Data Hiding Technique

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 5403 Experts worldwide ranked by ideXlab platform

Shabir A Parah - One of the best experts on this subject based on the ideXlab platform.

  • Hiding in encrypted images: a three tier security Data Hiding Technique
    Multidimensional Systems and Signal Processing, 2017
    Co-Authors: Shabir A Parah, Javaid A Sheikh, Umer I. Assad, Ghulam M. Bhat
    Abstract:

    This paper presents a new crypto domain Data Hiding Technique based on Intermediate Significant Bit Plane Embedding (ISBPE). The cover image is encrypted; the information to be secured is scrambled, and then embedded in the Intermediate Significant Bit (ISB) planes of encrypted cover image, at the locations determined by a Pseudorandom Address Vector (PAV). The pseudorandom embedding of the scrambled Data in the ISB planes of encrypted image results in a three tier security of the Data to be secured. The ISBPE embedding results in an important advantage that the proposed scheme becomes completely robust to commonly employed attack of Least Significant Bit (LSB) removal/replacement. A novel concept of embedding a very small size fragile watermark in addition to the secret information has been used which facilitates early tamper detection. This feature could save crucial processor time in critical situations of national security issues/warfare etc. Experimental results show that the proposed scheme is more robust to various signal processing attacks like Joint Picture Expert Group compression, Additive White Gaussian Noise and ‘salt and pepper’ noise as compared to conventional LSB based embedding Techniques. Comparison results with some well-known Techniques show that besides providing high degree of security and robustness to various malicious attacks the proposed Technique is capable of embedding a fairly large amount of secret Data in the host image while maintaining a good stego-image quality.

  • A New Reversible and high capacity Data Hiding Technique for E-healthcare applications
    Multimedia Tools and Applications, 2017
    Co-Authors: Shabir A Parah, Javaid A Sheikh, Farhana Ahad, Nazir A. Loan, G M Bhat
    Abstract:

    A high capacity and reversible Data Hiding Technique capable of tamper detection and localisation of medical images has been proposed in this paper. Image interpolation has been used to scale up the original image to obtain the cover image. The cover image is divided into n×n non-overlapping blocks. In every block pixels are classified into two types: Seed pixels and non-seed pixels. The Electronic Patient Record (EPR) is embedded only in non-seed pixels while as no embedding is carried out in seed pixels to facilitate reversibility. A fragile watermark coupled with Block Checksum has been embedded in addition to EPR for detecting any tamper to the patient Data during its transit from transmitter to receiver. Embedding has been carried out using Intermediate Significant Bit Substitution (ISBS) to prevent the scheme from LSB removal/replacement attack. The scheme has been evaluated for perceptual imperceptibility and content authentication by subjecting it to various image processing and geometric attacks. Experimental results reveal that the proposed system is capable of providing high quality watermarked images for fairly high payload while maintaining reversibility. Further it has been observed that the proposed Technique is able to detect tamper for all the image processing and geometric attacks carried out on it. A comparison of the observed results with that of some state-of-art schemes show that our scheme performs better and as such is an ideal candidate for content authentication of EPR in a typical e-healthcare system.

  • a high capacity Data Hiding scheme based on edge detection and even odd plane separation
    IEEE India Conference, 2015
    Co-Authors: Shabir A Parah, Javaid A Sheikh, Nazir A. Loan, Jahangir A Akhoon, Mohiuddin G Bhat
    Abstract:

    In this paper a high capacity Data Hiding Technique based on hybrid edge detection and even-odd pixel separation is proposed. The even-odd sub planes of Red, Green and Blue of the cover image are extracted then Blue and Green channel sub planes are utilized for Hiding the secret Data while Red channel sub planes are used to hold the status (edge or non-edge) of the pixels of Green and Blue channel sub planes. The experimentation has been carried out for different capacities of Data bits and the results are compared with a state of art Data Hiding Technique which reveals that the proposed Technique has high capacity. Further good quality stego-images are obtained.

