2. Abstract;-
In the past twenty years, reversible knowledge concealing (RDH),
additionally mentioned as lossless or invertible knowledge concealing, has
gradually become a really active analysis space within the field of
information hiding. This has been verified by a lot of and a lot of papers on
increasingly wide-spread subjects within the field of RDH analysis that are
printed of late. during this survey paper the various RDH algorithms and
researches are classified into the following six categories: 1) RDH into
image spatial domain, 2) RDH into image compressed domain (e.g.,
JPEG), 3) RDH suitable for image semi-fragile authentication, 4) RDH with
image contrast improvement, 5) RDH into encrypted pictures, which is
expected to own wide application within the cloud computation, and 6)
RDH into video and into audio for every of those six classes, the history of
technical developments, the present state of the humanities, and the
potential future researches are conferred and mentioned. It is expected
that the RDH technology and its applications in the real word can still move
ahead.
3. EXISTING SYSTEM PROPOSED SYSTEM
EXISTING CONCEPT:-
Data Hiding it can embed secret
data into a cover medium, and later
enable the intended user to extract
the embedded data from the
marked medium for various
purposes. However, for most data
hiding methods, the cover medium
has been distorted during the data
embedding operation and hence
cannot be restored into its original
form after data extraction
PROPOSED CONCEPT:-
Reversible data hiding (RDH), also
called lossless or invertible data
hiding, is proposed to loss lessly
recover both the embedded data
and the cover medium . That is,
with the RDH, besides the
embedded data, the over
medium can be exactly recovered
from the marked data as well..
EXISTING TECHNIQUE:-
Conventional Data hiding Technique
PROPOSED TECHNIQUE:-
RDH Reversible data hiding
4. TECHNIQUE DEFNITION:-
In this paper we will be
discussing one such data hiding
technique called
Steganography. Steganography
is the process of concealing
sensitive information in any
media to transfer it securely
over the underlying unreliable
and unsecured communication
network .
TECHNIQUE DEFNITION:-
Reversible data hiding is a
type of data hiding
techniques whereby the host
image can be recovered
exactly. Being lossless makes
this technique suitable for
medical and military
applications. Difference
expansion (DE) is one of the
most important techniques
which are used for reversible
data hiding
DRAWBACKS:-
• Low Security
• Data with key information
distorted at any time
ADVANTAGES:-
• High Security
• Data will not distorted at any
time
5. SOFTWARE REQUIREMENT
• Operating system :- Windows7
• Front End :- Microsoft Visual Studio .Net 2013
• Coding Language :- C#
• Backend :- SQL Server 2012
HARDWARE REQUIREMENT
Processor : Pentium Dual Core 2.00GHZ
Hard disk : 120 GB
Mouse : Logitech.
RAM : 2GB(minimum)
Keyboard : 110 keys enhanced.