18
REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE ENCRYPTION Presented by: LansA Informatics Pvt Ltd

Reversible data hiding in encrypted images by reserving room before encryption

Embed Size (px)

DESCRIPTION

TO GET THIS PROJECT THROUGH ONLINE OR TRAINING SESSION CONTACT: LansA Informatics Pvt Ltd No 165, 5th Street, Crosscut road, Gandhipuram, Coimbatore - 641 012 Landline: 0422 - 4204373 Mobile: +91 90 953 953 33 Email :[email protected] Website: www.lansainformatics.com Blog: www.lansastudentscdc.blogspot.com

Citation preview

Page 1: Reversible data hiding in encrypted images by reserving room before encryption

REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING

ROOM BEFORE ENCRYPTION

Presented by:

LansA Informatics Pvt Ltd

Page 2: Reversible data hiding in encrypted images by reserving room before encryption

ABSTRACTRecently, more and more attention is paid to reversible data hiding (RDH) in encrypted images, since it maintains the excellent property that the original cover can be losslessly recovered after embedded data is extracted while protecting the image content’s confidentiality. All previous methods embed data by reversibly vacating room from the encrypted images, which may be subject to some errors on data extraction and/or image restoration. In this paper, we propose a novel method by reserving room before encryption with a traditional RDH algorithm, and thus it is easy for the data hider to reversibly embed data in the encrypted image. The proposed method can achieve real reversibility, that is, data extraction and image recovery are free of any error. Experiments show that this novel method can embed more than 10 times as large payloads for the same image quality as the previous methods, such as for PSNR =40dB.

Page 3: Reversible data hiding in encrypted images by reserving room before encryption

EXISTING SYSTEM

In this framework, a content owner encrypts the original image using a standard cipher with an encryption key. After producing the encrypted image, the content owner hands over it to a data hider (e.g., a database manager) and the data hider can embed some auxiliary data into the encrypted image by losslessly vacating some room according to a data hiding key. Then a receiver, maybe the content owner himself or an authorized third party can extract the embedded data with the data hiding key and further recover the original image from the encrypted version according to the encryption key

Page 4: Reversible data hiding in encrypted images by reserving room before encryption

DISADVANTAGES OF EXISTING SYSTEM

All previous methods embed data by reversibly vacating room from the encrypted images, which may be subject to some errors on data extraction and/or image restoration.

It is difficult for data hider to reversibly hide the data behind the image.

Page 5: Reversible data hiding in encrypted images by reserving room before encryption

PROPOSED SYSTEM Since losslessly vacating room from the encrypted

images is relatively difficult and sometimes inefficient, why are we still so obsessed to find novel RDH techniques working directly for encrypted images? If we reverse the order of encryption and vacating room, i.e., reserving room prior to image encryption at content owner side, the RDH tasks in encrypted images would be more natural and much easier which leads us to the novel framework, “reserving room before encryption (RRBE)”.

Obviously, standard RDH algorithms are the ideal operator for reserving room before encryption and can be easily applied to Framework RRBE to achieve better performance compared with techniques from Framework VRAE.

Page 6: Reversible data hiding in encrypted images by reserving room before encryption

ADVANTAGES OF PROPOSED SYSTEM

In this system it uses traditional RDH algorithm, and thus it is easy for the data hider to reversibly embed data in the encrypted image.

Using this system data extraction and image recovery are free of any error.

Page 7: Reversible data hiding in encrypted images by reserving room before encryption

SYSTEM CONFIGURATION:-

HARDWARE REQUIREMENTS:-

Processor - Pentium –IVSpeed - 1.1 GhzRAM - 512 MB(min)Hard Disk - 40 GBKey Board - Standard Windows KeyboardMouse - Two or Three Button MouseMonitor - LCD/LED

Page 8: Reversible data hiding in encrypted images by reserving room before encryption

SYSTEM ARCHITECHTURE

Page 9: Reversible data hiding in encrypted images by reserving room before encryption

SYSTEM CONFIGURATION:-

SOFTWARE REQUIREMENTS:-

Operating system: Windows XP.Coding Language : AndroidData Base : SQLiteTool : Eclipse.

Page 10: Reversible data hiding in encrypted images by reserving room before encryption

MODULES

Authentication:

In this module it allows user to enter the user name and password in order to restrict the user to access the system. Then it validates the entered user name and password, if it is correct it will allow the user to access the application.

 

Change Password:

In this module it allows user to change the password as required. For that user has to enter the old password and then the new password. If it matches then the changes will be carried out.

 

Page 11: Reversible data hiding in encrypted images by reserving room before encryption

Encrypt:

In this module it allows to pick the image from the gallery and then to enter the password key for encryption after that has to enter the message, that have to be encrypted. Once this all over, encryption is carried out.

 

Decrypt:

In this module it allows to pick the encrypted image from the gallery and then to enter the password key to decrypt. If the image and the key is correct then the corresponding message will be displayed.

Page 12: Reversible data hiding in encrypted images by reserving room before encryption

Histogram:

In this module it compares the histogram of the image before encryption and the image after encryption.

 

 

Database:

In this module stores the username and password to order for authentication and also the key to decrypt the message from the image.

Page 13: Reversible data hiding in encrypted images by reserving room before encryption

Screen shot I

Page 14: Reversible data hiding in encrypted images by reserving room before encryption

Screen shot II

Page 15: Reversible data hiding in encrypted images by reserving room before encryption

Screen shot III

Page 16: Reversible data hiding in encrypted images by reserving room before encryption

Screen shot IV

Page 17: Reversible data hiding in encrypted images by reserving room before encryption

REFERENCE:

Kede Ma, Weiming Zhang, Xianfeng Zhao, Nenghai Yu, and Fenghua Li,

“REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY

RESERVING ROOM BEFORE ENCRYPTION” IEEE

TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY,

VOL. 8, NO. 3, MARCH 2013.

Page 18: Reversible data hiding in encrypted images by reserving room before encryption

OFFICE ADDRESS:LansA Informatics Pvt ltdNo 165, 5th Street, Crosscut Road, Gandhipuram, Coimbatore - 641 015

OTHER MODE OF CONTACT:

Landline: 0422 – 4204373Mobile : +91 90 953 953 33 +91 91 591 159 69

Email ID: [email protected]: www.lansainformatics.comBlog: www.lansastudentscdc.blogspot.comFacebook: www.facebook.com/lansainformaticsTwitter: www.twitter.com/lansainformatic

CONTACT US