DocumentCode
678458
Title
Image encryption using separable reversible data hiding scheme
Author
Smitha, M. ; Jayanthi, V.E. ; Merlin, Aurore
fYear
2013
fDate
4-6 July 2013
Firstpage
1
Lastpage
6
Abstract
Image Encryption has a significant role in the field of cryptography. A new encryption scheme is introduced to protect an image from unauthorized access, in this scheme two separate keys are used for image encryption and data hiding with high degree of security. The content owner encrypts the original uncompressed image using an encryption key. The least significant bits (LSBs) of the encrypted image are compressed using a data hiding key to create space to embed an additional data. Run-Length Coding (RLC) and Haar Wavelet compression technique is employed to reduce the image size and facilitate faster transmission. Encrypted and decrypted sections, the quality of image retrieval and data extraction are achieved from RLC with their respective keys. In this scheme user can extract an image, data and both image and data based on the keys used.
Keywords
Haar transforms; cryptography; data compression; data encapsulation; image coding; image retrieval; wavelet transforms; Haar wavelet compression technique; LSB; RLC; cryptography; data extraction; decrypted sections; encrypted sections; encryption key; image encryption; image retrieval quality; least significant bits; run-length coding; separable reversible data hiding scheme; separate keys; unauthorized access; uncompressed image; Data mining; Encryption; Field programmable gate arrays; Image coding; Image retrieval; Receivers; Cryptography; Encryption; Haar Wavelet; Run Length Coding;
fLanguage
English
Publisher
ieee
Conference_Titel
Computing, Communications and Networking Technologies (ICCCNT),2013 Fourth International Conference on
Conference_Location
Tiruchengode
Print_ISBN
978-1-4799-3925-1
Type
conf
DOI
10.1109/ICCCNT.2013.6726486
Filename
6726486
Link To Document