SlideShare a Scribd company logo
1 of 3
Download to read offline
IJSRD - International Journal for Scientific Research & Development| Vol. 3, Issue 10, 2015 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 195
Secret-Fragment-Visible Mosaic Image-Creation and Recovery via Color
Transformation
Remya R P1
Harikrishnan M P2
1
P.G. Student 2
Assistant Professor
1,2
Department of Electronics & Communication Engineering
1,2
Al-Azhar College of Engineering and Technology, Thodupuzha (Kerala), India
Abstract— Secret-fragment-visible mosaic image which
automatically transforms the secret image into a meaningful
mosaic image of the same size. The mosaic image looks like
to an arbitrarily selected target image. It may be used as a
camouflage of the secret image and yielded by dividing the
secret image into fragments and transforming their color
characteristics to the corresponding blocks of the target
image. Some technologies are designed to conduct the color
transformation process so that the secret image may be
recovered. The information required for recovering the
secret is embedding into the created mosaic image. Good
experimental results are showing the feasibility of the
proposed method.
Key words: Color Transformation, Image Encryption, Data
Hiding, Image Transmission, Mosaic Image
I. INTRODUCTION
Now a days, various source images are transmitted and used
through the internet for various applications, such as
military applications, photography, document storages etc.
Currently there are two methods have been proposed for the
transmissions, ie; image encryption and data hiding.
The image encryption is the process to transmit the
image securely so that no unauthorized user can able to
decrypt the image. Video encryption, image encryption,
chaos based encryption is the applications in many fields
including the medical imaging, internet communication,
transmission. The evolution of encryption is towards to the
future possibilities. The image data has the special
properties such as high redundancy and high correlation
among the pixels. Encryption techniques is used to protect
secret information. Encryption is defined as the conversion
of plain message, is called a cipher text which cannot be
read by the people without decrypting the encrypted text.
Decryption is the reverse process of encryption which
process in the conversion of the encrypted text to the
original plain text, so that it can be read.
In this paper, the proposed method says, a new
technique for secure image transmission is defined, which
transforms a secret image into a meaningful mosaic image.
They have the same size and looking like a preselected
target image. The transformation process which is controlled
by a secret key. This key can a person recover the secret
image from the mosaic image. The proposed method is by
Lai and Tsai [1], in which a new type of computer art image,
called secret-fragment-visible mosaic image is proposed.
The mosaic image is the result of the fragments that a secret
image in disguise of another image. It is called the target
image. The weakness of Lai and Tsai [1] is the requirement
of a large image database so that the image can be
sufficiently similar to the selected target image. The user is
not allowed to select their image for use as the target image.
Therefore in this study to remove this weakness of the
method while keeping its merit. The aim is to design a new
method that can transform a secret image into a secret-
fragment-visible mosaic image of the same size. The visual
appearance of the freely selected target image without the
need of a database.
II. IMPLEMENTATION
The idea of the proposed method is shown in the fig: The
proposed method includes two main phases 1) mosaic image
creation and2) secret image recovery.
Fig 1: Flow diagram of the proposed method.
Step by step of the Implementation Algorithm. The first
phase includes mosaic image creation.
1) Fitting the tile images into the target blocks of a
preselected target image
2) Transforming the color characteristics[3] of the tile
image in the secret image and the corresponding
target block in the target image
3) Rotating each tile image into a direction with the
minimum RMSE
4) Embedding the information into the created mosaic
image for future recovery of the secret image.
The second phase includes secret image recovery
 Extracting the embedded information for secret
image recovery from the mosaic image
 Recovering the secret image using the extracted
information.
III. ALGORITHMS OF THE PROPOSED METHOD
There are two algorithms based on the above discussions
A. Algorithm 1: Mosaic Image Creation
Input: a secret-fragment-visible mosaic image F.
