. W. Honsinger, P. W. Jones, M. Rabbani, and J. C. Stoffel, “Losslessrecovery of an original image containing embedded data,” U. S. Patent6 278 791, 2001.
[12] B. Macq, “Lossless multiresolution transform for image authenticating watermarking,” in Proc. EUSIPCO, Sept. 2000, pp. 533–536. 2010.
[13] J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. Circuits Syst. Video Technol. vol. 13, no. 8, pp. 890–896, Aug. 2003.
[14] Z. Ni, Y.-Q. Shi, N. Ansari, andW. Su, “Reversible data hiding,” IEEETrans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354–362, 2006.
Author Information
  • Telecommunication, of Non-profit Institution of Higher Education, Aba, Abyek, Iran

  • Non-profit Institution of Higher Education, Aba, Abyek, Iran

  • Non-profit Institution of Higher Education, Aba, Abyek, Iran

Cite This Article
  • APA Style

    Aida Laee, Masoud Masomei, Hamid Chegini. (2016). An Improved Data Hiding in Encrypted Images. American Journal of Networks and Communications, 5(5), 107-114. https://doi.org/10.11648/j.ajnc.20160505.14

    Copy | Download

    ACS Style

    Aida Laee; Masoud Masomei; Hamid Chegini. An Improved Data Hiding in Encrypted Images. Am. J. Netw. Commun. 2016, 5(5), 107-114. doi: 10.11648/j.ajnc.20160505.14

    Copy | Download

    AMA Style

    Aida Laee, Masoud Masomei, Hamid Chegini. An Improved Data Hiding in Encrypted Images. Am J Netw Commun. 2016;5(5):107-114. doi: 10.11648/j.ajnc.20160505.14

    Copy | Download

  • @article{10.11648/j.ajnc.20160505.14,
      author = {Aida Laee and Masoud Masomei and Hamid Chegini},
      title = {An Improved Data Hiding in Encrypted Images},
      journal = {American Journal of Networks and Communications},
      volume = {5},
      number = {5},
      pages = {107-114},
      doi = {10.11648/j.ajnc.20160505.14},
      url = {https://doi.org/10.11648/j.ajnc.20160505.14},
      eprint = {https://download.sciencepg.com/pdf/10.11648.j.ajnc.20160505.14},
      abstract = {Nowadays in digital world, safeguarding information is an important phase in transmitting messages and doing trades. The increasing growth of computer networks has caused a lot of changes in life style, occupational activities and organizations. Thus, data security has been one of the essential issues in this area. By connecting a local network to global network, outsiders are likely to have access to the organizations’ data. One of the most important challenges about propagating information on internet is to assure inaccessibility of unauthorized people to sensitive information. Various solutions including restricting the use of internet, encoding the data and establishing security have been suggested. To fulfill the security requirements for a safe transaction, operations such as encoding, hiding, etc. are used. Today information is of great importance either in military area or in commercial one. Hence one of the basic needs is to maintain information for transmitting or storing them. Having access to coded information is not possible for unauthorized people and only those having password can decode and use them. Encoding the information is based on the knowledge related to that. On the one hand, hiding is also one of the effective techniques for keeping information since host information is clear and a hidden message may not be discovered. In this study, a new technique is presented for hiding information in encoded images which minimized the error of the previous techniques. In addition, previous techniques have never pointed out to noisy environments and one of the advantages of the introduced technique was to eliminate noise.},
     year = {2016}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - An Improved Data Hiding in Encrypted Images
    AU  - Aida Laee
    AU  - Masoud Masomei
    AU  - Hamid Chegini
    Y1  - 2016/10/11
    PY  - 2016
    N1  - https://doi.org/10.11648/j.ajnc.20160505.14
    DO  - 10.11648/j.ajnc.20160505.14
    T2  - American Journal of Networks and Communications
    JF  - American Journal of Networks and Communications
    JO  - American Journal of Networks and Communications
    SP  - 107
    EP  - 114
    PB  - Science Publishing Group
    SN  - 2326-8964
    UR  - https://doi.org/10.11648/j.ajnc.20160505.14
    AB  - Nowadays in digital world, safeguarding information is an important phase in transmitting messages and doing trades. The increasing growth of computer networks has caused a lot of changes in life style, occupational activities and organizations. Thus, data security has been one of the essential issues in this area. By connecting a local network to global network, outsiders are likely to have access to the organizations’ data. One of the most important challenges about propagating information on internet is to assure inaccessibility of unauthorized people to sensitive information. Various solutions including restricting the use of internet, encoding the data and establishing security have been suggested. To fulfill the security requirements for a safe transaction, operations such as encoding, hiding, etc. are used. Today information is of great importance either in military area or in commercial one. Hence one of the basic needs is to maintain information for transmitting or storing them. Having access to coded information is not possible for unauthorized people and only those having password can decode and use them. Encoding the information is based on the knowledge related to that. On the one hand, hiding is also one of the effective techniques for keeping information since host information is clear and a hidden message may not be discovered. In this study, a new technique is presented for hiding information in encoded images which minimized the error of the previous techniques. In addition, previous techniques have never pointed out to noisy environments and one of the advantages of the introduced technique was to eliminate noise.
    VL  - 5
    IS  - 5
    ER  - 

    Copy | Download

  • Sections