Volume 10 Issue 06, November 2022

A Review on Enhanced Reversible Data Hiding on Encrypted Images by Hierarchical Embedding Method

Ankit Kumar, Jeetendra Singh Yadav

Page no:01-04


Bettered reversible data hiding scheme in encoded images using Data Security deals with securing data from unauthorized users and data corruption. A vital data security measure is encryption, where digital data are encoded. Reversible data caching can restore the image after the secret data is extracted. Security and integrity of data are two challenging areas for exploration. Further attention is paid to reversible d caching in encoded images as the original cover image can be lossless recovered after embedded data is extracted while securing the confidentiality of the image contents. This paper compares two approaches used for reversible data caching. The PSNR value of the recovered image of both ways is compared. The main idea of the hierarchical embedding method (HEM) is that an image proprietor encrypts a cover image, and a data hider embeds secret information in the encoded image. With information concealment, a receiver can extract the embedded data from the hidden image; with encryption, the receiver reconstructs the original image. Experimental results prove that the proposed system not only realizes high-capacity reversible data hiding in encoded images but also reconstructs the original image in the fully operational area like the Military, Medical where minor changes in the original image content affect a lot. This literature survey discusses all the existing data-hiding methodology and their performance. An experimental study shows that the proposed scheme outperforms the existing schemes in terms of embedding rate without compromising encryption efficiency.

A Survey Paper on Wireless Sensor Network Localization Using RSSI

Deepika Sonawane, Jeetendra Singh Yadav

Page no:05-09


The issues concerning wireless sensor nodes’ localisation estimation are still a matter of research interest. It is driven by the complexity and the diversity of current and unborn wireless detector network operations. Several single schemes have been proposed and studied for position estimation, each with advantages and limitations. Still, the current methods for performance evaluation of wireless detector networks substantially concentrate on a single private or objective evaluation. Accurate position information is essential for colourful arising operations in wireless detector networks (WSN). To better localisation accuracy, it’s of consummate significance to reduce the goods of noisy distance measures. This paper analyses commercial and exploration prototypes, which are available wireless sensor nodes based on these parameters and outlines exploration directions in this area. The SNs are still sphere specific and generally stationed to support a specific operation. Still, as WSNs’ nodes are increasingly important, it’s getting more and more material to examine how multiple operations could participate in the same WSN structure. Virtualisation is a technology that can potentially enable this sharing. Existing works are presented in detail and critically evaluated, and more error rates using a set of requirements derived from the scenarios.