The number of required bits was dramatically reduced
(close to 3 to 1). Also, the original secret images can
be recovered nearly losslessly from the created mo-
saic images. Good experimental results have shown
the feasibility of the proposed method. Future studies
may be directed to apply further statistical simplifica-
tions to the position indices and means, among other
low-complexity options.
REFERENCES
Behnia, S., Akhshani, A., Mahmodi, H., and Akhavan, A.
(2008). A novel algorithm for image encryption based
on mixture of chaotic maps. In Chaos Solit. Fract.,
vol. 35, pp. 408 - 419.
Chan, C. K. and Cheng, L. M. (2004). Hiding data in images
by simple lsb substitution. In Pattern Recognition, vol.
37, pp. 469 - 474.
Chang, C. C., Lin, C. C., Tseng, C. S., and Tai, W. L.
(2007). Reversible hiding in dct-based compressed
images. In Inf. Sci., vol. 177,pp. 2768 - 2786.
Chen, G., Mao, Y., and Chui, C. K. (2004). A symmet-
ric image encryption scheme based on 3d chaotic cat
maps. In Chaos Solit. Fract., vol. 21, pp. 749 - 761.
Fridrich, J. (1998). Symmetric ciphers based on two-
dimensional chaotic maps. In Int. J. Bifurcat. Chaos,
vol. 8, pp. 1259 - 1284.
Fridrich, J., Goljan, M., and Du, R. (2001). Invertible au-
thentication. In Proc.SPIE, vol. 3971, pp. 197 - 208.
Hu, Y., Lee, H. K., Chen, K., and Li, J. (2008). Difference
expansion based reversible data hiding using two em-
bedding directions. In IEEE Trans.Multimedia, vol.
10, pp. 1500 - 1512.
Jitha, R. and Sivadasan, E. T. (2015). A survey paper on
various reversible data hiding techniques in encrypted
images. In IEEE International Advance Computing
Conference (IACC), pp. 1139 - 1143.
Kwok, H. S. and Tang, W. K. S. (2007). A fast image en-
cryption system based on chaotic maps with finite pre-
cision representation. In Chaos Solit. Fract.,vol. 32,
pp. 1518 - 1529.
Lee, S., Yoo, C. D., and Kalker, T. (2007). Reversible im-
age watermarking based on integer-to-integer wavelet
transform. In IEEE Trans. Inf. Forens. Secur.,vol. 2,
pp. 321 - 330.
Lee, Y. and Tsai, W.-H. (2014). A new secure image trans-
mission technique via secret-fragment-visible mosaic
images by nearly reversible color transformations. In
IEEE Transactions on circuits and systems for video
technology, VOL. 24.
Li, X., Yang, B., and Zeng, T. (2011). Efficient reversible
watermarking based on adaptive prediction-error ex-
pansion and pixel selection. In IEEE Trans.Image
Process., vol. 20, pp. 3524 - 3533.
Lin, W. H., Horng, S. J., Kao, T. W., Fan, P., Lee, C. L.,
and Pan, Y. (2008). An efficient watermarking method
based on significant difference of wavelet coefficient
quantization. In IEEE Trans. Multimedia, vol. 10, pp.
746 - 757.
Ni, Z., Shi, Y. Q., Ansari, N., and Su, W. (2006). Reversible
data hiding. In IEEE Trans. Circuits Syst. Video Tech-
nol., vol. 16, pp. 354 - 362.
Patidar, V., Pareek, N. K., Purohit, G., and Sud, K. K.
(2011). A robust and secure chaotic standard
map based pseudorandom permutation- substitution
scheme for image encryption. In Opt. Commun., vol.
284, pp. 4331 - 4339.
Reinhard, E., Ashikhmin, M., Gooch, B., and Shirley, P.
(2001). Color transfer between images. In IEEE Com-
put. Graph. Appl., vol. 21, pp. 34 - 41.
Sachnev, V., Kim, H. J., Nam, J., Suresh, S., and Shi,
Y. Q. (2009). Reversible watermarking algorithm us-
ing sorting and prediction. In IEEE Trans.Circuits
Syst. Video Technol., vol. 19, pp. 989 - 999.
Sarwate, S. and Dakhore, H. (2015). An approach to color
transformation for image encryption and data hiding.
In Global Conference on Communication Technolo-
gies, pp. 792 - 796.
Senthil Kumar, A. and Anandhi, T. (2016). Multi image
integration and encryption algorithm for security ap-
plications. In Industrial Electronics Society - 42nd
Annual Conference of the IEEE, pp. 986 - 991.
Suresh, A. and Ajai, R. (2016). Vlsi implementation of text
to image encryption algorithm based on private key
encryption. In International Conference on Electrical,
Electronics, and Optimization Techniques, pp. 4879 -
4881.
Tian, J. (2003). Reversible data embedding using a differ-
ence expansion. In IEEE Trans. Circuits Syst. Video
Technol., vol. 13, pp. 890 - 896.
Xiao, D., Liao, X., and Wei, P. (2009). Analysis and im-
provement of a chaos- based image encryption algo-
rithm. In Chaos Solit. Fract., vol. 40,pp. 2191 - 2199.
Zhang, W., Hu, X., Li, X., and Yu, N. (2013). Recursive his-
togram modi- fication: Establishing equivalency be-
tween reversible data hiding and lossless data com-
pression. In IEEE Trans. Image Process., vol. 22,pp.
2775 - 2785.