Reversible data hiding in encrypted images by reserving room before encryption

Preview:

DESCRIPTION

TO GET THIS PROJECT THROUGH ONLINE OR TRAINING SESSION CONTACT: LansA Informatics Pvt Ltd No 165, 5th Street, Crosscut road, Gandhipuram, Coimbatore - 641 012 Landline: 0422 - 4204373 Mobile: +91 90 953 953 33 Email :lansa.projects@gmail.com Website: www.lansainformatics.com Blog: www.lansastudentscdc.blogspot.com

Citation preview

REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING

ROOM BEFORE ENCRYPTION

Presented by:

LansA Informatics Pvt Ltd

ABSTRACTRecently, more and more attention is paid to reversible data hiding (RDH) in encrypted images, since it maintains the excellent property that the original cover can be losslessly recovered after embedded data is extracted while protecting the image content’s confidentiality. All previous methods embed data by reversibly vacating room from the encrypted images, which may be subject to some errors on data extraction and/or image restoration. In this paper, we propose a novel method by reserving room before encryption with a traditional RDH algorithm, and thus it is easy for the data hider to reversibly embed data in the encrypted image. The proposed method can achieve real reversibility, that is, data extraction and image recovery are free of any error. Experiments show that this novel method can embed more than 10 times as large payloads for the same image quality as the previous methods, such as for PSNR =40dB.

EXISTING SYSTEM

In this framework, a content owner encrypts the original image using a standard cipher with an encryption key. After producing the encrypted image, the content owner hands over it to a data hider (e.g., a database manager) and the data hider can embed some auxiliary data into the encrypted image by losslessly vacating some room according to a data hiding key. Then a receiver, maybe the content owner himself or an authorized third party can extract the embedded data with the data hiding key and further recover the original image from the encrypted version according to the encryption key

DISADVANTAGES OF EXISTING SYSTEM

All previous methods embed data by reversibly vacating room from the encrypted images, which may be subject to some errors on data extraction and/or image restoration.

It is difficult for data hider to reversibly hide the data behind the image.

PROPOSED SYSTEM Since losslessly vacating room from the encrypted

images is relatively difficult and sometimes inefficient, why are we still so obsessed to find novel RDH techniques working directly for encrypted images? If we reverse the order of encryption and vacating room, i.e., reserving room prior to image encryption at content owner side, the RDH tasks in encrypted images would be more natural and much easier which leads us to the novel framework, “reserving room before encryption (RRBE)”.

Obviously, standard RDH algorithms are the ideal operator for reserving room before encryption and can be easily applied to Framework RRBE to achieve better performance compared with techniques from Framework VRAE.

ADVANTAGES OF PROPOSED SYSTEM

In this system it uses traditional RDH algorithm, and thus it is easy for the data hider to reversibly embed data in the encrypted image.

Using this system data extraction and image recovery are free of any error.

SYSTEM CONFIGURATION:-

HARDWARE REQUIREMENTS:-

Processor - Pentium –IVSpeed - 1.1 GhzRAM - 512 MB(min)Hard Disk - 40 GBKey Board - Standard Windows KeyboardMouse - Two or Three Button MouseMonitor - LCD/LED

SYSTEM ARCHITECHTURE

SYSTEM CONFIGURATION:-

SOFTWARE REQUIREMENTS:-

Operating system: Windows XP.Coding Language : AndroidData Base : SQLiteTool : Eclipse.

MODULES

Authentication:

In this module it allows user to enter the user name and password in order to restrict the user to access the system. Then it validates the entered user name and password, if it is correct it will allow the user to access the application.

 

Change Password:

In this module it allows user to change the password as required. For that user has to enter the old password and then the new password. If it matches then the changes will be carried out.

 

Encrypt:

In this module it allows to pick the image from the gallery and then to enter the password key for encryption after that has to enter the message, that have to be encrypted. Once this all over, encryption is carried out.

 

Decrypt:

In this module it allows to pick the encrypted image from the gallery and then to enter the password key to decrypt. If the image and the key is correct then the corresponding message will be displayed.

Histogram:

In this module it compares the histogram of the image before encryption and the image after encryption.

 

 

Database:

In this module stores the username and password to order for authentication and also the key to decrypt the message from the image.

Screen shot I

Screen shot II

Screen shot III

Screen shot IV

REFERENCE:

Kede Ma, Weiming Zhang, Xianfeng Zhao, Nenghai Yu, and Fenghua Li,

“REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY

RESERVING ROOM BEFORE ENCRYPTION” IEEE

TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY,

VOL. 8, NO. 3, MARCH 2013.

OFFICE ADDRESS:LansA Informatics Pvt ltdNo 165, 5th Street, Crosscut Road, Gandhipuram, Coimbatore - 641 015

OTHER MODE OF CONTACT:

Landline: 0422 – 4204373Mobile : +91 90 953 953 33 +91 91 591 159 69

Email ID: lansa.projects@gmail.comweb: www.lansainformatics.comBlog: www.lansastudentscdc.blogspot.comFacebook: www.facebook.com/lansainformaticsTwitter: www.twitter.com/lansainformatic

CONTACT US

Recommended