In-dependable Data hiding in an Encrypted Image using FCM-DH Algorithm

Abstract

In this paper, a data mining technique, Fuzzy C Means Clustering (FCM) based data hiding algorithm (FCM-DH) is used to divide pixels into classes or clusters from the encrypted image. Clustering of pixels in an encrypted image is considered in the proposed approach for creating a space to accommodate data. Before applying the FCM-DH, a content owner prepares a cover image by encrypting the pixels of an image with encryption key. Then, group the pixels to compress the least significant bits of the encrypted image using a proposed FCM-DH technique with data-hiding key and form a partition matrix to create space to accommodate data. With a received cover image containing hidden data, if the receiver can extract the data with data-hiding key or decrypt the cover image with encryption key to obtain original image independently. If the receiver applying both the datahiding key and the encryption key, then extract the data and recover the original image without any error by exploiting the spatial correlation in natural image.

Authors and Affiliations

S Janani, S Poorani

Keywords

Related Articles

Implementation of Slicing Technique for Privacy Preserving Data Publishing

Today, most of the organizations are effectively gathering and storing information in extensive databases. A large number of them have perceived the potential estimation of this information as a data hotspot for settl...

Comparison of EEA3 and EEA1 Algorithms in Terms of Encryption Time and Throughput

EEA3 (Evolved Packet System Encryption Algorithm 3) and EEA1 (Evolved Packet System Encryption Algorithm 1) are confidentiality algorithms that are used to en/decrypt blocks of data. In this paper we present the enc...

Design and Implementation of FPGA Based MIMO Decoder in Wireless Receiver

This paper address the implementation of Multi-Input-Multi-Output (MIMO) Decoder using FPGAs embedded in a prototype of Wireless Communication receiver. The task of the MIMO decoder is to appropriately combine the s...

Detecting Malicious Storage Node in WSN

The architecture of two-tiered sensor networks where the storage nodes serve as an intermediate tier between sensors and a sink for storing data and processing queries has been widelyadopted because of the benefits o...

A comprehensive survey on restructuring user search results with Feedback sessions

Search engine relevance and user experience is very important in web search applications. It can be improved by inferring and analyzing user search goals. This paper proposes a novel approach to infer user goals by a...

Download PDF file
  • EP ID EP27834
  • DOI -
  • Views 269
  • Downloads 0

How To Cite

S Janani, S Poorani (2014). In-dependable Data hiding in an Encrypted Image using FCM-DH Algorithm. International Journal of Research in Computer and Communication Technology, 3(2), -. https://europub.co.uk./articles/-A-27834