  • Data Hiding in scrambled images a new double layer security Data Hiding Technique
    Computers & Electrical Engineering, 2014
    Co-Authors: Shabir A Parah, Javaid A Sheikh, Abdul Mueed Hafiz, G M Bhat
    Abstract:

    The contemporary multimedia and communication technology has made it possible to replicate and distribute digital media easier and faster. This ease of availability causes the problem of exposing transmitted digital Data on the network with the risk of being copied or intercepted illegally. Many cryptographic Techniques are in vogue to encrypt the Data before transmission to avert any security problems. However, disguised appearance of the encrypted Data makes the adversary suspicious and increases the chances of malicious attack. In such a scenario Data Hiding has received significant attention as an alternate way to ensure Data security. This paper presents a Data Hiding Technique based on the concepts of scrambling and pseudorandom Data Hiding; to provide a Data Hiding system with two layer security to the embedded Data, and good perceptual transparency of the stego images. The proposed system uses the novel concept of embedding the secret Data in scrambled (encrypted) cover images. The Data embedding is carried out in the Intermediate Significant and least significant bit planes of encrypted image at the predetermined locations pointed to by Pseudorandom Address Space (PAS) and Address Space Direction Pointer (ASDP). Experimental results prove the efficacy of scheme viz-a-viz various parameters of interest.

  • a secure and efficient spatial domain Data Hiding Technique based on pixel adjustment
    2014
    Co-Authors: Shabir A Parah, Javaid A Sheikh, G M Bhat
    Abstract:

    A spatial domain Hiding Technique based on Intermediate Significant Bit (ISB) embedding and pixel adjustment has been investigated and presented in this paper. The Data has been embedded in the cover image at the locations pointed to by Pseudorandom Address Vector (PAV). The image quality deterioration of the stego-image has been taken care of using pixel adjustment Technique. The pseudorandom embedding of Data enhances the security of the Hiding scheme. The comparison of our method with an existing Technique shows that proposed Technique is capable of providing better quality stego-images even if the payload is slightly more. A 3dB increase in PSNR in case of proposed Technique substantiates the argument.

G M Bhat - One of the best experts on this subject based on the ideXlab platform.

  • A New Reversible and high capacity Data Hiding Technique for E-healthcare applications
    Multimedia Tools and Applications, 2017
    Co-Authors: Shabir A Parah, Javaid A Sheikh, Farhana Ahad, Nazir A. Loan, G M Bhat
    Abstract:

    A high capacity and reversible Data Hiding Technique capable of tamper detection and localisation of medical images has been proposed in this paper. Image interpolation has been used to scale up the original image to obtain the cover image. The cover image is divided into n×n non-overlapping blocks. In every block pixels are classified into two types: Seed pixels and non-seed pixels. The Electronic Patient Record (EPR) is embedded only in non-seed pixels while as no embedding is carried out in seed pixels to facilitate reversibility. A fragile watermark coupled with Block Checksum has been embedded in addition to EPR for detecting any tamper to the patient Data during its transit from transmitter to receiver. Embedding has been carried out using Intermediate Significant Bit Substitution (ISBS) to prevent the scheme from LSB removal/replacement attack. The scheme has been evaluated for perceptual imperceptibility and content authentication by subjecting it to various image processing and geometric attacks. Experimental results reveal that the proposed system is capable of providing high quality watermarked images for fairly high payload while maintaining reversibility. Further it has been observed that the proposed Technique is able to detect tamper for all the image processing and geometric attacks carried out on it. A comparison of the observed results with that of some state-of-art schemes show that our scheme performs better and as such is an ideal candidate for content authentication of EPR in a typical e-healthcare system.

  • Data Hiding in scrambled images a new double layer security Data Hiding Technique
    Computers & Electrical Engineering, 2014
    Co-Authors: Shabir A Parah, Javaid A Sheikh, Abdul Mueed Hafiz, G M Bhat
    Abstract:

    The contemporary multimedia and communication technology has made it possible to replicate and distribute digital media easier and faster. This ease of availability causes the problem of exposing transmitted digital Data on the network with the risk of being copied or intercepted illegally. Many cryptographic Techniques are in vogue to encrypt the Data before transmission to avert any security problems. However, disguised appearance of the encrypted Data makes the adversary suspicious and increases the chances of malicious attack. In such a scenario Data Hiding has received significant attention as an alternate way to ensure Data security. This paper presents a Data Hiding Technique based on the concepts of scrambling and pseudorandom Data Hiding; to provide a Data Hiding system with two layer security to the embedded Data, and good perceptual transparency of the stego images. The proposed system uses the novel concept of embedding the secret Data in scrambled (encrypted) cover images. The Data embedding is carried out in the Intermediate Significant and least significant bit planes of encrypted image at the predetermined locations pointed to by Pseudorandom Address Space (PAS) and Address Space Direction Pointer (ASDP). Experimental results prove the efficacy of scheme viz-a-viz various parameters of interest.

