SlideShare a Scribd company logo
1 of 3
Download to read offline
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 12 80 - 82
______________________________________________________________________________________
80
IJRITCC | December 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Reversible Data Hiding Methods : A Survey
Ms. Mili Els Jose
Assistant Professor, Department of Computer science and Engineering
Viswajyothi College of Engg. And Tech.,Vazhakulam
Muvattupuzha ,India
miliej04@yahoo.co.in
Abstract—This paper presents a survey of various reversible data hiding methods. Data hiding is the process of hiding information in a cover
media . Most commonly used media for data hiding is image. But during the hiding and extraction of data there are chances for the distortion of
image. Reversible data hiding methods are used to solve this problem.
Keywords- Reversible Data Hiding, LSB substitution method ,Histogram Modification, Differential Expansion
__________________________________________________*****_________________________________________________
I. INTRODUCTION
Now a day’s security is treated as the most important
factor in the communication system. The two important
methods to give security to our data are cryptography and
data hiding.
Encryption is the process of converting information or
data into a code, especially to prevent unauthorized access.
This process converts plaintext content into unreadable
cipher text. Because of the data is in unreadable format, it
can easily got attention of hackers.
Data hiding is the process of hiding information in a
cover media during storing or transmission. The major
requirement for this is data invisibility. We can use various
Medias such as audio, video, image, text, and picture for
hiding information. Commonly used media for hiding
information is image. The receiver can extract the data from
the cover image. Data hiding can have applications in
military and medical systems. In medical systems data hiding
can be used to hide information about patients in their
medical documents. But there are chances for distortion of
cover images during the hiding and extraction of data. In the
area of military intelligence and medical systems, the
distortion of the cover images is not accepted. To solve this
problem Reversible Data Hiding can be used.
II. REVERSIBLE DATA HIDING
We can say that a data hiding method is reversible when
the cover image is recovered completely after the extraction
of the hidden data
The main requirements of RDH techniques are:
1. Minimize distortion and maximize data embedding
capacity
2. No errors in data and cover image after extraction
Steps of Reversible Data Hiding:
1. DataEmbedding: Hiding data inside the host image.
2. Data Extraction: extracting data from the host image.
Figure 1General Block Diagram of RDH
III. IMPORTANT METHODS OF RDH
A. LSB SUBSTITUTION METHOD:
One of the earliest data-embedding methods is the LSB
substitution method. It is a spatial domain data hiding
technique.In this method, the Least Significant bit of each or
some signal sample is replaced (over written) by a bit of the
data to be hidden. In a RGB image a pixel is represented
using 3 bytes usually representing R, G, and B. For LSB
encoding a bit of the R, G, and B can be used. If additional
capacity is required, two or more LSBs may be used. During
extraction, these bits are read in the same scanning order,
and payload data is reconstructed. LSB modification is a
simple technique with high-embedding capacity and small
embedding distortion.
Advantages [5]:
1. Chances for degradation of the original image are less.
2. More data/information can be stored in an image.
Disadvantages [5]:
1. It is less robust as the hidden data can be lost with
image manipulation.
2. The hidden data can be destroyed easily by simple
attacks
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 12 80 - 82
______________________________________________________________________________________
81
IJRITCC | December 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
B. LOSSLESS GENERALIZED-LSB DATA EMBEDDING
METHOD:
In [1] a generalization of the LSB-embedding method,
namely G-LSB, is employed used. In the embedding phase,
the lowest levels of the signal samples are replaced (over-
written) by the watermark payload data bit using a
quantization step followed by an addition. During
extraction, the watermark payload data bit is extracted by
simply reading lowest levels of the watermarked signal. G-
LSB embedding enables embedding of noninteger number
of bits in each signal sample
Advantages [1]:
1. High-embedding capacities
2. Complete recovery of the original host signal
3. Introduces only a small distortion between the host
and image bearing the embedded data.
Disadvantage [1]:
1. The capacity of the scheme depends on the
statistics of the host image.
C. DIFFERENTIAL EXPANSION METHOD:
Differential Expansion method is one of the most
popular methods for Reversible Data Hiding. In [3] Tian
introduced a DE technique, which discovers extra storage
space by using the redundancy in the image content. In [2]
Tian present a high capacity RDH method based on DE.
