Date post: | 05-Dec-2014 |
Category: |
Education |
Upload: | papitha-velumani |
View: | 343 times |
Download: | 1 times |
REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING
ROOM BEFORE ENCRYPTION
Presented by:
LansA Informatics Pvt Ltd
ABSTRACTRecently, more and more attention is paid to reversible data hiding (RDH) in encrypted images, since it maintains the excellent property that the original cover can be losslessly recovered after embedded data is extracted while protecting the image content’s confidentiality. All previous methods embed data by reversibly vacating room from the encrypted images, which may be subject to some errors on data extraction and/or image restoration. In this paper, we propose a novel method by reserving room before encryption with a traditional RDH algorithm, and thus it is easy for the data hider to reversibly embed data in the encrypted image. The proposed method can achieve real reversibility, that is, data extraction and image recovery are free of any error. Experiments show that this novel method can embed more than 10 times as large payloads for the same image quality as the previous methods, such as for PSNR =40dB.
EXISTING SYSTEM
In this framework, a content owner encrypts the original image using a standard cipher with an encryption key. After producing the encrypted image, the content owner hands over it to a data hider (e.g., a database manager) and the data hider can embed some auxiliary data into the encrypted image by losslessly vacating some room according to a data hiding key. Then a receiver, maybe the content owner himself or an authorized third party can extract the embedded data with the data hiding key and further recover the original image from the encrypted version according to the encryption key
DISADVANTAGES OF EXISTING SYSTEM
All previous methods embed data by reversibly vacating room from the encrypted images, which may be subject to some errors on data extraction and/or image restoration.
It is difficult for data hider to reversibly hide the data behind the image.
PROPOSED SYSTEM Since losslessly vacating room from the encrypted
images is relatively difficult and sometimes inefficient, why are we still so obsessed to find novel RDH techniques working directly for encrypted images? If we reverse the order of encryption and vacating room, i.e., reserving room prior to image encryption at content owner side, the RDH tasks in encrypted images would be more natural and much easier which leads us to the novel framework, “reserving room before encryption (RRBE)”.
Obviously, standard RDH algorithms are the ideal operator for reserving room before encryption and can be easily applied to Framework RRBE to achieve better performance compared with techniques from Framework VRAE.
ADVANTAGES OF PROPOSED SYSTEM
In this system it uses traditional RDH algorithm, and thus it is easy for the data hider to reversibly embed data in the encrypted image.
Using this system data extraction and image recovery are free of any error.
SYSTEM CONFIGURATION:-
HARDWARE REQUIREMENTS:-
Processor - Pentium –IVSpeed - 1.1 GhzRAM - 512 MB(min)Hard Disk - 40 GBKey Board - Standard Windows KeyboardMouse - Two or Three Button MouseMonitor - LCD/LED
SYSTEM ARCHITECHTURE
SYSTEM CONFIGURATION:-
SOFTWARE REQUIREMENTS:-
Operating system: Windows XP.Coding Language : AndroidData Base : SQLiteTool : Eclipse.
MODULES
Authentication:
In this module it allows user to enter the user name and password in order to restrict the user to access the system. Then it validates the entered user name and password, if it is correct it will allow the user to access the application.
Change Password:
In this module it allows user to change the password as required. For that user has to enter the old password and then the new password. If it matches then the changes will be carried out.
Encrypt:
In this module it allows to pick the image from the gallery and then to enter the password key for encryption after that has to enter the message, that have to be encrypted. Once this all over, encryption is carried out.
Decrypt:
In this module it allows to pick the encrypted image from the gallery and then to enter the password key to decrypt. If the image and the key is correct then the corresponding message will be displayed.
Histogram:
In this module it compares the histogram of the image before encryption and the image after encryption.
Database:
In this module stores the username and password to order for authentication and also the key to decrypt the message from the image.
Screen shot I
Screen shot II
Screen shot III
Screen shot IV
REFERENCE:
Kede Ma, Weiming Zhang, Xianfeng Zhao, Nenghai Yu, and Fenghua Li,
“REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY
RESERVING ROOM BEFORE ENCRYPTION” IEEE
TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY,
VOL. 8, NO. 3, MARCH 2013.
OFFICE ADDRESS:LansA Informatics Pvt ltdNo 165, 5th Street, Crosscut Road, Gandhipuram, Coimbatore - 641 015
OTHER MODE OF CONTACT:
Landline: 0422 – 4204373Mobile : +91 90 953 953 33 +91 91 591 159 69
Email ID: [email protected]: www.lansainformatics.comBlog: www.lansastudentscdc.blogspot.comFacebook: www.facebook.com/lansainformaticsTwitter: www.twitter.com/lansainformatic
CONTACT US