  • a secure and efficient spatial domain Data Hiding Technique based on pixel adjustment
    2014
    Co-Authors: Shabir A Parah, Javaid A Sheikh, G M Bhat
    Abstract:

    A spatial domain Hiding Technique based on Intermediate Significant Bit (ISB) embedding and pixel adjustment has been investigated and presented in this paper. The Data has been embedded in the cover image at the locations pointed to by Pseudorandom Address Vector (PAV). The image quality deterioration of the stego-image has been taken care of using pixel adjustment Technique. The pseudorandom embedding of Data enhances the security of the Hiding scheme. The comparison of our method with an existing Technique shows that proposed Technique is capable of providing better quality stego-images even if the payload is slightly more. A 3dB increase in PSNR in case of proposed Technique substantiates the argument.

  • on the realization of a spatial domain Data Hiding Technique based on intermediate significant bit plane embedding isbpe and post embedding pixel adjustment pepa
    Multimedia Signal Processing, 2013
    Co-Authors: Shabir A Parah, Javaid A Sheikh, G M Bhat
    Abstract:

    Information security assumes a paramount importance in contemporary digital age. Data Hiding in images has flourished in recent years as an important field for information security. An Intermediate Significant Bit (ISB) plane based Data Hiding Technique is investigated and presented in this paper. The Data to be embedded in a cover image has been scrambled, and embedding has been carried out at the address locations pointed to by Pseudorandom Address Vector (PAV). The perceptual degradation of the image caused due to embedding in ISB planes has been taken care of by using Post Embedding Pixel Adjustment (PEA) Technique. The pseudorandom embedding of encrypted Data provides a two tier of security to the embedded secret Data. The comparison of the proposed Technique with an existing Data Hiding scheme shows that proposed Technique is capable of providing better quality stego-images even if the payload is slightly more. This is validated by an improvement in PSNR by about 3dB. Further, an important advantage offered by this Technique is that the embedded Data is not vulnerable to LSB removal/replacement attack as Data is embedded in ISB planes.

  • Data Hiding in color images a high capacity Data Hiding Technique for covert communication
    Computer Engineering and Intelligent Systems, 2013
    Co-Authors: Shabir A Parah, Javaid A Sheikh, G M Bhat
    Abstract:

    A high capacity Data Hiding Technique using color images as cover medium and referred to as 4R-4G-4B Technique has been investigated and presented in this paper. The color image is firstly divided into its constituent bit planes followed by Data embedding. To thwart the adversary different embedding algorithms have been used for embedding Data in Red, Green and Blue planes. Additional layer of security to the embedded Data is added by embedding secret Data at the pseudorandom locations determined by Main Address Vector (MAV) and Complementary Address Vector (CAV). The comparison of our method with an existing Technique shows that proposed Technique is capable of providing better quality stego-images even if the embedded Data is slightly more. A 2.7dB increase in PSNR in case of proposed Technique substantiates the argument.

Javaid A Sheikh - One of the best experts on this subject based on the ideXlab platform.

  • Hiding in encrypted images: a three tier security Data Hiding Technique
    Multidimensional Systems and Signal Processing, 2017
    Co-Authors: Shabir A Parah, Javaid A Sheikh, Umer I. Assad, Ghulam M. Bhat
    Abstract:

    This paper presents a new crypto domain Data Hiding Technique based on Intermediate Significant Bit Plane Embedding (ISBPE). The cover image is encrypted; the information to be secured is scrambled, and then embedded in the Intermediate Significant Bit (ISB) planes of encrypted cover image, at the locations determined by a Pseudorandom Address Vector (PAV). The pseudorandom embedding of the scrambled Data in the ISB planes of encrypted image results in a three tier security of the Data to be secured. The ISBPE embedding results in an important advantage that the proposed scheme becomes completely robust to commonly employed attack of Least Significant Bit (LSB) removal/replacement. A novel concept of embedding a very small size fragile watermark in addition to the secret information has been used which facilitates early tamper detection. This feature could save crucial processor time in critical situations of national security issues/warfare etc. Experimental results show that the proposed scheme is more robust to various signal processing attacks like Joint Picture Expert Group compression, Additive White Gaussian Noise and ‘salt and pepper’ noise as compared to conventional LSB based embedding Techniques. Comparison results with some well-known Techniques show that besides providing high degree of security and robustness to various malicious attacks the proposed Technique is capable of embedding a fairly large amount of secret Data in the host image while maintaining a good stego-image quality.

