International Journal of Advanced Computer Technology http://ijact.org/index.php/ijact <center> <h3 style="font-family: georgia,serif; font-size: 20px; color: #0066ff;"><strong>A Peer reviewed, Open access, Bimonthly, International Journal since 2012</strong></h3> </center> <section class="additional_content"><!-- ####### YAY, I AM THE SOURCE EDITOR! #########--> <p><strong>ISSN</strong> : 2319-7900 | <strong>DOI</strong> : 10.18535/ijact |</p> <p><a href="https://ijact.org/revista/index.php/ijact/gateway/plugin/WebFeedGatewayPlugin/rss"><span style="background-color: #796c83; color: #fff; display: inline-block; padding: 3px 10px; font-weight: bold; border-radius: 5px;">RSS</span></a>&nbsp;<a href="https://ijact.org/revista/index.php/ijact/about/submissions"><span style="background-color: #ac2226; color: #fff; display: inline-block; padding: 3px 10px; font-weight: bold; border-radius: 5px;">Submission</span></a>&nbsp;</p> <p><span style="color: #3498e0;"><strong>Call For Paper Volume 8 issue 2 December 2019</strong></span></p> <p><strong>Submission Deadlines</strong></p> <p><strong>Volume / Issue / Month :&nbsp;Volume 08 Issue 2, 25 December 2019 Read More&nbsp;</strong></p> <p><strong>Submit Article at : <a href="mailto:editor@ijact.org">submitpaper@ijact.org</a></strong></p> <p style="text-align: justify; font-family: georgia,serif; font-size: 15px; line-height: 25px; color: #666;"><em><strong>International Journal of Advanced Computer Technology</strong><strong> (IJACT)</strong></em>&nbsp;<strong>ISSN - 2319-7900</strong> is a leading international online journal for publication of new ideas. It's a peer-reviewed, open access scholarly journal that publishes research works and review articles in all research domains (Engineering, Technology). This is an open access journal which means that all content is freely available to the Researcher /users of any institution with vision spreading and sharing knowledge. These published articles/papers are accessible to the research scholars through a wide indexing policy adopted by this online international journal. Hence, they can freely be accessed and used by everyone for the improvement of current trends in science and technology. This Journal favors and promotes online publication of papers to truly present itself as an online journal.</p> </section> <center></center> <p style="text-align: justify; font-family: georgia,serif; font-size: 15px; line-height: 25px; color: #666;"><strong>IJACT</strong> follows publication ethics during phases of online publication inline with the guidelines and standards developed by the <strong>Committee on Publication Ethics (COPE)</strong> to avoid any malpractices by all concerned including authors, reviewers, editors and publishers. This is in accordance with the <strong>BOAI</strong> definition of open access. We are committed and promise to take this journal to greater heights. We invites authors for the guest editorship, reviewers, program for improving the journal quality and also sharing the innovative ideas.</p> <p style="text-align: justify; font-family: georgia,serif; font-size: 16px; line-height: 25px; color: #666;"><strong>Frequency : Six issues/year </strong></p> <p><strong><span style="text-align: justify; font-family: georgia,serif; font-size: 16px; line-height: 25px; color: #666;">Submit Article at </span><span style="text-align: justify; font-family: georgia,serif; font-size: 16px; line-height: 25px; color: #0066ff;">submitpaper@ijact.org </span></strong></p> en-US editor@ijact.org (Dr. Amrendra Singh Yadav) editor@ijact.org (Himanshu Ojha) Fri, 25 Apr 2025 00:00:00 +0000 OJS 3.1.1.4 http://blogs.law.harvard.edu/tech/rss 60 Enhanced Reversible Data Hiding for Encrypted Image Based on Block Mean Difference Histogram Shifting and BPHST http://ijact.org/index.php/ijact/article/view/157 This paper proposes an improved reversible data hiding method for encrypted images, utilizing Block Prediction Histogram Shifting Technique (BPHST). Reversible data hiding (RDH) ensures both secure data embedding and complete recovery of the original image post-extraction. Our proposed BPHST approach is based on bit-level shifting and histogram manipulation of block mean differences within encrypted image segments. The method extracts the mean difference from encrypted blocks and constructs a histogram using additive homomorphic properties, allowing precise data embedding via histogram shifting. This technique ensures that data extraction is separable from image decryption by preserving the difference prediction before and after encryption. Compared to previous methods relying on sorting, prediction, and histogram adjustment, BPHST achieves better error rate management, enhanced robustness, and secure data embedding. The proposed method effectively balances high data security, imperceptibility, and reversibility, making it suitable for sensitive multimedia applications. Furthermore, BPHST demonstrates improved Peak Signal-to-Noise Ratio (PSNR) and lower Mean Squared Error (MSE), ensuring high fidelity in image recovery. This makes BPHST a promising technique for secure, reversible information hiding in encrypted images. Jigisha Mehra, Amit Jha, Kamini Maheshwar ##submission.copyrightStatement## http://ijact.org/index.php/ijact/article/view/157 Mon, 07 Jul 2025 18:42:11 +0000