PERFORMANCE ANALYSIS OF REVERSIBLE DATA HIDING USING AES AND HISTOGRAM SHIFTING

Nidhi Antony
2016 International Journal of Advanced Research  
Reversible data hiding is a prominent field in secure communication. Its importance has been increasing nowadays due to lossless recovery of veiled data and cover image. Both veiled data and marked image can be extracted separately depending upon the availability of the keys. By means of a security key defined by user the content owner encrypt the cover image by 1D logistic map-chaotic based transposition algorithm. As an alternative to direct embedding of data into encrypted image the proposed
more » ... method encrypt the data using AES and hence provide twofold layer security. Utilizing another user defined data hiding key the data hider hides AES encrypted data into the encrypted image by shifting its histogram. An assortment of performance analysis is carried out in this paper. Out of different RDH algorithms we use histogram shifting for data embedding since it offers better capacity. Hence, the proposed method is a reliable and secure technique for reversible data hiding. Copy Right, IJAR, 2016, All rights reserved. ...................................................................................................................... Introduction:- With the progression in technology extent of secure communication has gained significance. Security of image and data plays fundamental role in the field of communication. Image and data can be transmitted within seconds to any part of the world. This expertise can be used by terrorists or illegitimate users to hack the off the record documents and classified information. Unpredicted exposure of classified data or images of military, government or any other organizations may lead to terrific impacts. It may splinter the whole security system [7] . In data hiding lossless recovery of cover image is not ensured rather prominence is on recovery of secret data without any loss. Reversible data hiding is a method in which the exact cover image can be retrieved without any loss after the furtive messages are extracted .It is widely used in the field of medical imaging, military, law and government, where distortion of original cover is not allowed. A variety of types of reversible data hiding techniques have been proposed by researchers. The main aim of this work is to carry out performance analysis of proposed method in [7] . It supports the property of lossless recovery after furtive data is extracted while protecting the cover image's secrecy [3] . Cover image is retrieved separately from marked image. In the content owner part cover image is encrypted by using 1D logistic map-chaotic based transposition algorithm [1] .
doi:10.21474/ijar01/2124 fatcat:ubydsfblsrhs3mgc4tfm2xf7q4