A comparison of joint reversible data hiding methods in encrypted remote sensing satellite images

Ali Syahputra Nasution, Gunawan Wibisono

Research output: Contribution to journalConference articlepeer-review

1 Citation (Scopus)


The distribution of remote sensing satellite data from the National Remote Sensing Data Bank (BDPJN) of the National Institute of Aeronautics and Space (LAPAN) to users via the internet requires security so that it is not used illegally by unauthorized parties. Encryption and reversible data hiding are two effective and popular privacy protection and confidential communication solutions. With encryption, data is randomized so it can't be read. Whereas with reversible data hiding, the receiver can extract hidden data and restore the original image without distortion. In this paper, some remote sensing satellite images are used as input in the simulation that is analyzed and compared based on the three methods of joint reversible data hiding in encrypted images, i.e. Zhang's work, Hong's work, and Fatema's work. The experimental results show that Hong's et al. method reveals the best performance of the three methods. For example, when the block size is 8x8, the bit error rate (BER) of the SPOT-6 test image of Hong's et al. method was 12.06%, which is slightly lower than the 14.01% Zhang's method and 11.89% Fatema's et al. method. Likewise, the quality of remote sensing satellite image (image-spot6) recovery represented by the peak signal to noise ratio (PSNR) of Hong's et al. method is 49.96 dB, which is quite higher than the 48.26 dB of Zhang's method and 48.98 dB of Fatema's et al. method.

Original languageEnglish
Article number012038
JournalJournal of Physics: Conference Series
Issue number1
Publication statusPublished - 9 Jun 2020
Event4th International Seminar on Sensors, Instrumentation, Measurement and Metrology, ISSIMM 2019 - Padang, West Sumatera, Indonesia
Duration: 14 Nov 201914 Nov 2019


Dive into the research topics of 'A comparison of joint reversible data hiding methods in encrypted remote sensing satellite images'. Together they form a unique fingerprint.

Cite this