Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Optimized Reversible Data Hiding Technique for
Secured Data Transmission
Guide:- Submitted by:
Himanshu bal
Department of ...
PROBLEM DEFINITION
Discussing a solution for reversible data hiding by optimizing the
techniques presently available for s...
OBJECTIVE:
1. Generate an optimized reversible data hiding technique to overcome the issues in
current RHD trends like:
1....
INTRODUCTION
1. Steganography is the art or practice of concealing a message, image, or file
within another message, image...
WHY STEGANOGRAPHY
OVER
CRYPTOGRAPHY????
TE(IT)seminar 14/3/2016 pgno.2 slideno.5
Optimized Reversible Data Hiding Techniqu...
LITERATURE SURVEY
DIFFERENT RDH METHODS:
1. Tian's method of LSB (2003). J. Tian, Reversible data embedding using a differ...
RELATED WORKS
TE(IT)seminar 14/3/2016 pgno.2 slideno. 7
Optimized Reversible Data Hiding Technique for Secured Data Transm...
NE ET AL’S METHOD OF HISTOGRAM
SHIFTING
1. The method modifies the pixel-pairs with differences 1 or -1 to carry data.
2. ...
NE ET AL’S METHOD OF HISTOGRAM
SHIFTING contd.
1.Then the information bits can be extracted as
2.And finally the original ...
NOW LETS’S COME TO OUR NEW
ENHANCED METHOD
TE(IT)seminar 14/3/2016 pgno.4 slideno.10
Optimized Reversible Data Hiding Tech...
ARCHITECTURE FOR EMBEDDING
AND EXTRACTION
ARCHITECTURE FOR EMBEDDING ARCHITECTURE FOR EXTRACTION
TE(IT)seminar 14/3/2016 p...
WORKING OF HISTOGRAM SHIFTING
BASED RDH METHOD
THE HISTOGRAM SHIFTING BASED RHD METHOD REQUIRE FOUR
STEPS TO COMPLETE THE ...
HISTOGRAM SHIFTING CONSISTS OF
FOLLOWING STEPS
1. Computing difference image for gray scale
2. Using histogram bins for ex...
ENCODING PROCESS
1. Data compression.
2. Using run length encoding.
3. Counting the runs.
TE(IT)seminar 14/3/2016 pgno.5 s...
EMBEDDING PROCESS
1. Dividing the host image into non overlapping blocks.
2. Using LSB replacement to embed the location m...
WORKING PRINCIPLE FOR
EMBEDDING ANY TYPE OF MESSAGE
INFO HIDDEN
INFO
HIDDEN
INFO
STEGO
KEY
COVER
MEDIUM
STEGO
OUTPUT
TE(IT...
EXTRACTION PROCESS
1. Dividing the marked image blocks.
2. determining the location map.
3. Extraction the embedded data.
...
RESULTS OF HISTOGRAM METHOD
ORIGINAL IMAGE IMAGE AFTER EMBEDDING
HISTOGRAM BASED ON ORIGINAL IMAGE
SHIFTED AND EMBEDDED HI...
PSNR VS EMBEDDING RATE
TE(IT)seminar 14/3/2016 pgno. 8 slideno.19
PERFORMANCE ANALYSIS
Optimized Reversible Data Hiding Te...
MOTIVATION
TE(IT)seminar 14/3/2016 pgno.8 slideno. 20
Optimized Reversible Data Hiding Technique for Secured Data Transmis...
ADVANTAGES
1. The embedding capacity has been enhanced.
2. The distortion ration is reduced.
3. Better utilization of 2D h...
CONCLUSION
This algorithm can achieve a better performance compared with the
state-of-the-art works. So the proposed frame...
TE(IT)seminar 14/3/2016 pgno. slideno. 23
Optimized Reversible Data Hiding Technique for Secured Data Transmission
Upcoming SlideShare
Loading in …5
×

Reversible data hiding using histogram shifting method

this is a ppt about rdh method using histogram shifting method anyone can contact me for more help like research papers related to this topic at himanshub536@gmail.com

