Nowadays in digital world, safeguarding information is an important phase in transmitting messages and doing trades. The increasing growth of computer networks has caused a lot of changes in life style, occupational activities and organizations. Thus, data security has been one of the essential issues in this area. By connecting a local network to global network, outsiders are likely to have access to the organizations’ data. One of the most important challenges about propagating information on internet is to assure inaccessibility of unauthorized people to sensitive information. Various solutions including restricting the use of internet, encoding the data and establishing security have been suggested. To fulfill the security requirements for a safe transaction, operations such as encoding, hiding, etc. are used. Today information is of great importance either in military area or in commercial one. Hence one of the basic needs is to maintain information for transmitting or storing them. Having access to coded information is not possible for unauthorized people and only those having password can decode and use them. Encoding the information is based on the knowledge related to that. On the one hand, hiding is also one of the effective techniques for keeping information since host information is clear and a hidden message may not be discovered. In this study, a new technique is presented for hiding information in encoded images which minimized the error of the previous techniques. In addition, previous techniques have never pointed out to noisy environments and one of the advantages of the introduced technique was to eliminate noise.
Published in | American Journal of Networks and Communications (Volume 5, Issue 5) |
DOI | 10.11648/j.ajnc.20160505.14 |
Page(s) | 107-114 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2016. Published by Science Publishing Group |
Storage, Information Security, Encoding, Fractal
[1] | Busch, Christoph; Funk, Wolfgang; Wolthusen, Stephen: “Digital Watermarking From Concepts to Real-Time Video Applications”, IEEE Computer Graphics and Applications, January/February 1999, pp. 25-35. |
[2] | Li Yang, Du Sidan: “Research on Wavelet Domain Fractal Coding in Digital Watermarking, Multimedia and Expo”, 2005. ICME 2005. IEEE International Conference on, July 2005, p 61-64. |
[3] | Kutter, M.; Bhattacharjee, S. K.; Ebrahimi T.: “Towards Second Generation Watermarking Schemes”, 6th International Conference on Image Processing (ICIP’99), Kobe, Japan Vol 1 October 25-28 1999. |
[4] | Petitcolas, F., R. J. Anderson, M. G. Kuhn (1999). "Information Hiding –ASurvey." IEEE Special Issue on Protection of Multimedia Content., Vol. 87, No. 7, pp. 1062-1078. |
[5] | Hartung, F., M. Kutter (1999). "Multimedia Watermarking Techniques." Proceeding of IEEE., Vol. 87, No. 7, pp. 1079-1107. |
[6] | Cox, I., M. L. Miller (1997). "A Review of Watermarking and theImportance of Perceptual Modeling." SPIE Conference on Human Vision & Electronic Imaging., Vol. 3016, pp. 92-99. |
[7] | Wolfgang, R. B., C. I. Podilchuk, E. J. Delp (1999). "Perceptual Watermarks for Digital Images and Video." Proceedings of the IEEE., Vol. 87, No. 7, pp.1108-1126. |
[8] | J. Fridrich, M. Goljan, and R. Du, “Lossless data embedding—new paradigm in digital watermarking,” EURASIP J. Appl. Signal Processing, vol. 2002, no. 2, pp. 185–196, Feb. 2002. |
[9] | J. Tian, “Wavelet-based reversible watermarking for authentication,” in Security and Watermarking of Multimedia Contents IV—Proc. SPIE, E. J. Delp III and P. W. Wong, Eds., Jan. 2002, vol. 4675, pp. 679–690. |
[10] | J. M. Barton, “Method and Apparatus for Embedding AuthenticationInformation Within Digital Data,” U. S. Patent 5 646 997, 2007. |
[11] | C. W. Honsinger, P. W. Jones, M. Rabbani, and J. C. Stoffel, “Losslessrecovery of an original image containing embedded data,” U. S. Patent6 278 791, 2001. |
[12] | B. Macq, “Lossless multiresolution transform for image authenticating watermarking,” in Proc. EUSIPCO, Sept. 2000, pp. 533–536. 2010. |
[13] | J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. Circuits Syst. Video Technol. vol. 13, no. 8, pp. 890–896, Aug. 2003. |
[14] | Z. Ni, Y.-Q. Shi, N. Ansari, andW. Su, “Reversible data hiding,” IEEETrans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354–362, 2006. |
APA Style
Aida Laee, Masoud Masomei, Hamid Chegini. (2016). An Improved Data Hiding in Encrypted Images. American Journal of Networks and Communications, 5(5), 107-114. https://doi.org/10.11648/j.ajnc.20160505.14
ACS Style