Data Embedding Phase [2]
This method divides the image into pair of pixels. For
each pixel pair the integer average and difference are
calculated. From various difference values changeable and
expandable difference values are identified using reversible
integer transform. Location maps of selected expandable
difference value are created. Selected difference values are
then converted into binary format and original LSB bits of
this difference values are collected. Then difference of each
changeable pixel group is expanded by keeping its average
value unchanged. Data embedding is done into the expanded
difference value by replacement, and finally an inverse
integer transform is applied.
Data Extraction Phase [2]
The data extraction process consists of five steps .First
we calculate the difference values. As in embedding
different pixels of the image and apply integer transform for
each pair. Then two disjoint sets are of difference value CH
and NC are created. CH contains all changeable difference
values and NC contains all non-changeable difference
values .In the third step LSBs of all difference values in CH,
are collected and form a binary bit stream .In the Fourth, the
location map is decoded by a JBIG2 decoder. The fifth step
is content authentication and original content restoration.
We apply the inverse integer transform to reconstruct a
restored image. Then the content is authenticated.
Advantages [2]:
1. This method is a high-capacity, high visual quality
reversible data-embedding method for digital
images.
2. This method can be applied to digital audio and
video.
Disadvantages [2]:
1. There is significant degradation of visual quality
due to bit replacement of grey scale pixels.
D. HISTOGRAM MODIFICATION METHOD:
Another promising strategy for RDH is histogram shift
(HS). In [4] Ni et al. presented a histogram based reversible
data hiding method in which the message is embedded into
the histogram bin. They used maximum and minimum
points to achieve low distortion, but with attendant low
capacity.
Data Embedding phase [4]
Generate histogram of the image. In the histogram find
the maximum point and minimum point. Assume that gray
scale value of maximum point is a and minimum point is b
and also a<b. Scan the image and identify the pixels with
gray scale values between a and b and increment the gray
scale values of that pixels by one i.e shift the histogram to
the right by 1 unit. The whole image is scanned once again
and once a pixel with gray scale value a is encountered
check the next bit in the to be embedded bit stream. If it is
one the gray scale value is incremented by 1.Otherwise
leave it as it is.
Data Extraction phase [4]
Assume that gray scale value of maximum point is a and
minimum point is b and also a<b. Scan the image and if a
pixel with gray scale value a+1 is encountered a bit 1 is
extracted. If a pixel with value a is encountered a bit 0 is
extracted.
Advantages [4]
1. This method can be applied to various types of
images.
2. The algorithm used with this method is simple and
the execution time is short.
Disadvantages [4]
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 12 80 - 82
______________________________________________________________________________________
82
IJRITCC | December 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
1. Capacity of embedding depends upon the number of
pixels which are associated with the peak point.
IV. CONCLUSION
Now a Days Reversible data hiding methods gets more
popularity in the area of data communication. The
reversibility of the carrier medium at the receiver side, after
the extraction of the secret data makes it more attractive. In
this paper different methods for reversible data hiding are
presented with advantages and disadvantages. All these
methods aim to reproducing image and secret data with
maximum accuracy.
REFERENCES
[1] Ahmet Murat Tekal,Eli Saber, Mehmet Utku Celik ,
Gaurav Sharma,”Lossless Generalized-LSB Data
Embedding”, IEEE Transactions On Image Processing,
Vol. 14, No. 2, February 2005
[2] J. Tian, “Reversible data embedding using a difference
expansion,” IEEE Trans. Circuits Syst. Video Technol.,
vol. 13, no. 8, pp. 890–896, 2003.
[3] J. Tian, “Reversible watermarking by difference
expansion,” in Proc.Workshop on Multimedia and
Security, J. Dittmann, J. Fridrich, and P.Wohlmacher,
Eds., Dec. 2002, pp. 19–22.
[4] Z. Ni, Y. Shi, N. Ansari, and S. Wei, “Reversible data
hiding,” IEEE Trans. Circuits Syst.Video Technol., vol.
16, no. 3, pp. 354–362,Mar. 2006.
[5] Mehdi Hussain and Mureed Hussain “ A Survey of
Image Steganography Techniques” International Journal
of Advanced Science and Technology Vol. 54,May,
2013, pp-113-124
[6] M. Awrangjeb and M. S. Kankanhalli, “Lossless
watermarking consideringthe human visual system,”
Lecture Notes in Computer Science, vol. 2939, pp. 581–
592, 2004.
[7] Goel, Arun Rana, and Stuti Manpreet Kaur. "A Review
of ComparisonTechniques of Image Steganography. "
Global Journal of Computer Science and Technology
13.4 (2013) .
[8] Morkel, Tayana, Jan HP Eloff, and Martin S. Olivier.
"An overview ofimage steganography." ISSA. 2005.

