Title :
Image encryption using separable reversible data hiding scheme
Author :
Smitha, M. ; Jayanthi, V.E. ; Merlin, Aurore
Abstract :
Image Encryption has a significant role in the field of cryptography. A new encryption scheme is introduced to protect an image from unauthorized access, in this scheme two separate keys are used for image encryption and data hiding with high degree of security. The content owner encrypts the original uncompressed image using an encryption key. The least significant bits (LSBs) of the encrypted image are compressed using a data hiding key to create space to embed an additional data. Run-Length Coding (RLC) and Haar Wavelet compression technique is employed to reduce the image size and facilitate faster transmission. Encrypted and decrypted sections, the quality of image retrieval and data extraction are achieved from RLC with their respective keys. In this scheme user can extract an image, data and both image and data based on the keys used.
Keywords :
Haar transforms; cryptography; data compression; data encapsulation; image coding; image retrieval; wavelet transforms; Haar wavelet compression technique; LSB; RLC; cryptography; data extraction; decrypted sections; encrypted sections; encryption key; image encryption; image retrieval quality; least significant bits; run-length coding; separable reversible data hiding scheme; separate keys; unauthorized access; uncompressed image; Data mining; Encryption; Field programmable gate arrays; Image coding; Image retrieval; Receivers; Cryptography; Encryption; Haar Wavelet; Run Length Coding;
Conference_Titel :
Computing, Communications and Networking Technologies (ICCCNT),2013 Fourth International Conference on
Conference_Location :
Tiruchengode
Print_ISBN :
978-1-4799-3925-1
DOI :
10.1109/ICCCNT.2013.6726486