  • A New Reversible and high capacity Data Hiding Technique for E-healthcare applications
    Multimedia Tools and Applications, 2017
    Co-Authors: Shabir A Parah, Javaid A Sheikh, Farhana Ahad, Nazir A. Loan, G M Bhat
    Abstract:

    A high capacity and reversible Data Hiding Technique capable of tamper detection and localisation of medical images has been proposed in this paper. Image interpolation has been used to scale up the original image to obtain the cover image. The cover image is divided into n×n non-overlapping blocks. In every block pixels are classified into two types: Seed pixels and non-seed pixels. The Electronic Patient Record (EPR) is embedded only in non-seed pixels while as no embedding is carried out in seed pixels to facilitate reversibility. A fragile watermark coupled with Block Checksum has been embedded in addition to EPR for detecting any tamper to the patient Data during its transit from transmitter to receiver. Embedding has been carried out using Intermediate Significant Bit Substitution (ISBS) to prevent the scheme from LSB removal/replacement attack. The scheme has been evaluated for perceptual imperceptibility and content authentication by subjecting it to various image processing and geometric attacks. Experimental results reveal that the proposed system is capable of providing high quality watermarked images for fairly high payload while maintaining reversibility. Further it has been observed that the proposed Technique is able to detect tamper for all the image processing and geometric attacks carried out on it. A comparison of the observed results with that of some state-of-art schemes show that our scheme performs better and as such is an ideal candidate for content authentication of EPR in a typical e-healthcare system.

  • a high capacity Data Hiding scheme based on edge detection and even odd plane separation
    IEEE India Conference, 2015
    Co-Authors: Shabir A Parah, Javaid A Sheikh, Nazir A. Loan, Jahangir A Akhoon, Mohiuddin G Bhat
    Abstract:

    In this paper a high capacity Data Hiding Technique based on hybrid edge detection and even-odd pixel separation is proposed. The even-odd sub planes of Red, Green and Blue of the cover image are extracted then Blue and Green channel sub planes are utilized for Hiding the secret Data while Red channel sub planes are used to hold the status (edge or non-edge) of the pixels of Green and Blue channel sub planes. The experimentation has been carried out for different capacities of Data bits and the results are compared with a state of art Data Hiding Technique which reveals that the proposed Technique has high capacity. Further good quality stego-images are obtained.

  • Data Hiding in scrambled images a new double layer security Data Hiding Technique
    Computers & Electrical Engineering, 2014
    Co-Authors: Shabir A Parah, Javaid A Sheikh, Abdul Mueed Hafiz, G M Bhat
    Abstract:

    The contemporary multimedia and communication technology has made it possible to replicate and distribute digital media easier and faster. This ease of availability causes the problem of exposing transmitted digital Data on the network with the risk of being copied or intercepted illegally. Many cryptographic Techniques are in vogue to encrypt the Data before transmission to avert any security problems. However, disguised appearance of the encrypted Data makes the adversary suspicious and increases the chances of malicious attack. In such a scenario Data Hiding has received significant attention as an alternate way to ensure Data security. This paper presents a Data Hiding Technique based on the concepts of scrambling and pseudorandom Data Hiding; to provide a Data Hiding system with two layer security to the embedded Data, and good perceptual transparency of the stego images. The proposed system uses the novel concept of embedding the secret Data in scrambled (encrypted) cover images. The Data embedding is carried out in the Intermediate Significant and least significant bit planes of encrypted image at the predetermined locations pointed to by Pseudorandom Address Space (PAS) and Address Space Direction Pointer (ASDP). Experimental results prove the efficacy of scheme viz-a-viz various parameters of interest.

