A Secure and authenticated discrete reversible data hiding in cipher images deals with security and authentication. This paper deals with the data hidden in an image carried out in two steps. First, a content owner encrypts the original uncompressed image using an encryption key. Secondly, a data hider may compress the least significant bits of the encrypted image using a data hiding key to create a sparse space to accommodate some additional data. With an encrypted image containing additional data, if a receiver has the either data-hiding key or encryption key, he can extract the additional data and obtain an image with original data respectively or else he can extract any one data. This research tries to enumerate different encryption techniques and algorithms.
Divyani UdayKumar Singh, Kasturi Mohan Padwal, Madhura Pundlik Jadhav, Separable Reversible Data Hiding in Image Using Advanced Encryption Standard with Fake Data Generation, International Journal of Computer Science and Information Technologies, Vol. 5 , No.3 , Pp. 3469-3473, 2014.
X. Zhang, Rev rsible data hiding in encrypted image, IEEE Signal Process. Lett., vol 18, no. 4, pp. 255–258, Apr. 2011.
C.. Chang, C.-C. Lin, and Y.-H. Chen, Reversible data-embedding scheme using differences between original and predicted pixel values, IET Inform. Security, vol.2, no. 2, pp. 35–46, 2008.
X. Zhang,. Lossy compression and iterative reconstruction for encrypted image, IEEE Trans. Inform. Forensics Security, vol. 6, no. 1, pp. 53–58, Feb. 2011.
John Justin M, Manimurugan S, A Survey on Various Encryption Techniques, International Journal of Soft Computing and Engineering (IJSCE), Vol.2, No.1,pp.429 -432,2012.
Suhaila O. Sharif, L.I. Kuncheva, S.P. Mansoor ,Classifying Encryption Algorithms Using Pattern Recognition Techniques, IEEE Transactions, pp. 1168-1172, 2010.
Zhu Yuxi, Ruchun Cui, Applied Study Based on OMAP Digital Fingerprint Encryption Method, IEEE Transactions pp. 1168- 1172, 2010
Jun Lang, Ran Tao, Yue Wang, Image encryption based on the multiple-parameter discrete fractional Fourier transform and chaos function, Optics Communications, Vol. 283, pp. 2092-2096, 2010.
Xinpeng Zhang, Separable Reversible Data Hiding in Encrypted Image, IEEE Transaction on Information Forensic and Security, Vol. 7 ,No.2, 2012.
Ganesh Gunjal , A Survey on Separable Reversible Data Hiding in Encrypted Image, International Journal of Advanced Research in Computer Science and Software Engineering ,Vol. 5, No.7, 2015
Mohammad Ali Moh\"d Bani Younes, An Approach To Enhance Image Encryption Using Block-Based Transformation Algorithm, 2009.
Kundankumar Rameshwar Saraf , Vishal Prakash Jagtap , Amit Kumar Mishra, Text and Image Encryption Decryption Using Advanced Encryption Standard,International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) ,Vol.3, No.3, 2014.
Lala Krikor, Sami Baba, Thawar Arif, Zyad Shaaban ,Image Encryption Using DCT and Stream Cipher, 2000.
Cheng and X. Li., Partial Encryption of Compressed Images and Videos, IEEE Trans. On Signal Processing, Vol.48,No.8, Pp.2439–2445, 2000.
W. Puech and J. Rodrigues, Crypto-compression of medical images by selective encryption of DCT, 13th European Signal Processing Conference, Turkey, 2005.
Rodrigues, J.M. Puech, W. Bors, A.G.,Selective Encryption of Human Skin in JPEG Images, IEEE International Conference on Image Processing, 2006.
Mahammad Ali Bani Younes and Aman Jantan, Image encryption using Block- Based Tranformation Algorithm, IAENG International Journal of Computer science,Vol.35, No. 1, IJCS_35_1_3.
V.V.Divya, S.K.Sudha and V.R.Resmy , Simple and Secure Image Encryption, JCSI International Journal of Computer Science Issues, Vol. 9, , No 3, 2012 .
Pia Singh Prof. Karamjeet Singh, Image Encryption And Decryption Using Blowfish Algorithm In Matlab, International Journal of Scientific & Engineering Research, Vol. 4, No.7, 2013.
Data hiding, Encryption , Compressible, Reversible.