More Related Content

What's hot

OBJECT DETECTION, EXTRACTION AND CLASSIFICATION USING IMAGE PROCESSING TECHNIQUE
OBJECT DETECTION, EXTRACTION AND CLASSIFICATION USING IMAGE PROCESSING TECHNIQUEOBJECT DETECTION, EXTRACTION AND CLASSIFICATION USING IMAGE PROCESSING TECHNIQUE
OBJECT DETECTION, EXTRACTION AND CLASSIFICATION USING IMAGE PROCESSING TECHNIQUEJournal For Research
 
External data preprocessing for efficient sorting
External data preprocessing for efficient sortingExternal data preprocessing for efficient sorting
External data preprocessing for efficient sortingeSAT Publishing House
 
Comparative study of two methods for Handwritten Devanagari Numeral Recognition
Comparative study of two methods for Handwritten Devanagari Numeral RecognitionComparative study of two methods for Handwritten Devanagari Numeral Recognition
Comparative study of two methods for Handwritten Devanagari Numeral RecognitionIOSR Journals
 
Frequency Domain Approach of Image Steganography
Frequency Domain Approach of Image SteganographyFrequency Domain Approach of Image Steganography
Frequency Domain Approach of Image SteganographyAM Publications,India
 
SEGMENTATION OF LUNG GLANDULAR CELLS USING MULTIPLE COLOR SPACES
SEGMENTATION OF LUNG GLANDULAR CELLS USING MULTIPLE COLOR SPACESSEGMENTATION OF LUNG GLANDULAR CELLS USING MULTIPLE COLOR SPACES
SEGMENTATION OF LUNG GLANDULAR CELLS USING MULTIPLE COLOR SPACESIJCSEA Journal
 
Authenticate Aadhar Card Picture with Current Image using Content Based Image...
Authenticate Aadhar Card Picture with Current Image using Content Based Image...Authenticate Aadhar Card Picture with Current Image using Content Based Image...
Authenticate Aadhar Card Picture with Current Image using Content Based Image...ijtsrd
 
Importance of Dimensionality Reduction in Image Processing
Importance of Dimensionality Reduction in Image ProcessingImportance of Dimensionality Reduction in Image Processing
Importance of Dimensionality Reduction in Image Processingrahulmonikasharma
 
SCAF – AN EFFECTIVE APPROACH TO CLASSIFY SUBSPACE CLUSTERING ALGORITHMS
SCAF – AN EFFECTIVE APPROACH TO CLASSIFY SUBSPACE CLUSTERING ALGORITHMSSCAF – AN EFFECTIVE APPROACH TO CLASSIFY SUBSPACE CLUSTERING ALGORITHMS
SCAF – AN EFFECTIVE APPROACH TO CLASSIFY SUBSPACE CLUSTERING ALGORITHMSijdkp
 
Variance rover system
Variance rover systemVariance rover system
Variance rover systemeSAT Journals
 
Variance rover system web analytics tool using data
Variance rover system web analytics tool using dataVariance rover system web analytics tool using data
Variance rover system web analytics tool using dataeSAT Publishing House
 
Image type water meter character recognition based on embedded dsp
Image type water meter character recognition based on embedded dspImage type water meter character recognition based on embedded dsp
Image type water meter character recognition based on embedded dspcsandit
 
Enhancement and Segmentation of Historical Records
Enhancement and Segmentation of Historical RecordsEnhancement and Segmentation of Historical Records
Enhancement and Segmentation of Historical Recordscsandit
 

What's hot (16)

40120130406009
4012013040600940120130406009
40120130406009
 
OBJECT DETECTION, EXTRACTION AND CLASSIFICATION USING IMAGE PROCESSING TECHNIQUE
OBJECT DETECTION, EXTRACTION AND CLASSIFICATION USING IMAGE PROCESSING TECHNIQUEOBJECT DETECTION, EXTRACTION AND CLASSIFICATION USING IMAGE PROCESSING TECHNIQUE
OBJECT DETECTION, EXTRACTION AND CLASSIFICATION USING IMAGE PROCESSING TECHNIQUE
 
External data preprocessing for efficient sorting
External data preprocessing for efficient sortingExternal data preprocessing for efficient sorting
External data preprocessing for efficient sorting
 
Comparative study of two methods for Handwritten Devanagari Numeral Recognition
Comparative study of two methods for Handwritten Devanagari Numeral RecognitionComparative study of two methods for Handwritten Devanagari Numeral Recognition
Comparative study of two methods for Handwritten Devanagari Numeral Recognition
 
Frequency Domain Approach of Image Steganography
Frequency Domain Approach of Image SteganographyFrequency Domain Approach of Image Steganography
Frequency Domain Approach of Image Steganography
 
SEGMENTATION OF LUNG GLANDULAR CELLS USING MULTIPLE COLOR SPACES
SEGMENTATION OF LUNG GLANDULAR CELLS USING MULTIPLE COLOR SPACESSEGMENTATION OF LUNG GLANDULAR CELLS USING MULTIPLE COLOR SPACES
SEGMENTATION OF LUNG GLANDULAR CELLS USING MULTIPLE COLOR SPACES
 
Authenticate Aadhar Card Picture with Current Image using Content Based Image...
Authenticate Aadhar Card Picture with Current Image using Content Based Image...Authenticate Aadhar Card Picture with Current Image using Content Based Image...
Authenticate Aadhar Card Picture with Current Image using Content Based Image...
 
