Reversible Data Hiding: An Active Forensic Framework for Digital Images

Reversible Data Hiding: An Active Forensic Framework for Digital Images

Mehul S. Raval
ISBN13: 9781522571070|ISBN10: 1522571078|ISBN13 Softcover: 9781522587835|EISBN13: 9781522571087
DOI: 10.4018/978-1-5225-7107-0.ch005
Cite Chapter Cite Chapter

MLA

Raval, Mehul S. "Reversible Data Hiding: An Active Forensic Framework for Digital Images." Intelligent Innovations in Multimedia Data Engineering and Management, edited by Siddhartha Bhattacharyya, IGI Global, 2019, pp. 116-140. https://doi.org/10.4018/978-1-5225-7107-0.ch005

APA

Raval, M. S. (2019). Reversible Data Hiding: An Active Forensic Framework for Digital Images. In S. Bhattacharyya (Ed.), Intelligent Innovations in Multimedia Data Engineering and Management (pp. 116-140). IGI Global. https://doi.org/10.4018/978-1-5225-7107-0.ch005

Chicago

Raval, Mehul S. "Reversible Data Hiding: An Active Forensic Framework for Digital Images." In Intelligent Innovations in Multimedia Data Engineering and Management, edited by Siddhartha Bhattacharyya, 116-140. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-7107-0.ch005

Export Reference

Mendeley
Favorite

Abstract

The chapter presents an application of reversible data hiding for the authentication of image travelling over a hostile and insecure communication channel. The reversible data resides in the image and tracks any changes done to it on a communication channel. The extraction of data and any modification to its structure reveals changes in the image. This allows the use of data hiding for forensic purpose. The reversible data hiding provides an additional advantage along with active forensics. The image regains original form after removal of the embedded data. However, reversible data hiding is an interplay between the image quality and watermarking capacity. The chapter presents the generic framework for data hiding and discusses its special case reversible data hiding. It presents capacity-behavior analysis of the difference expansion scheme. It performs in-depth analysis on the type of predictor and its impact on the capacity of the reversible data hiding scheme. Finally, the chapter presents a case study to showcase the use of reversible data hiding for image authentication.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.