{"title":"Review on safe reversible image data hiding across a enciphered environment","authors":"J. Lakshmi, J. Rajeshwari","doi":"10.1109/ICCMC.2017.8282687","DOIUrl":null,"url":null,"abstract":"Reversible image data hiding is (RIDH) is a special category of data hiding technique. This technique will ensure perfect reconstruction of the cover image upon the extraction of the embedded message. Data extraction is achieved through a mechanism, in which access to the secret encryption key is not required. The reversibility of these technique are particularly applied in the critical scenarios such as military and remote sensing, medical image sharing, copyright authentication and law forensics, where the reconstructed cover image is required in high fidelity. Many of the researchers have studied reversible image data hiding techniques in recent year. This paper mainly summarizes the existing techniques of reversible image data hiding algorithms, and it gives the basic procedure of the techniques used.","PeriodicalId":163288,"journal":{"name":"2017 International Conference on Computing Methodologies and Communication (ICCMC)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Computing Methodologies and Communication (ICCMC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCMC.2017.8282687","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Reversible image data hiding is (RIDH) is a special category of data hiding technique. This technique will ensure perfect reconstruction of the cover image upon the extraction of the embedded message. Data extraction is achieved through a mechanism, in which access to the secret encryption key is not required. The reversibility of these technique are particularly applied in the critical scenarios such as military and remote sensing, medical image sharing, copyright authentication and law forensics, where the reconstructed cover image is required in high fidelity. Many of the researchers have studied reversible image data hiding techniques in recent year. This paper mainly summarizes the existing techniques of reversible image data hiding algorithms, and it gives the basic procedure of the techniques used.