Computer Assisted and Contour Detectioin in Medical Imaging Using Fuzzy Logic
Computer Assisted and Contour Detectioin in Medical Imaging Using Fuzzy LogicComputer Assisted and Contour Detectioin in Medical Imaging Using Fuzzy Logic
Computer Assisted and Contour Detectioin in Medical Imaging Using Fuzzy Logic
 
Importance of Dimensionality Reduction in Image Processing
Importance of Dimensionality Reduction in Image ProcessingImportance of Dimensionality Reduction in Image Processing
Importance of Dimensionality Reduction in Image Processing
 
SCAF – AN EFFECTIVE APPROACH TO CLASSIFY SUBSPACE CLUSTERING ALGORITHMS
SCAF – AN EFFECTIVE APPROACH TO CLASSIFY SUBSPACE CLUSTERING ALGORITHMSSCAF – AN EFFECTIVE APPROACH TO CLASSIFY SUBSPACE CLUSTERING ALGORITHMS
SCAF – AN EFFECTIVE APPROACH TO CLASSIFY SUBSPACE CLUSTERING ALGORITHMS
 
B0343011014
B0343011014B0343011014
B0343011014
 
Variance rover system
Variance rover systemVariance rover system
Variance rover system
 
Variance rover system web analytics tool using data
Variance rover system web analytics tool using dataVariance rover system web analytics tool using data
Variance rover system web analytics tool using data
 
40120140504011
4012014050401140120140504011
40120140504011
 
Image type water meter character recognition based on embedded dsp
Image type water meter character recognition based on embedded dspImage type water meter character recognition based on embedded dsp
Image type water meter character recognition based on embedded dsp
 
Enhancement and Segmentation of Historical Records
Enhancement and Segmentation of Historical RecordsEnhancement and Segmentation of Historical Records
Enhancement and Segmentation of Historical Records
 

Similar to Reversible Data Hiding Methods : A Survey

Analysis and Comparison of various Methods for Text Detection from Images usi...
Analysis and Comparison of various Methods for Text Detection from Images usi...Analysis and Comparison of various Methods for Text Detection from Images usi...
Analysis and Comparison of various Methods for Text Detection from Images usi...rahulmonikasharma
 
Framework on Retrieval of Hypermedia Data using Data mining Technique
Framework on Retrieval of Hypermedia Data using Data mining TechniqueFramework on Retrieval of Hypermedia Data using Data mining Technique
Framework on Retrieval of Hypermedia Data using Data mining Techniquerahulmonikasharma
 
An enhanced difference pair mapping steganography method to improve embedding...
An enhanced difference pair mapping steganography method to improve embedding...An enhanced difference pair mapping steganography method to improve embedding...
An enhanced difference pair mapping steganography method to improve embedding...eSAT Publishing House
 
A Review on Reversible Data Hiding Scheme by Image Contrast Enhancement
A Review on Reversible Data Hiding Scheme by Image Contrast EnhancementA Review on Reversible Data Hiding Scheme by Image Contrast Enhancement
A Review on Reversible Data Hiding Scheme by Image Contrast EnhancementIJERA Editor
 
Authentic Patient Data and Optimization Process through Cryptographic Image o...
Authentic Patient Data and Optimization Process through Cryptographic Image o...Authentic Patient Data and Optimization Process through Cryptographic Image o...
Authentic Patient Data and Optimization Process through Cryptographic Image o...rahulmonikasharma
 
Authentic Patient Data and Optimization Process through Cryptographic Image o...
Authentic Patient Data and Optimization Process through Cryptographic Image o...Authentic Patient Data and Optimization Process through Cryptographic Image o...
Authentic Patient Data and Optimization Process through Cryptographic Image o...rahulmonikasharma
 
Object Detection using Deep Learning with Hierarchical Multi Swarm Optimization
Object Detection using Deep Learning with Hierarchical Multi Swarm OptimizationObject Detection using Deep Learning with Hierarchical Multi Swarm Optimization
Object Detection using Deep Learning with Hierarchical Multi Swarm Optimizationrahulmonikasharma
 
IRJET- Crowd Density Estimation using Image Processing
IRJET- Crowd Density Estimation using Image ProcessingIRJET- Crowd Density Estimation using Image Processing
IRJET- Crowd Density Estimation using Image ProcessingIRJET Journal
 
