Browse > Article
http://dx.doi.org/10.7840/kics.2015.40.8.1477

Transmission Methods Using RS Codes to Improve Spatial Relationship of Images in Reversible Data Hiding Systems  

Kim, Taesoo (School of Electrical Engineering, University of Ulsan)
Jang, Min-Ho (School of Electrical and Electronic Engineering, Ulsan College)
Kim, Sunghwan (School of Electrical Engineering, University of Ulsan)
Abstract
In this paper, a novel reversible data hiding by using Reed-Solomon (RS) code is proposed for efficient transmission in encryption image. To increase the recovery of data from encrypted image, RS codes are used to encode messages, and then the codewords can be embedded into encrypted image according to encryption key. After receiving encrypted image which embeds the codewords, the receiver firstly decryptes the encrypted image using the encryption key and get metric about codewords containing messages. According to recovery capability of RS codes, better estimation of message is done in data hiding system. Simulation results about two images and two RS codes show that the performances of the proposed schemes are better than ones of the reference scheme.
Keywords
data hiding; image encryption; image processing; Reed-Solomon(RS) codes; security;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 X. Zhang, "Reversible data hiding encrypted image," IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255-258, Apr. 2011.   DOI   ScienceOn
2 W. Hong, T.-S. Chen, and H.-Y. Wu, "An improved reversible data hiding in encrypted images using side match," IEEE, Signal Process. Lett., vol. 19, no. 4, pp. 199-202, Apr. 2012.   DOI   ScienceOn
3 X. Zhang, "Separable reversible data hiding encrypted image," IEEE Trans. Inf. Forensics and Security, vol. 7, no. 2, pp. 826-832, Apr. 2012.   DOI   ScienceOn
4 W. Zhang, K. Ma, and N. Yu "Reversibility improved data hiding in encrypted images," Signal Process., vol. 94, pp. 118-127, Jan. 2014.   DOI   ScienceOn
5 S.-H. Cho, D.-S. Kim, and K.-Y. Yoo, "Improved reversible data hiding scheme based on difference value of adjacent pixels," in Proc. KICS Int. Conf. Commun., pp. 790-791, Pyeongchang, Korea, Feb. 2012.
6 S. W. Kim, S. Yoo, J. Shin, and J. Ryou, "A study on the protection method for the medical image using DQT encryption," in Proc. KICS Int. Conf. Commun., pp. 205-206, Jeju Island, Korea, Jun. 2013.
7 Y. Kim and D. Lim, "Lattice-based reversible data hiding," J. KMMS, vol. 16 no. 4, pp. 27-33, Feb. 2012.
8 J. G. Proakis and M. Salehi, Digital communications, NY: McGraw-Hill, pp. 471-475, 2008.
9 H.-K. An, "Optimizing the circuit for finding 2 error positions of 2 error correcting Reed Solomon decoder," J. KICS, vol. 36 no. 1, pp. 8-13, Jan. 2011.
10 K.-R. Koh and W.-W. Kim, "Performance analysis of telemetering method using delayed frame time diversity (DFTD) and Reed-Solomon code," J. KICS, vol. 37A, no. 7, pp. 503-511, Jul. 2012.
11 H. Wang and S. Kim, "New RLL decoding algorithm for multiple candidates in visible light communication," IEEE Photon. Technol. Lett., vol. 27, no. 1, pp. 15-17, Jan. 2015.   DOI   ScienceOn
12 Y. Lee, "A study on the short-range wireless transmission technology using the LED in ubiquitous environment," J. KICS, vol. 17, no. 09, pp. 2174-2182, Sept. 2013.
13 T. K. Moon, Error correction coding, Wiley-interscience, pp. 242-243, 2004.