Steps:
 Stage 1. The tile images is fitting into the target
blocks.
Secret-Fragment-Visible Mosaic Image-Creation and Recovery via Color Transformation
(IJSRD/Vol. 3/Issue 10/2015/045)
All rights reserved by www.ijsrd.com 196
 Step 1. If the size of the target image is different
from that of the secret image then change the size to
be identical .
 Step 2.The means and the standard deviations of each
tile images are calculated.
 Step 3.Sort the tile images according to the computed
average standard deviation values of the blocks and
map in order the blocks in the sorted to those in the
sorted.
 Step 4.Create a mosaic image by fitting the tile
images
 into the corresponding target blocks.
 Stage 2.The color transformation between the tile
images and the target blocks are performed.
 Step 5. Create a counting table TB with 256 entries.
 Step 6. For each mapping Ti →Bji in sequence L,
represent
 the means μc and μ’
c of Ti and Bji, respectively.
 Stage 3.The tile images rotation.
 Step 8.The RMSE values are calculated.
 Step 9:Compute Huffman table.
B. Algorithm 2: Recovery of Secret Image.
Input: a mosaic image F with n tile images and the secret
key K.
Output: secret image S.
Steps:
 Stage 1: Extracting the secret image information.
 Step 1. Extract from F the bit stream I by a reverse
version of the scheme proposed in [2] and decode
them to obtain the data items: 1) the number of
iterations is embedded; 2) the total number of used
pixel pairs Npair in the last iteration; and 3)for
encoding the values of the residuals of the overflows
or underflows Huffman table is calculated.
 Step 2. Extract the bit stream M’
t using the values of
Niand
 Npair by the same scheme used in the last step.
 Step 3. Decryption of the bit stream M’
into Mt by K.
 Step 4. Decompose Mtinto n bit streams.
 Step 5. Decode Mi for each tile image Ti to obtain the
following data items: 1) the block Bji in F
corresponding to Ti; 2) the optimal rotation angle θ°
of Ti; 3) the means of Ti and Bji and the related
standard deviation quotients of all color channels; and
4) the overflow/underflow residual values in
Tidecoded by the Huffman table HT.
 Stage 2. Recovering the secret image.
 Step 6. Recover one by one in a raster-scan order the
tile images Ti
 Step 7. Compose all the final tile images to form the
desired secret image S as output.
IV. RESULTS
Experimental results of the proposed system. In first phase
the cover image is taken as the input image.
Fig. 2: Input image
In fig 2: the cover image is taken as the input
image. A secret image, target image and secret key is the
inputs.
Fig. 3: Target Image
Fig 3 is the target image. In this the tile image is
fitting into the target image.
Fig 4: Output image
In this fig 4, the secret image is hide into the target
image
Secret-Fragment-Visible Mosaic Image-Creation and Recovery via Color Transformation
(IJSRD/Vol. 3/Issue 10/2015/045)
All rights reserved by www.ijsrd.com 197
Fig. 5: Recover image
In fig 5 the secret images is recover from the target
image
V. CONCLUSION
A secret-fragment-visible mosaic image transmission
method has been proposed, which can create meaningful
mosaic image and also transforms a secret image into a
mosaic image of same size for use as a camouflage of the
secret image. The original data is hiding into the target
image. This target image has the same size as the original
image. There is no loss of data and error free. No noise is
found in these images. Experimental results are shown, it
refers the feasibility of the proposed method. The future
works may be described by applying the proposed method to
images of color models other than the RGB.
ACKNOWLEDGMENT
I would like to thank the reviewers for their helpful
suggestions, which improved the quality of this review.
REFERENCES
[1] I. J. Lai and W. H. Tsai, ―Secret-fragment-visible
mosaic image—A new computer art and its application
to information hiding,‖ IEEE Trans. Inf.Forens. Secur.,
vol. 6, no. 3, pp. 936–945, Sep. 2011.
[2] D. Coltuc and J.-M. Chassery, ―Very fast watermarking
by reversible contrast mapping,‖ IEEE Signal Process.
Lett., vol. 14, no. 4, pp. 255–258, Apr. 2007.
[3] E. Reinhard, M. Ashikhmin, B. Gooch, and P. Shirley,
―Color transfer between images,‖ IEEE Comput. Graph.
Appl., vol. 21, no. 5, pp. 34–41, Sep.–Oct. 2001.
[4] Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, ―Reversible
data hiding,‖ IEEE Trans. Circuits Syst. Video
Technol., vol. 16, no. 3, pp. 354–362, Mar.2006
[5] X. Li, B. Yang, and T. Zeng, ―Efficient reversible
watermarking basedon adaptive prediction-error
expansion and pixel selection,‖ IEEE Trans. Image
Process., vol. 20, no. 12, pp. 3524–3533, Dec. 2011.