Blending of Images Using Discrete Wavelet Transform
Blending of Images Using Discrete Wavelet TransformBlending of Images Using Discrete Wavelet Transform
Blending of Images Using Discrete Wavelet Transformrahulmonikasharma
 
Automatic Attendance Using Face Recognition
Automatic Attendance Using Face RecognitionAutomatic Attendance Using Face Recognition
Automatic Attendance Using Face Recognitionrahulmonikasharma
 
Dft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of imagesDft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of imageseSAT Journals
 
Dft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of imagesDft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of imageseSAT Publishing House
 
IRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data HidingIRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data HidingIRJET Journal
 
A comparative case study on the various techniques of reversible data hiding
A comparative case study on the various techniques of reversible data hidingA comparative case study on the various techniques of reversible data hiding
A comparative case study on the various techniques of reversible data hidingIJLT EMAS
 
A comparison of image segmentation techniques, otsu and watershed for x ray i...
A comparison of image segmentation techniques, otsu and watershed for x ray i...A comparison of image segmentation techniques, otsu and watershed for x ray i...
A comparison of image segmentation techniques, otsu and watershed for x ray i...eSAT Journals
 
A secured data transmission system by reversible data hiding with scalable co...
A secured data transmission system by reversible data hiding with scalable co...A secured data transmission system by reversible data hiding with scalable co...
A secured data transmission system by reversible data hiding with scalable co...IAEME Publication
 
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET Journal
 
Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...
Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...
Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...IRJET Journal
 
Hybrid DCT-DWT Digital Image Steganography
Hybrid DCT-DWT Digital Image SteganographyHybrid DCT-DWT Digital Image Steganography
Hybrid DCT-DWT Digital Image SteganographyIRJET Journal
 

Similar to Reversible Data Hiding Methods : A Survey (20)

Analysis and Comparison of various Methods for Text Detection from Images usi...
Analysis and Comparison of various Methods for Text Detection from Images usi...Analysis and Comparison of various Methods for Text Detection from Images usi...
Analysis and Comparison of various Methods for Text Detection from Images usi...
 
Framework on Retrieval of Hypermedia Data using Data mining Technique
Framework on Retrieval of Hypermedia Data using Data mining TechniqueFramework on Retrieval of Hypermedia Data using Data mining Technique
Framework on Retrieval of Hypermedia Data using Data mining Technique
 
An enhanced difference pair mapping steganography method to improve embedding...
An enhanced difference pair mapping steganography method to improve embedding...An enhanced difference pair mapping steganography method to improve embedding...
An enhanced difference pair mapping steganography method to improve embedding...
 
A Review on Reversible Data Hiding Scheme by Image Contrast Enhancement
A Review on Reversible Data Hiding Scheme by Image Contrast EnhancementA Review on Reversible Data Hiding Scheme by Image Contrast Enhancement
A Review on Reversible Data Hiding Scheme by Image Contrast Enhancement
 
Authentic Patient Data and Optimization Process through Cryptographic Image o...
Authentic Patient Data and Optimization Process through Cryptographic Image o...Authentic Patient Data and Optimization Process through Cryptographic Image o...
Authentic Patient Data and Optimization Process through Cryptographic Image o...
 
Authentic Patient Data and Optimization Process through Cryptographic Image o...
Authentic Patient Data and Optimization Process through Cryptographic Image o...Authentic Patient Data and Optimization Process through Cryptographic Image o...
Authentic Patient Data and Optimization Process through Cryptographic Image o...
 
Object Detection using Deep Learning with Hierarchical Multi Swarm Optimization
Object Detection using Deep Learning with Hierarchical Multi Swarm OptimizationObject Detection using Deep Learning with Hierarchical Multi Swarm Optimization
Object Detection using Deep Learning with Hierarchical Multi Swarm Optimization
 
IRJET- Crowd Density Estimation using Image Processing
IRJET- Crowd Density Estimation using Image ProcessingIRJET- Crowd Density Estimation using Image Processing
IRJET- Crowd Density Estimation using Image Processing
 
Blending of Images Using Discrete Wavelet Transform
Blending of Images Using Discrete Wavelet TransformBlending of Images Using Discrete Wavelet Transform
Blending of Images Using Discrete Wavelet Transform
 
Automatic Attendance Using Face Recognition
Automatic Attendance Using Face RecognitionAutomatic Attendance Using Face Recognition
Automatic Attendance Using Face Recognition
 
Dft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of imagesDft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of images
 
Dft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of imagesDft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of images
 
IRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data HidingIRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data Hiding
 
A comparative case study on the various techniques of reversible data hiding
A comparative case study on the various techniques of reversible data hidingA comparative case study on the various techniques of reversible data hiding
A comparative case study on the various techniques of reversible data hiding
 
Ijetcas14 527
Ijetcas14 527Ijetcas14 527
Ijetcas14 527
 
A comparison of image segmentation techniques, otsu and watershed for x ray i...
A comparison of image segmentation techniques, otsu and watershed for x ray i...A comparison of image segmentation techniques, otsu and watershed for x ray i...
A comparison of image segmentation techniques, otsu and watershed for x ray i...
 