Aida Laee; Masoud Masomei; Hamid Chegini. An Improved Data Hiding in Encrypted Images. Am. J. Netw. Commun. 2016, 5(5), 107-114. doi: 10.11648/j.ajnc.20160505.14
AMA Style
Aida Laee, Masoud Masomei, Hamid Chegini. An Improved Data Hiding in Encrypted Images. Am J Netw Commun. 2016;5(5):107-114. doi: 10.11648/j.ajnc.20160505.14
@article{10.11648/j.ajnc.20160505.14, author = {Aida Laee and Masoud Masomei and Hamid Chegini}, title = {An Improved Data Hiding in Encrypted Images}, journal = {American Journal of Networks and Communications}, volume = {5}, number = {5}, pages = {107-114}, doi = {10.11648/j.ajnc.20160505.14}, url = {https://doi.org/10.11648/j.ajnc.20160505.14}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ajnc.20160505.14}, abstract = {Nowadays in digital world, safeguarding information is an important phase in transmitting messages and doing trades. The increasing growth of computer networks has caused a lot of changes in life style, occupational activities and organizations. Thus, data security has been one of the essential issues in this area. By connecting a local network to global network, outsiders are likely to have access to the organizations’ data. One of the most important challenges about propagating information on internet is to assure inaccessibility of unauthorized people to sensitive information. Various solutions including restricting the use of internet, encoding the data and establishing security have been suggested. To fulfill the security requirements for a safe transaction, operations such as encoding, hiding, etc. are used. Today information is of great importance either in military area or in commercial one. Hence one of the basic needs is to maintain information for transmitting or storing them. Having access to coded information is not possible for unauthorized people and only those having password can decode and use them. Encoding the information is based on the knowledge related to that. On the one hand, hiding is also one of the effective techniques for keeping information since host information is clear and a hidden message may not be discovered. In this study, a new technique is presented for hiding information in encoded images which minimized the error of the previous techniques. In addition, previous techniques have never pointed out to noisy environments and one of the advantages of the introduced technique was to eliminate noise.}, year = {2016} }
TY - JOUR T1 - An Improved Data Hiding in Encrypted Images AU - Aida Laee AU - Masoud Masomei AU - Hamid Chegini Y1 - 2016/10/11 PY - 2016 N1 - https://doi.org/10.11648/j.ajnc.20160505.14 DO - 10.11648/j.ajnc.20160505.14 T2 - American Journal of Networks and Communications JF - American Journal of Networks and Communications JO - American Journal of Networks and Communications SP - 107 EP - 114 PB - Science Publishing Group SN - 2326-8964 UR - https://doi.org/10.11648/j.ajnc.20160505.14 AB - Nowadays in digital world, safeguarding information is an important phase in transmitting messages and doing trades. The increasing growth of computer networks has caused a lot of changes in life style, occupational activities and organizations. Thus, data security has been one of the essential issues in this area. By connecting a local network to global network, outsiders are likely to have access to the organizations’ data. One of the most important challenges about propagating information on internet is to assure inaccessibility of unauthorized people to sensitive information. Various solutions including restricting the use of internet, encoding the data and establishing security have been suggested. To fulfill the security requirements for a safe transaction, operations such as encoding, hiding, etc. are used. Today information is of great importance either in military area or in commercial one. Hence one of the basic needs is to maintain information for transmitting or storing them. Having access to coded information is not possible for unauthorized people and only those having password can decode and use them. Encoding the information is based on the knowledge related to that. On the one hand, hiding is also one of the effective techniques for keeping information since host information is clear and a hidden message may not be discovered. In this study, a new technique is presented for hiding information in encoded images which minimized the error of the previous techniques. In addition, previous techniques have never pointed out to noisy environments and one of the advantages of the introduced technique was to eliminate noise. VL - 5 IS - 5 ER -