More Related Content

What's hot

A proposed accelerated image copy-move forgery detection-vcip2014
A proposed accelerated image copy-move forgery detection-vcip2014A proposed accelerated image copy-move forgery detection-vcip2014
A proposed accelerated image copy-move forgery detection-vcip2014SondosFadl
 
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityGenetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityIDES Editor
 
Human Head Counting and Detection using Convnets
Human Head Counting and Detection using ConvnetsHuman Head Counting and Detection using Convnets
Human Head Counting and Detection using Convnetsrahulmonikasharma
 
06 17443 an neuro fuzzy...
06 17443 an neuro fuzzy...06 17443 an neuro fuzzy...
06 17443 an neuro fuzzy...IAESIJEECS
 
E4040.2016Fall.NAAS.report.gx2127.hs2917.kp2699
E4040.2016Fall.NAAS.report.gx2127.hs2917.kp2699E4040.2016Fall.NAAS.report.gx2127.hs2917.kp2699
E4040.2016Fall.NAAS.report.gx2127.hs2917.kp2699Guowei Xu
 
FAN search for image copy-move forgery-amalta 2014
 FAN search for image copy-move forgery-amalta 2014 FAN search for image copy-move forgery-amalta 2014
FAN search for image copy-move forgery-amalta 2014SondosFadl
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsEswar Publications
 
Improving Performance of Multileveled BTC Based CBIR Using Sundry Color Spaces
Improving Performance of Multileveled BTC Based CBIR Using Sundry Color SpacesImproving Performance of Multileveled BTC Based CBIR Using Sundry Color Spaces
Improving Performance of Multileveled BTC Based CBIR Using Sundry Color SpacesCSCJournals
 
E4040.2016 fall.cjmd.report.ce2330.jb3852.jdr2162
E4040.2016 fall.cjmd.report.ce2330.jb3852.jdr2162E4040.2016 fall.cjmd.report.ce2330.jb3852.jdr2162
E4040.2016 fall.cjmd.report.ce2330.jb3852.jdr2162Jose Daniel Ramirez Soto
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...IRJET Journal
 
Finger Print Image Compression for Extracting Texture Features and Reconstru...
Finger Print Image Compression for Extracting Texture Features  and Reconstru...Finger Print Image Compression for Extracting Texture Features  and Reconstru...
Finger Print Image Compression for Extracting Texture Features and Reconstru...IOSR Journals
 
IRJET- Efficient Image Encryption with Pixel Scrambling and Genetic Algorithm
IRJET- Efficient Image Encryption with Pixel Scrambling and Genetic AlgorithmIRJET- Efficient Image Encryption with Pixel Scrambling and Genetic Algorithm
IRJET- Efficient Image Encryption with Pixel Scrambling and Genetic AlgorithmIRJET Journal
 
An application of morphological
An application of morphologicalAn application of morphological
An application of morphologicalNaresh Chilamakuri
 
Cryptanalysis of image encryption using traditional encryption tecnhniques
Cryptanalysis of image encryption using traditional encryption tecnhniquesCryptanalysis of image encryption using traditional encryption tecnhniques
Cryptanalysis of image encryption using traditional encryption tecnhniquesRitwik MG
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
 
Digital Composition of Mosaics using Edge Priority Tile Assignment
Digital Composition of Mosaics using Edge Priority Tile AssignmentDigital Composition of Mosaics using Edge Priority Tile Assignment
Digital Composition of Mosaics using Edge Priority Tile AssignmentBill Kromydas
 
Frequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
Frequency Domain Blockiness and Blurriness Meter for Image Quality AssessmentFrequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
Frequency Domain Blockiness and Blurriness Meter for Image Quality AssessmentCSCJournals
 

What's hot (20)

A proposed accelerated image copy-move forgery detection-vcip2014
A proposed accelerated image copy-move forgery detection-vcip2014A proposed accelerated image copy-move forgery detection-vcip2014
A proposed accelerated image copy-move forgery detection-vcip2014
 
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityGenetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
 
Human Head Counting and Detection using Convnets
Human Head Counting and Detection using ConvnetsHuman Head Counting and Detection using Convnets
Human Head Counting and Detection using Convnets
 
06 17443 an neuro fuzzy...
06 17443 an neuro fuzzy...06 17443 an neuro fuzzy...
06 17443 an neuro fuzzy...
 