A secured data transmission system by reversible data hiding with scalable co...
A secured data transmission system by reversible data hiding with scalable co...A secured data transmission system by reversible data hiding with scalable co...
A secured data transmission system by reversible data hiding with scalable co...
 
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
 
Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...
Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...
Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...
 
Hybrid DCT-DWT Digital Image Steganography
Hybrid DCT-DWT Digital Image SteganographyHybrid DCT-DWT Digital Image Steganography
Hybrid DCT-DWT Digital Image Steganography
 

More from rahulmonikasharma

Data Mining Concepts - A survey paper
Data Mining Concepts - A survey paperData Mining Concepts - A survey paper
Data Mining Concepts - A survey paperrahulmonikasharma
 
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...rahulmonikasharma
 
Considering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP FrameworkConsidering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP Frameworkrahulmonikasharma
 
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication SystemsA New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systemsrahulmonikasharma
 
Broadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A SurveyBroadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A Surveyrahulmonikasharma
 
Sybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANETSybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANETrahulmonikasharma
 
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine FormulaA Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine Formularahulmonikasharma
 
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...rahulmonikasharma
 
Quality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry PiQuality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry Pirahulmonikasharma
 
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...rahulmonikasharma
 
DC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide NanoparticlesDC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide Nanoparticlesrahulmonikasharma
 
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMA Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMrahulmonikasharma
 
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy MonitoringIOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoringrahulmonikasharma
 
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...rahulmonikasharma
 
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...rahulmonikasharma
 
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM SystemAlamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM Systemrahulmonikasharma
 
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault DiagnosisEmpirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosisrahulmonikasharma
 
Short Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA TechniqueShort Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA Techniquerahulmonikasharma
 
Impact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line CouplerImpact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line Couplerrahulmonikasharma
 
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction MotorDesign Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction Motorrahulmonikasharma
 

More from rahulmonikasharma (20)

Data Mining Concepts - A survey paper
Data Mining Concepts - A survey paperData Mining Concepts - A survey paper
Data Mining Concepts - A survey paper
 
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
 
Considering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP FrameworkConsidering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP Framework
 
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication SystemsA New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
 
Broadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A SurveyBroadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A Survey
 
Sybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANETSybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANET
 
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine FormulaA Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
 
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
 
Quality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry PiQuality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry Pi
 
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
 
DC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide NanoparticlesDC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide Nanoparticles
 
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMA Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
 
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy MonitoringIOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
 
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
 
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
 
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM SystemAlamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
 
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault DiagnosisEmpirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
 
Short Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA TechniqueShort Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA Technique
 
Impact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line CouplerImpact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line Coupler
 
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction MotorDesign Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
 

Recently uploaded

Circuit Breakers for Engineering Students
Circuit Breakers for Engineering StudentsCircuit Breakers for Engineering Students
Circuit Breakers for Engineering Studentskannan348865
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfJNTUA
 
一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样
一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样
一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样A
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...archanaece3
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...josephjonse
 
Dynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxDynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxMustafa Ahmed
 
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...Amil baba
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxMustafa Ahmed
 
Presentation on Slab, Beam, Column, and Foundation/Footing
Presentation on Slab,  Beam, Column, and Foundation/FootingPresentation on Slab,  Beam, Column, and Foundation/Footing
Presentation on Slab, Beam, Column, and Foundation/FootingEr. Suman Jyoti
 
Artificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfArtificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfKira Dess
 
Artificial Intelligence in due diligence
Artificial Intelligence in due diligenceArtificial Intelligence in due diligence
Artificial Intelligence in due diligencemahaffeycheryld
 
Adsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptAdsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptjigup7320
 
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisSeismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisDr.Costas Sachpazis
 
Working Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdfWorking Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdfSkNahidulIslamShrabo
 
handbook on reinforce concrete and detailing
handbook on reinforce concrete and detailinghandbook on reinforce concrete and detailing
handbook on reinforce concrete and detailingAshishSingh1301
 
Geometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdfGeometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdfJNTUA
 
Autodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxAutodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxMustafa Ahmed
 

Recently uploaded (20)

Circuit Breakers for Engineering Students
Circuit Breakers for Engineering StudentsCircuit Breakers for Engineering Students
Circuit Breakers for Engineering Students
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
 