  • Login to see the comments

Reversible data hiding using histogram shifting method

  1. 1. Optimized Reversible Data Hiding Technique for Secured Data Transmission Guide:- Submitted by: Himanshu bal Department of Information Technology 2015-2016 TE(IT)seminar 14/3/2016 pgno.1 slideno. 1
  2. 2. PROBLEM DEFINITION Discussing a solution for reversible data hiding by optimizing the techniques presently available for secured data transmission. TE(IT)seminar 14/3/2016 pgno.1 slideno. 2 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  3. 3. OBJECTIVE: 1. Generate an optimized reversible data hiding technique to overcome the issues in current RHD trends like: 1. Low embedding capacity 2. High distortion rate etc. 3. Low utilization of 2D histogram TE(IT)seminar 14/3/2016 pgno. 1 slideno. 3 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  4. 4. INTRODUCTION 1. Steganography is the art or practice of concealing a message, image, or file within another message, image, or file. 2. The word steganography combines the Ancient Greek words steganos, meaning "covered, concealed, or protected”. 3. One of its application is Reversible data hiding (RHD). 4. Reversible data hiding (RDH) is used to embed secret message into a cover image by slightly modifying its pixel values. TE(IT)seminar 14/3/2016 pgno. 1 slideno.4 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  5. 5. WHY STEGANOGRAPHY OVER CRYPTOGRAPHY???? TE(IT)seminar 14/3/2016 pgno.2 slideno.5 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  6. 6. LITERATURE SURVEY DIFFERENT RDH METHODS: 1. Tian's method of LSB (2003). J. Tian, Reversible data embedding using a difference expansion, IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890– 896,Aug.2003 2. Ni et al’s method of histogram shifting (2006). Reversible image watermarking on prediction errors by efficient histogram modification, Signal Process., vol. 92,no. 12, pp. 3000–3009, Dec. 2006. 3. Thodi and Rodriguez hybrid method (2012). , “A Novel Reversible Data Hiding Scheme Based on Two-Dimensional Difference-Histogram Modification”, IEEE Transactions on Information Forensics and Security, July 2012. TE(IT)seminar 14/3/2016 pgno.2 slideno.6 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  7. 7. RELATED WORKS TE(IT)seminar 14/3/2016 pgno.2 slideno. 7 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  8. 8. NE ET AL’S METHOD OF HISTOGRAM SHIFTING 1. The method modifies the pixel-pairs with differences 1 or -1 to carry data. 2. For data embedding, the difference image is first computed for a gray-scale cover image using formula : D(i,j) = I(i, 2j + 1) – I(i, 2j) 3. Then marked image is obtained as TE(IT)seminar 14/3/2016 pgno.3 slideno.8 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  9. 9. NE ET AL’S METHOD OF HISTOGRAM SHIFTING contd. 1.Then the information bits can be extracted as 2.And finally the original picture can be recovered 3.Here the difference Dm(i,j) = Im(i,2j+1) – Im(i, 2j) is the difference value computed from the marked image. TE(IT)seminar 14/3/2016 pgno. 3 slideno. 9 Optimized Reversible Data Hiding Technique for Secured Data Transmission b= 0, if Dm(i,j)=-1 1, if Dm(i,j)=+1
  10. 10. NOW LETS’S COME TO OUR NEW ENHANCED METHOD TE(IT)seminar 14/3/2016 pgno.4 slideno.10 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  11. 11. ARCHITECTURE FOR EMBEDDING AND EXTRACTION ARCHITECTURE FOR EMBEDDING ARCHITECTURE FOR EXTRACTION TE(IT)seminar 14/3/2016 pgno. 4 slideno.11 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  12. 12. WORKING OF HISTOGRAM SHIFTING BASED RDH METHOD THE HISTOGRAM SHIFTING BASED RHD METHOD REQUIRE FOUR STEPS TO COMPLETE THE PROCESS: 1. Histogram shifting 2. Encoding process 3. Embedding process 4. Extraction process TE(IT)seminar 14/3/2016 pgno. 5 slideno. 12 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  13. 13. HISTOGRAM SHIFTING CONSISTS OF FOLLOWING STEPS 1. Computing difference image for gray scale 2. Using histogram bins for expansion embedding 3. Modification of pixels TE(IT)seminar 14/3/2016 pgno.5 slideno. 13 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  14. 14. ENCODING PROCESS 1. Data compression. 2. Using run length encoding. 3. Counting the runs. TE(IT)seminar 14/3/2016 pgno.5 slideno.14 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  15. 15. EMBEDDING PROCESS 1. Dividing the host image into non overlapping blocks. 2. Using LSB replacement to embed the location mapping. 3. embed the LSB sequence Into using shifting and embedding functions Illustration of the data embedding TE(IT)seminar 14/3/2016 pgno.6 slideno. 15 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  16. 16. WORKING PRINCIPLE FOR EMBEDDING ANY TYPE OF MESSAGE INFO HIDDEN INFO HIDDEN INFO STEGO KEY COVER MEDIUM STEGO OUTPUT TE(IT)seminar 14/3/2016 pgno.6 slideno. 16 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  17. 17. EXTRACTION PROCESS 1. Dividing the marked image blocks. 2. determining the location map. 3. Extraction the embedded data. TE(IT)seminar 14/3/2016 pgno.7 slideno.17 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  18. 18. RESULTS OF HISTOGRAM METHOD ORIGINAL IMAGE IMAGE AFTER EMBEDDING HISTOGRAM BASED ON ORIGINAL IMAGE SHIFTED AND EMBEDDED HISTOGRAM TE(IT)seminar 14/3/2016 pgno.7 slideno. 18 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  19. 19. PSNR VS EMBEDDING RATE TE(IT)seminar 14/3/2016 pgno. 8 slideno.19 PERFORMANCE ANALYSIS Optimized Reversible Data Hiding Technique for Secured Data Transmission
  20. 20. MOTIVATION TE(IT)seminar 14/3/2016 pgno.8 slideno. 20 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  21. 21. ADVANTAGES 1. The embedding capacity has been enhanced. 2. The distortion ration is reduced. 3. Better utilization of 2D histogram. 4. Better recovery of image. TE(IT)seminar 14/3/2016 pgno. 9 slideno. 21 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  22. 22. CONCLUSION This algorithm can achieve a better performance compared with the state-of-the-art works. So the proposed framework has a potential to provide excellent RDH algorithms. TE(IT)seminar 14/3/2016 pgno.11 slideno.22 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  23. 23. TE(IT)seminar 14/3/2016 pgno. slideno. 23 Optimized Reversible Data Hiding Technique for Secured Data Transmission

×