Medial axis transformation based skeletonzation of image patterns using image...
Medial axis transformation based skeletonzation of image patterns using image...Medial axis transformation based skeletonzation of image patterns using image...
Medial axis transformation based skeletonzation of image patterns using image...
 
E4040.2016Fall.NAAS.report.gx2127.hs2917.kp2699
E4040.2016Fall.NAAS.report.gx2127.hs2917.kp2699E4040.2016Fall.NAAS.report.gx2127.hs2917.kp2699
E4040.2016Fall.NAAS.report.gx2127.hs2917.kp2699
 
FAN search for image copy-move forgery-amalta 2014
 FAN search for image copy-move forgery-amalta 2014 FAN search for image copy-move forgery-amalta 2014
FAN search for image copy-move forgery-amalta 2014
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime Pixels
 
Improving Performance of Multileveled BTC Based CBIR Using Sundry Color Spaces
Improving Performance of Multileveled BTC Based CBIR Using Sundry Color SpacesImproving Performance of Multileveled BTC Based CBIR Using Sundry Color Spaces
Improving Performance of Multileveled BTC Based CBIR Using Sundry Color Spaces
 
E4040.2016 fall.cjmd.report.ce2330.jb3852.jdr2162
E4040.2016 fall.cjmd.report.ce2330.jb3852.jdr2162E4040.2016 fall.cjmd.report.ce2330.jb3852.jdr2162
E4040.2016 fall.cjmd.report.ce2330.jb3852.jdr2162
 
SEARCH ENGINE FOR IMAGE RETRIEVAL
SEARCH ENGINE FOR IMAGE RETRIEVALSEARCH ENGINE FOR IMAGE RETRIEVAL
SEARCH ENGINE FOR IMAGE RETRIEVAL
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
Finger Print Image Compression for Extracting Texture Features and Reconstru...
Finger Print Image Compression for Extracting Texture Features  and Reconstru...Finger Print Image Compression for Extracting Texture Features  and Reconstru...
Finger Print Image Compression for Extracting Texture Features and Reconstru...
 
IRJET- Efficient Image Encryption with Pixel Scrambling and Genetic Algorithm
IRJET- Efficient Image Encryption with Pixel Scrambling and Genetic AlgorithmIRJET- Efficient Image Encryption with Pixel Scrambling and Genetic Algorithm
IRJET- Efficient Image Encryption with Pixel Scrambling and Genetic Algorithm
 
An application of morphological
An application of morphologicalAn application of morphological
An application of morphological
 
Cryptanalysis of image encryption using traditional encryption tecnhniques
Cryptanalysis of image encryption using traditional encryption tecnhniquesCryptanalysis of image encryption using traditional encryption tecnhniques
Cryptanalysis of image encryption using traditional encryption tecnhniques
 
D0341829
D0341829D0341829
D0341829
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
 
Digital Composition of Mosaics using Edge Priority Tile Assignment
Digital Composition of Mosaics using Edge Priority Tile AssignmentDigital Composition of Mosaics using Edge Priority Tile Assignment
Digital Composition of Mosaics using Edge Priority Tile Assignment
 
Frequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
Frequency Domain Blockiness and Blurriness Meter for Image Quality AssessmentFrequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
Frequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
 

Similar to Secret-Fragment-Visible Mosaic Image-Creation and Recovery via Colour Transformation

Reversible Color Transformation: Method To Secure Secret Image By Transformin...
Reversible Color Transformation: Method To Secure Secret Image By Transformin...Reversible Color Transformation: Method To Secure Secret Image By Transformin...
Reversible Color Transformation: Method To Secure Secret Image By Transformin...IJERA Editor
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptographyeSAT Publishing House
 
Encryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix MultiplicationEncryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix Multiplicationijcsit
 
Color image encryption decryption using smt
Color image encryption decryption using smtColor image encryption decryption using smt
Color image encryption decryption using smtZiadAlqady
 
Color image encryption decryption using smt
Color image encryption decryption using smtColor image encryption decryption using smt
Color image encryption decryption using smtZiadAlqady
 
Color image encryption decryption using smt
Color image encryption decryption using smtColor image encryption decryption using smt
Color image encryption decryption using smtZiadAlqady
 
Automated Image Captioning – Model Based on CNN – GRU Architecture
Automated Image Captioning – Model Based on CNN – GRU ArchitectureAutomated Image Captioning – Model Based on CNN – GRU Architecture
Automated Image Captioning – Model Based on CNN – GRU ArchitectureIRJET Journal
 
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...Editor IJMTER
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Comparative Study and Analysis of Image Inpainting Techniques
Comparative Study and Analysis of Image Inpainting TechniquesComparative Study and Analysis of Image Inpainting Techniques
Comparative Study and Analysis of Image Inpainting TechniquesIOSR Journals
 
A New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and DecryptionA New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and DecryptionIRJET Journal
 
A Cryptographic Key Generation Using 2D Graphics pixel Shuffling
A Cryptographic Key Generation Using 2D Graphics pixel ShufflingA Cryptographic Key Generation Using 2D Graphics pixel Shuffling
A Cryptographic Key Generation Using 2D Graphics pixel ShufflingIJMTST Journal
 
Content based image retrieval (cbir) using
Content based image retrieval (cbir) usingContent based image retrieval (cbir) using
Content based image retrieval (cbir) usingijcsity
 

Similar to Secret-Fragment-Visible Mosaic Image-Creation and Recovery via Colour Transformation (20)

Reversible Color Transformation: Method To Secure Secret Image By Transformin...
Reversible Color Transformation: Method To Secure Secret Image By Transformin...Reversible Color Transformation: Method To Secure Secret Image By Transformin...
Reversible Color Transformation: Method To Secure Secret Image By Transformin...
 
E1102012537
E1102012537E1102012537
E1102012537
 
F42022628
F42022628F42022628
F42022628
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
 
Encryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix MultiplicationEncryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix Multiplication
 
R044068186
R044068186R044068186
R044068186
 
Color image encryption decryption using smt
Color image encryption decryption using smtColor image encryption decryption using smt
Color image encryption decryption using smt
 
Color image encryption decryption using smt
Color image encryption decryption using smtColor image encryption decryption using smt
Color image encryption decryption using smt
 
Color image encryption decryption using smt
Color image encryption decryption using smtColor image encryption decryption using smt
Color image encryption decryption using smt
 
Automated Image Captioning – Model Based on CNN – GRU Architecture
Automated Image Captioning – Model Based on CNN – GRU ArchitectureAutomated Image Captioning – Model Based on CNN – GRU Architecture
Automated Image Captioning – Model Based on CNN – GRU Architecture
 
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
F43053237
F43053237F43053237
F43053237
 
Comparative Study and Analysis of Image Inpainting Techniques
Comparative Study and Analysis of Image Inpainting TechniquesComparative Study and Analysis of Image Inpainting Techniques
Comparative Study and Analysis of Image Inpainting Techniques
 
A New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and DecryptionA New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and Decryption
 
A Cryptographic Key Generation Using 2D Graphics pixel Shuffling
A Cryptographic Key Generation Using 2D Graphics pixel ShufflingA Cryptographic Key Generation Using 2D Graphics pixel Shuffling
A Cryptographic Key Generation Using 2D Graphics pixel Shuffling
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
A Survey of Image Based Steganography
A Survey of Image Based SteganographyA Survey of Image Based Steganography
A Survey of Image Based Steganography
 
Content based image retrieval (cbir) using
Content based image retrieval (cbir) usingContent based image retrieval (cbir) using
Content based image retrieval (cbir) using
 