一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样
一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样
一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
Dynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxDynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptx
 
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
Presentation on Slab, Beam, Column, and Foundation/Footing
Presentation on Slab,  Beam, Column, and Foundation/FootingPresentation on Slab,  Beam, Column, and Foundation/Footing
Presentation on Slab, Beam, Column, and Foundation/Footing
 
Artificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfArtificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdf
 
Artificial Intelligence in due diligence
Artificial Intelligence in due diligenceArtificial Intelligence in due diligence
Artificial Intelligence in due diligence
 
Adsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptAdsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) ppt
 
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisSeismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
 
Working Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdfWorking Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdf
 
handbook on reinforce concrete and detailing
handbook on reinforce concrete and detailinghandbook on reinforce concrete and detailing
handbook on reinforce concrete and detailing
 
Geometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdfGeometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdf
 
Autodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxAutodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptx
 

Reversible Data Hiding Methods : A Survey

  • 1. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 12 80 - 82 ______________________________________________________________________________________ 80 IJRITCC | December 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Reversible Data Hiding Methods : A Survey Ms. Mili Els Jose Assistant Professor, Department of Computer science and Engineering Viswajyothi College of Engg. And Tech.,Vazhakulam Muvattupuzha ,India miliej04@yahoo.co.in Abstract—This paper presents a survey of various reversible data hiding methods. Data hiding is the process of hiding information in a cover media . Most commonly used media for data hiding is image. But during the hiding and extraction of data there are chances for the distortion of image. Reversible data hiding methods are used to solve this problem. Keywords- Reversible Data Hiding, LSB substitution method ,Histogram Modification, Differential Expansion __________________________________________________*****_________________________________________________ I. INTRODUCTION Now a day’s security is treated as the most important factor in the communication system. The two important methods to give security to our data are cryptography and data hiding. Encryption is the process of converting information or data into a code, especially to prevent unauthorized access. This process converts plaintext content into unreadable cipher text. Because of the data is in unreadable format, it can easily got attention of hackers. Data hiding is the process of hiding information in a cover media during storing or transmission. The major requirement for this is data invisibility. We can use various Medias such as audio, video, image, text, and picture for hiding information. Commonly used media for hiding information is image. The receiver can extract the data from the cover image. Data hiding can have applications in military and medical systems. In medical systems data hiding can be used to hide information about patients in their medical documents. But there are chances for distortion of cover images during the hiding and extraction of data. In the area of military intelligence and medical systems, the distortion of the cover images is not accepted. To solve this problem Reversible Data Hiding can be used. II. REVERSIBLE DATA HIDING We can say that a data hiding method is reversible when the cover image is recovered completely after the extraction of the hidden data The main requirements of RDH techniques are: 1. Minimize distortion and maximize data embedding capacity 2. No errors in data and cover image after extraction Steps of Reversible Data Hiding: 1. DataEmbedding: Hiding data inside the host image. 2. Data Extraction: extracting data from the host image. Figure 1General Block Diagram of RDH III. IMPORTANT METHODS OF RDH A. LSB SUBSTITUTION METHOD: One of the earliest data-embedding methods is the LSB substitution method. It is a spatial domain data hiding technique.In this method, the Least Significant bit of each or some signal sample is replaced (over written) by a bit of the data to be hidden. In a RGB image a pixel is represented using 3 bytes usually representing R, G, and B. For LSB encoding a bit of the R, G, and B can be used. If additional capacity is required, two or more LSBs may be used. During extraction, these bits are read in the same scanning order, and payload data is reconstructed. LSB modification is a simple technique with high-embedding capacity and small embedding distortion. Advantages [5]: 1. Chances for degradation of the original image are less. 2. More data/information can be stored in an image. Disadvantages [5]: 1. It is less robust as the hidden data can be lost with image manipulation. 2. The hidden data can be destroyed easily by simple attacks
