alexa Abstract | Inverse Data Hiding in a Classical Image by Using Scalable Image Encryption
ISSN ONLINE(2320-9801) PRINT (2320-9798)

International Journal of Innovative Research in Computer and Communication Engineering
Open Access

OMICS International organises 3000+ Global Conferenceseries Events every year across USA, Europe & Asia with support from 1000 more scientific Societies and Publishes 700+ Open Access Journals which contains over 50000 eminent personalities, reputed scientists as editorial board members.

Open Access Journals gaining more Readers and Citations

700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ Readers

This Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)

Research Article Open Access


Data hiding is the process of hidden embedding data into data sources such as audio, video, or image signals without changing the perceptual quality. The most common techniques in data hiding is the use of least significant bit and the use of redundancy in the cover image by performing lossless compression. The encryption is a general method for providing privacy protection such as confidentiality, integrity and authentication of data. The hiding of data ideas for encrypted images is made of encryption of image, embedding of data and extraction of data. In the encryption phase, initially the images are encrypted with the encryption key associated with data to be embedded on that encrypted image with data hiding key. In the decryption phase, the embedded image (associate with data) is extracted and decrypted with encryption key and encrypted data is extracted and decryption is made using data hiding key. Though, in both encryption and decryption process same encryption key and data hiding key is used. The objective of the work is to provide an efficient data hiding technique and Image Encryption in which the data and the image can be retrieved independently.

To read the full article Peer-reviewed Article PDF image | Peer-reviewed Full Article image

Author(s): C. Shahul Hameed, S.A.K. Jainulabudee and P. Mohamed Nazeem

Share This Page

Additional Info

Loading Please wait..
Peer Reviewed Journals
Make the best use of Scientific Research and information from our 700 + peer reviewed, Open Access Journals
International Conferences 2017-18
Meet Inspiring Speakers and Experts at our 3000+ Global Annual Meetings

Contact Us

© 2008-2017 OMICS International - Open Access Publisher. Best viewed in Mozilla Firefox | Google Chrome | Above IE 7.0 version