More from IJSRD

#IJSRD #Research Paper Publication
#IJSRD #Research Paper Publication#IJSRD #Research Paper Publication
#IJSRD #Research Paper PublicationIJSRD
 
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...IJSRD
 
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...IJSRD
 
Preclusion of High and Low Pressure In Boiler by Using LABVIEW
Preclusion of High and Low Pressure In Boiler by Using LABVIEWPreclusion of High and Low Pressure In Boiler by Using LABVIEW
Preclusion of High and Low Pressure In Boiler by Using LABVIEWIJSRD
 
Prevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV ProtocolPrevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV ProtocolIJSRD
 
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...IJSRD
 
Evaluation the Effect of Machining Parameters on MRR of Mild Steel
Evaluation the Effect of Machining Parameters on MRR of Mild SteelEvaluation the Effect of Machining Parameters on MRR of Mild Steel
Evaluation the Effect of Machining Parameters on MRR of Mild SteelIJSRD
 
Filter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnFilter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnIJSRD
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemIJSRD
 
Diagnosing lungs cancer Using Neural Networks
Diagnosing lungs cancer Using Neural NetworksDiagnosing lungs cancer Using Neural Networks
Diagnosing lungs cancer Using Neural NetworksIJSRD
 
A Survey on Sentiment Analysis and Opinion Mining
A Survey on Sentiment Analysis and Opinion MiningA Survey on Sentiment Analysis and Opinion Mining
A Survey on Sentiment Analysis and Opinion MiningIJSRD
 
A Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISA Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISIJSRD
 
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...IJSRD
 
Product Quality Analysis based on online Reviews
Product Quality Analysis based on online ReviewsProduct Quality Analysis based on online Reviews
Product Quality Analysis based on online ReviewsIJSRD
 
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy NumbersSolving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy NumbersIJSRD
 
Study of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data MiningStudy of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data MiningIJSRD
 
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...IJSRD
 
Investigation of Effect of Process Parameters on Maximum Temperature during F...
Investigation of Effect of Process Parameters on Maximum Temperature during F...Investigation of Effect of Process Parameters on Maximum Temperature during F...
Investigation of Effect of Process Parameters on Maximum Temperature during F...IJSRD
 
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a RotavatorReview Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a RotavatorIJSRD
 
A Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots PredictionA Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots PredictionIJSRD
 

More from IJSRD (20)

#IJSRD #Research Paper Publication
#IJSRD #Research Paper Publication#IJSRD #Research Paper Publication
#IJSRD #Research Paper Publication
 
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
 
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
 
Preclusion of High and Low Pressure In Boiler by Using LABVIEW
Preclusion of High and Low Pressure In Boiler by Using LABVIEWPreclusion of High and Low Pressure In Boiler by Using LABVIEW
Preclusion of High and Low Pressure In Boiler by Using LABVIEW
 
Prevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV ProtocolPrevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV Protocol
 
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
 
Evaluation the Effect of Machining Parameters on MRR of Mild Steel
Evaluation the Effect of Machining Parameters on MRR of Mild SteelEvaluation the Effect of Machining Parameters on MRR of Mild Steel
Evaluation the Effect of Machining Parameters on MRR of Mild Steel
 
Filter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnFilter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osn
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management System
 
Diagnosing lungs cancer Using Neural Networks
Diagnosing lungs cancer Using Neural NetworksDiagnosing lungs cancer Using Neural Networks
Diagnosing lungs cancer Using Neural Networks
 
A Survey on Sentiment Analysis and Opinion Mining
A Survey on Sentiment Analysis and Opinion MiningA Survey on Sentiment Analysis and Opinion Mining
A Survey on Sentiment Analysis and Opinion Mining
 
A Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISA Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFIS
 
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
 
Product Quality Analysis based on online Reviews
Product Quality Analysis based on online ReviewsProduct Quality Analysis based on online Reviews
Product Quality Analysis based on online Reviews
 
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy NumbersSolving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
 
Study of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data MiningStudy of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data Mining
 
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
 
Investigation of Effect of Process Parameters on Maximum Temperature during F...
Investigation of Effect of Process Parameters on Maximum Temperature during F...Investigation of Effect of Process Parameters on Maximum Temperature during F...
Investigation of Effect of Process Parameters on Maximum Temperature during F...
 
