Secure Data Hiding using Reversible Image Transformation
Farisa T S1, Anaha Ashokan2, Eldo P Elias3
1Farisa T S*, Computer Science and Engineering, Mar Athanasius College of Engineering, Kothamangalam, Ernakulam, India.
2Anaha Ashokan, Computer Science and Engineering, Mar Athanasius College of Engineering, Kothamangalam, Ernakulam, India.
3Prof. Eldo P Elias, Computer Science and Engineering, Mar Athanasius College of Engineering, Kothamangalam, Ernakulam, India.
Manuscript received on April 05, 2020. | Revised Manuscript received on April 25, 2020. | Manuscript published on April 30, 2020. | PP:132-138 | Volume-9 Issue-4, April 2020. | Retrieval Number: C6395029320/2020©BEIESP | DOI: 10.35940/ijeat.C6395.049420
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: In today’s era, the large amount of data’s are stored in cloud. But nowadays securely storing data to the cloud is an important task. But the unauthorized parties are tries to decrypt the data from the cloud. So, the data stored in cloud should be secure from any malicious activities. Based on these requests, we propose a framework named reversible data hiding (RDH). It mainly works on encrypted images based on reversible image transformation (RIT). The server insert data into the cloud. On that time, he will add some additional information for the protection of data. In the given framework, the original data can be embedded in another image named carrier image with equal size. So, the hacker tries to pullout the data, he will only get the carrier image. So we can accommodate more data’s into a single storage space. The method picks the data to be hide and a carrier image with equal size. The cover image is embedded into the original image based on the LSB insertion algorithm. i.e., the original data’s are dissolved into the carrier image using a secret hiding key. The cover image is encrypted using blow fish encryption algorithm. It includes normal RDH method and RDH with RIT. Using RIT, it gives high visual quality and security. The technique is mainly used in medical imagery, military imagery for reliable data storage.
Keywords: Carrier image, Original image, RDH, RIT