  • a secure and efficient spatial domain Data Hiding Technique based on pixel adjustment
    2014
    Co-Authors: Shabir A Parah, Javaid A Sheikh, G M Bhat
    Abstract:

    A spatial domain Hiding Technique based on Intermediate Significant Bit (ISB) embedding and pixel adjustment has been investigated and presented in this paper. The Data has been embedded in the cover image at the locations pointed to by Pseudorandom Address Vector (PAV). The image quality deterioration of the stego-image has been taken care of using pixel adjustment Technique. The pseudorandom embedding of Data enhances the security of the Hiding scheme. The comparison of our method with an existing Technique shows that proposed Technique is capable of providing better quality stego-images even if the payload is slightly more. A 3dB increase in PSNR in case of proposed Technique substantiates the argument.

Chihwei Shiu - One of the best experts on this subject based on the ideXlab platform.

  • a high capacity reversible Data Hiding scheme using orthogonal projection and prediction error modification
    Signal Processing, 2010
    Co-Authors: Wien Hong, Tungshou Chen, Yuping Chang, Chihwei Shiu
    Abstract:

    The payload of a histogram-shifting based reversible Data Hiding Technique is primarily determined by the peak height of the corresponding image histogram. It is known that the peak height of the prediction error histogram is usually higher than that of image histogram itself. In 2009, Tsai et al. adopted the idea of histogram-shifting Technique and embedded message by modifying the prediction errors to achieve a higher payload. They used a block-based approach and leaved some pixel values unmodified to predict other pixel values in a block. However, the unmodified pixels took up some embeddable space, causing a reduction in payload. In this paper, a new reversible Data Hiding Technique based on prediction error modification is proposed. The orthogonal projection Technique is employed to estimate the optimal weights of a linear predictor to increase the prediction accuracy and the embedding capacity. The experimental results revealed that the proposed method outperformed the existing histogram-shifting based reversible Data Hiding Technique in terms of payload and image quality.

Shaou-gang Miaou - One of the best experts on this subject based on the ideXlab platform.

  • A Data-Hiding Technique with authentication, integration, and confidentiality for electronic patient records
    IEEE Transactions on Information Technology in Biomedicine, 2002
    Co-Authors: Hui Mei Chao, Chin Ming Hsu, Shaou-gang Miaou
    Abstract:

    A Data-Hiding Technique called the "bipolar multiple-number base" was developed to provide capabilities of authentication, integration, and confidentiality for an electronic patient record (EPR) transmitted among hospitals through the Internet. The proposed Technique is capable of Hiding those EPR related Data such as diagnostic reports, electrocardiogram, and digital signatures from doctors or a hospital into a mark image. The mark image could be the mark of a hospital used to identify the origin of an EPR. Those digital signatures from doctors and a hospital could be applied for the EPR authentication. Thus, different types of medical Data can be integrated into the same mark image. The confidentiality is ultimately achieved by decrypting the EPR related Data and digital signatures with an exact copy of the original mark image. The experimental results validate the integrity and the invisibility of the hidden EPR related Data. This newly developed Technique allows all of the hidden Data to be separated and restored perfectly by authorized users.

  • a secure Data Hiding Technique with heterogeneous Data combining capability for electronic patient records
    International Conference of the IEEE Engineering in Medicine and Biology Society, 2000
    Co-Authors: Shaou-gang Miaou, Chin Ming Hsu, Yuhshow Tsai, Hui Mei Chao
    Abstract:

    It is an enabling technology to transmit electronic patient records (EPR) across distances to hospitals and countries through the Internet. However, since EPR is a highly personal medical documentation, transmission of secure EPR is required to reduce the risk of security breach on the network and prevent accessing of Data by unauthorized end-users. Here, the authors propose a bi-polar multiple-base Data Hiding Technique, where a pixel value difference between an original image and its default JPEG (Joint Photographic Experts Group) lossy decompressed image is taken to be a number conversion base. The authors hide doctors' digital seals and the EPR Data within a still image by using this approach. The still image could be the mark of a hospital to identify where the EPR comes from. The doctors' digital seals are essential to the authentication of EPR. A diagnostic report and a biomedical signal such as an electrocardiogram (ECG) can also be hidden in the image. The proposed approach allows multiple Data types to be hidden in the same image. All the Data can be separated and restored perfectly by the intended users. In addition, the proposed Data Hiding Technique has higher peak signal to noise ratio than that of using default JPEG alone. Thus, the transparency of the hidden image and the invisibility of the EPR Data are guaranteed.