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a RotavatorReview Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
 
A Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots PredictionA Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots Prediction
 

Recently uploaded

Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 

Recently uploaded (20)

Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 

Secret-Fragment-Visible Mosaic Image-Creation and Recovery via Colour Transformation

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 3, Issue 10, 2015 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 195 Secret-Fragment-Visible Mosaic Image-Creation and Recovery via Color Transformation Remya R P1 Harikrishnan M P2 1 P.G. Student 2 Assistant Professor 1,2 Department of Electronics & Communication Engineering 1,2 Al-Azhar College of Engineering and Technology, Thodupuzha (Kerala), India Abstract— Secret-fragment-visible mosaic image which automatically transforms the secret image into a meaningful mosaic image of the same size. The mosaic image looks like to an arbitrarily selected target image. It may be used as a camouflage of the secret image and yielded by dividing the secret image into fragments and transforming their color characteristics to the corresponding blocks of the target image. Some technologies are designed to conduct the color transformation process so that the secret image may be recovered. The information required for recovering the secret is embedding into the created mosaic image. Good experimental results are showing the feasibility of the proposed method. Key words: Color Transformation, Image Encryption, Data Hiding, Image Transmission, Mosaic Image I. INTRODUCTION Now a days, various source images are transmitted and used through the internet for various applications, such as military applications, photography, document storages etc. Currently there are two methods have been proposed for the transmissions, ie; image encryption and data hiding. The image encryption is the process to transmit the image securely so that no unauthorized user can able to decrypt the image. Video encryption, image encryption, chaos based encryption is the applications in many fields including the medical imaging, internet communication, transmission. The evolution of encryption is towards to the future possibilities. The image data has the special properties such as high redundancy and high correlation among the pixels. Encryption techniques is used to protect secret information. Encryption is defined as the conversion of plain message, is called a cipher text which cannot be read by the people without decrypting the encrypted text. Decryption is the reverse process of encryption which process in the conversion of the encrypted text to the original plain text, so that it can be read. In this paper, the proposed method says, a new technique for secure image transmission is defined, which transforms a secret image into a meaningful mosaic image. They have the same size and looking like a preselected target image. The transformation process which is controlled by a secret key. This key can a person recover the secret image from the mosaic image. The proposed method is by Lai and Tsai [1], in which a new type of computer art image, called secret-fragment-visible mosaic image is proposed. The mosaic image is the result of the fragments that a secret image in disguise of another image. It is called the target image. The weakness of Lai and Tsai [1] is the requirement of a large image database so that the image can be sufficiently similar to the selected target image. The user is not allowed to select their image for use as the target image. Therefore in this study to remove this weakness of the method while keeping its merit. The aim is to design a new method that can transform a secret image into a secret- fragment-visible mosaic image of the same size. The visual appearance of the freely selected target image without the need of a database. II. IMPLEMENTATION The idea of the proposed method is shown in the fig: The proposed method includes two main phases 1) mosaic image creation and2) secret image recovery. Fig 1: Flow diagram of the proposed method. Step by step of the Implementation Algorithm. The first phase includes mosaic image creation. 1) Fitting the tile images into the target blocks of a preselected target image 2) Transforming the color characteristics[3] of the tile image in the secret image and the corresponding target block in the target image 3) Rotating each tile image into a direction with the minimum RMSE 4) Embedding the information into the created mosaic image for future recovery of the secret image. The second phase includes secret image recovery  Extracting the embedded information for secret image recovery from the mosaic image  Recovering the secret image using the extracted information. III. ALGORITHMS OF THE PROPOSED METHOD There are two algorithms based on the above discussions A. Algorithm 1: Mosaic Image Creation Input: a secret-fragment-visible mosaic image F. Steps:  Stage 1. The tile images is fitting into the target blocks.
