A Review of Reversible Data Hiding-Encrypted Image (RDH-EI) Methods

Authors

  • Dalal Naeem Hammod

Keywords:

Reversible Data Hiding
RDH-EI
Embedding Algorithm
Extraction Algorithm

Abstract

In the past few years, the world had witnessed a revolution in multimedia and Information Technology (IT) development and utilization. This results from the increase of the internet-based-communications including the transfer of the digital data in text files, audio, video, and/or image formats. Which is why, multimedia and IT became one of the crucial parts of people’s daily lives. There are numerous threats that target Image integrity, confidentiality, and authentication, therefore, the information security is a very important concept. The Reversible Data Hiding (RDH) is a data hiding method. RDH-Encrypted Image (RDH-EI) procedure which is working through embedding additional data to an image had emerged. Lately, the RDH-EI with the wide range is used, which is why, it has attracted the interest and focus of the employers as well as the academics. Thus, a survey that discusses previous researches will be carried out for the purpose of identifying the most significant (RDH-EI) approaches throughout the past five years. Several methods of RDH-EI with the different embedding rate, when its value is low (< 0.1 bpp), it is impossible to reconstruct the image without fault. Otherwise in the case where the embedding rate is high (>0.1 bpp), it is possible to obtain an image that is quite similar to the original image but it still needed for preprocessing step.

Author Biography

Dalal Naeem Hammod

College of Sciences | University of Al-Nahrain | Iraq

Downloads

Published

2022-09-27

How to Cite

1.
A Review of Reversible Data Hiding-Encrypted Image (RDH-EI) Methods. JESIT [Internet]. 2022 Sep. 27 [cited 2024 Aug. 25];6(6):52-66. Available from: https://journals.ajsrp.com/index.php/jesit/article/view/5589

Issue

Section

Content

How to Cite

1.
A Review of Reversible Data Hiding-Encrypted Image (RDH-EI) Methods. JESIT [Internet]. 2022 Sep. 27 [cited 2024 Aug. 25];6(6):52-66. Available from: https://journals.ajsrp.com/index.php/jesit/article/view/5589