  • 2. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 12 80 - 82 ______________________________________________________________________________________ 81 IJRITCC | December 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ B. LOSSLESS GENERALIZED-LSB DATA EMBEDDING METHOD: In [1] a generalization of the LSB-embedding method, namely G-LSB, is employed used. In the embedding phase, the lowest levels of the signal samples are replaced (over- written) by the watermark payload data bit using a quantization step followed by an addition. During extraction, the watermark payload data bit is extracted by simply reading lowest levels of the watermarked signal. G- LSB embedding enables embedding of noninteger number of bits in each signal sample Advantages [1]: 1. High-embedding capacities 2. Complete recovery of the original host signal 3. Introduces only a small distortion between the host and image bearing the embedded data. Disadvantage [1]: 1. The capacity of the scheme depends on the statistics of the host image. C. DIFFERENTIAL EXPANSION METHOD: Differential Expansion method is one of the most popular methods for Reversible Data Hiding. In [3] Tian introduced a DE technique, which discovers extra storage space by using the redundancy in the image content. In [2] Tian present a high capacity RDH method based on DE. Data Embedding Phase [2] This method divides the image into pair of pixels. For each pixel pair the integer average and difference are calculated. From various difference values changeable and expandable difference values are identified using reversible integer transform. Location maps of selected expandable difference value are created. Selected difference values are then converted into binary format and original LSB bits of this difference values are collected. Then difference of each changeable pixel group is expanded by keeping its average value unchanged. Data embedding is done into the expanded difference value by replacement, and finally an inverse integer transform is applied. Data Extraction Phase [2] The data extraction process consists of five steps .First we calculate the difference values. As in embedding different pixels of the image and apply integer transform for each pair. Then two disjoint sets are of difference value CH and NC are created. CH contains all changeable difference values and NC contains all non-changeable difference values .In the third step LSBs of all difference values in CH, are collected and form a binary bit stream .In the Fourth, the location map is decoded by a JBIG2 decoder. The fifth step is content authentication and original content restoration. We apply the inverse integer transform to reconstruct a restored image. Then the content is authenticated. Advantages [2]: 1. This method is a high-capacity, high visual quality reversible data-embedding method for digital images. 2. This method can be applied to digital audio and video. Disadvantages [2]: 1. There is significant degradation of visual quality due to bit replacement of grey scale pixels. D. HISTOGRAM MODIFICATION METHOD: Another promising strategy for RDH is histogram shift (HS). In [4] Ni et al. presented a histogram based reversible data hiding method in which the message is embedded into the histogram bin. They used maximum and minimum points to achieve low distortion, but with attendant low capacity. Data Embedding phase [4] Generate histogram of the image. In the histogram find the maximum point and minimum point. Assume that gray scale value of maximum point is a and minimum point is b and also a<b. Scan the image and identify the pixels with gray scale values between a and b and increment the gray scale values of that pixels by one i.e shift the histogram to the right by 1 unit. The whole image is scanned once again and once a pixel with gray scale value a is encountered check the next bit in the to be embedded bit stream. If it is one the gray scale value is incremented by 1.Otherwise leave it as it is. Data Extraction phase [4] Assume that gray scale value of maximum point is a and minimum point is b and also a<b. Scan the image and if a pixel with gray scale value a+1 is encountered a bit 1 is extracted. If a pixel with value a is encountered a bit 0 is extracted. Advantages [4] 1. This method can be applied to various types of images. 2. The algorithm used with this method is simple and the execution time is short. Disadvantages [4]
  • 3. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 12 80 - 82 ______________________________________________________________________________________ 82 IJRITCC | December 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ 1. Capacity of embedding depends upon the number of pixels which are associated with the peak point. IV. CONCLUSION Now a Days Reversible data hiding methods gets more popularity in the area of data communication. The reversibility of the carrier medium at the receiver side, after the extraction of the secret data makes it more attractive. In this paper different methods for reversible data hiding are presented with advantages and disadvantages. All these methods aim to reproducing image and secret data with maximum accuracy. REFERENCES [1] Ahmet Murat Tekal,Eli Saber, Mehmet Utku Celik , Gaurav Sharma,”Lossless Generalized-LSB Data Embedding”, IEEE Transactions On Image Processing, Vol. 14, No. 2, February 2005 [2] J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896, 2003. [3] J. Tian, “Reversible watermarking by difference expansion,” in Proc.Workshop on Multimedia and Security, J. Dittmann, J. Fridrich, and P.Wohlmacher, Eds., Dec. 2002, pp. 19–22. [4] Z. Ni, Y. Shi, N. Ansari, and S. Wei, “Reversible data hiding,” IEEE Trans. Circuits Syst.Video Technol., vol. 16, no. 3, pp. 354–362,Mar. 2006. [5] Mehdi Hussain and Mureed Hussain “ A Survey of Image Steganography Techniques” International Journal of Advanced Science and Technology Vol. 54,May, 2013, pp-113-124 [6] M. Awrangjeb and M. S. Kankanhalli, “Lossless watermarking consideringthe human visual system,” Lecture Notes in Computer Science, vol. 2939, pp. 581– 592, 2004. [7] Goel, Arun Rana, and Stuti Manpreet Kaur. "A Review of ComparisonTechniques of Image Steganography. " Global Journal of Computer Science and Technology 13.4 (2013) . [8] Morkel, Tayana, Jan HP Eloff, and Martin S. Olivier. "An overview ofimage steganography." ISSA. 2005.