  • 2. Secret-Fragment-Visible Mosaic Image-Creation and Recovery via Color Transformation (IJSRD/Vol. 3/Issue 10/2015/045) All rights reserved by www.ijsrd.com 196  Step 1. If the size of the target image is different from that of the secret image then change the size to be identical .  Step 2.The means and the standard deviations of each tile images are calculated.  Step 3.Sort the tile images according to the computed average standard deviation values of the blocks and map in order the blocks in the sorted to those in the sorted.  Step 4.Create a mosaic image by fitting the tile images  into the corresponding target blocks.  Stage 2.The color transformation between the tile images and the target blocks are performed.  Step 5. Create a counting table TB with 256 entries.  Step 6. For each mapping Ti →Bji in sequence L, represent  the means μc and μ’ c of Ti and Bji, respectively.  Stage 3.The tile images rotation.  Step 8.The RMSE values are calculated.  Step 9:Compute Huffman table. B. Algorithm 2: Recovery of Secret Image. Input: a mosaic image F with n tile images and the secret key K. Output: secret image S. Steps:  Stage 1: Extracting the secret image information.  Step 1. Extract from F the bit stream I by a reverse version of the scheme proposed in [2] and decode them to obtain the data items: 1) the number of iterations is embedded; 2) the total number of used pixel pairs Npair in the last iteration; and 3)for encoding the values of the residuals of the overflows or underflows Huffman table is calculated.  Step 2. Extract the bit stream M’ t using the values of Niand  Npair by the same scheme used in the last step.  Step 3. Decryption of the bit stream M’ into Mt by K.  Step 4. Decompose Mtinto n bit streams.  Step 5. Decode Mi for each tile image Ti to obtain the following data items: 1) the block Bji in F corresponding to Ti; 2) the optimal rotation angle θ° of Ti; 3) the means of Ti and Bji and the related standard deviation quotients of all color channels; and 4) the overflow/underflow residual values in Tidecoded by the Huffman table HT.  Stage 2. Recovering the secret image.  Step 6. Recover one by one in a raster-scan order the tile images Ti  Step 7. Compose all the final tile images to form the desired secret image S as output. IV. RESULTS Experimental results of the proposed system. In first phase the cover image is taken as the input image. Fig. 2: Input image In fig 2: the cover image is taken as the input image. A secret image, target image and secret key is the inputs. Fig. 3: Target Image Fig 3 is the target image. In this the tile image is fitting into the target image. Fig 4: Output image In this fig 4, the secret image is hide into the target image
  • 3. Secret-Fragment-Visible Mosaic Image-Creation and Recovery via Color Transformation (IJSRD/Vol. 3/Issue 10/2015/045) All rights reserved by www.ijsrd.com 197 Fig. 5: Recover image In fig 5 the secret images is recover from the target image V. CONCLUSION A secret-fragment-visible mosaic image transmission method has been proposed, which can create meaningful mosaic image and also transforms a secret image into a mosaic image of same size for use as a camouflage of the secret image. The original data is hiding into the target image. This target image has the same size as the original image. There is no loss of data and error free. No noise is found in these images. Experimental results are shown, it refers the feasibility of the proposed method. The future works may be described by applying the proposed method to images of color models other than the RGB. ACKNOWLEDGMENT I would like to thank the reviewers for their helpful suggestions, which improved the quality of this review. REFERENCES [1] I. J. Lai and W. H. Tsai, ―Secret-fragment-visible mosaic image—A new computer art and its application to information hiding,‖ IEEE Trans. Inf.Forens. Secur., vol. 6, no. 3, pp. 936–945, Sep. 2011. [2] D. Coltuc and J.-M. Chassery, ―Very fast watermarking by reversible contrast mapping,‖ IEEE Signal Process. Lett., vol. 14, no. 4, pp. 255–258, Apr. 2007. [3] E. Reinhard, M. Ashikhmin, B. Gooch, and P. Shirley, ―Color transfer between images,‖ IEEE Comput. Graph. Appl., vol. 21, no. 5, pp. 34–41, Sep.–Oct. 2001. [4] Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, ―Reversible data hiding,‖ IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354–362, Mar.2006 [5] X. Li, B. Yang, and T. Zeng, ―Efficient reversible watermarking basedon adaptive prediction-error expansion and pixel selection,‖ IEEE Trans. Image Process., vol. 20, no. 12, pp. 3524–3533, Dec. 2011.