SlideShare a Scribd company logo
1 of 9
Download to read offline
Scientific Journal Impact Factor (SJIF): 1.711
International Journal of Modern Trends in Engineering
and Research
www.ijmter.com
@IJMTER-2014, All rights Reserved 283
e-ISSN: 2349-9745
p-ISSN: 2393-8161
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN
ENCRYPTED IMAGES USING SIDE MATCH
Mr. Khajavali Shaik1
, Mr. Muzammil Parvez2
M.Tech.,(Ph.D)
PG Scholar, Communications & Signal Processing1
, Assistant Professor2
1,2
Nimra College of Engineering & Technology, Ibrahimpatnam
Abstract- This paper proposes a scheme for Enhanced Separable Reversible Data Hiding in
Encrypted images Using Side Match. In the first step the original image is encrypted using an
encryption key. Then additional data is embedded into the image by modifying a small portion of the
encrypted image using a data hiding key. With an encrypted image containing additional data, if a
receiver has the data hiding key, he can extract the additional data. If the receiver has the encryption
key, he can decrypt the image, but cannot extract the additional data. If the receiver has both the data
hiding key and encryption key, he can extract the additional data and recover the original content by
exploiting the spatial correlation in natural images. The accuracy of data extraction is improved by
using a better scheme for measuring the smoothness of the received image, and uses the Side Match
scheme to further decrease the error rate of extracted bits.
Keywords: Encrypted image, reversible data hiding, smoothness, data extraction, side match.
I.INTRODUCTION
In recent years, signal processing in the encrypted domain has attracted considerable research
interest. As an effective and popular means for privacy protection, encryption converts the ordinary
signal into unintelligible data, so that the traditional signal processing usually takes place before
encryption or after decryption. However, in some scenarios that a content owner does not trust the
processing service provider, the ability to manipulate the encrypted data when keeping the plain
content unrevealed is desired. For instance, when the secret data to be transmitted are encrypted, a
channel provider without any knowledge of the cryptographic key may tend to compress the
encrypted data due to the limited channel resource.
II.EXISTING METHOD
Reversible Data Hiding in images is a technique that embeds data in digital images by
altering the pixel values for secret communication, and the embedded image can be recovered to its
original state after the extraction of the secret data. Many reversible Data Hiding methods have been
proposed recently. One method embeds data bits by expanding the difference of two consecutive
pixels. Another one uses a lossless compression technique to create extra spaces for carry data bits.
Another method shifts the bins of image histograms to leave an empty bin for data embedment.
Another one adopts the difference expansion and histogram shifting for data embedment. Another
one embeds data by shifting the histogram of prediction errors while considering the local activity of
pixels to further enhance the quality of stego-image.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 284
Other applications could be for when the owner of the carrier might not want the other
person, including data hider, to know the content of the carrier before Data Hiding is actually
performed, such as military images or confidential medical images. In this case, the content owner
has to encrypt the content before passing to the data hider for data embedment. The receiver side can
extract the embedded message and recover the original image. For example, our method encrypts the
cover image before embedding is actually performed. The cover image is encrypted by applying
bitwise exclusive-or (XOR) operator to every bit of pixels using an encryption key. Let be an 8-bit
cover image of size W*H and Ii, j be the pixel value at (i, j).
Figure1. Four test images (a)Lena (b) Baboon (c)Sailboat (d)Splash
We denote the 8-bit binary digits of Ii,j as Ii, j(0) ,Ii, j(1) …Ii, j(7) ,where
Ii, j
(k)
=[ kjIi
2
, ]mod 2,0 < k < 7
To encrypt the cover image, a random sequence of size W*H*8 is generated using an encryption
key:
r = {r i, j
(k)
| r i, j
(k)
ϵ {0, 1}} 7
k=0 , 0 < i < w-1, 0 < j < h-1.
Let H m, n
is the block at position (m, n) of the partitioned blocks. According to a data-hiding key,
data hider randomly and evenly classifies pixels in each block into sets S0 and S1. If the bit to be
embedded in this block is “0”, flip 3 LSBs of pixels in set S0; Let the flipped results be H’ m, n
, where
H’ m, n (k) = 	 , 	( ), (u, v) ϵ S0, k=0, 1, 2…
On the contrary, if the bit to be embedded is “1,” flip 3 LSBs of pixels in set S1, and the flipped
result is
H’ m, n (k) = 	 , 	( ) ,(u, v) ϵ S1, k=0, 1, 2…
In above equations,	 ̅ denotes the bit-flipping result of H m, n and H’ m, n represent the kth
LSB of
pixels at position (u, v) in blocks H m, n
and H’ m, n
, respectively. Repeat this process until all the data
bits are embedded. The embedded and encrypted image is defined as I”.
To extract the embedded data bits, the random sequence is generated using the encryption
key, and calculates the XOR of and the binary digits of I” to decrypt the image. The five MSBs of
each pixel of the decrypted image will be identical to those of the cover image. According to the
data-hiding key, pixels in sets S0 and S1 of each block are obtained. For block, H’ m, n
flip three
LSBs of pixels in set S0 and calculate the XOR of the resultant bit stream and r, we obtain a block
H’m, n
. Similarly, flip 3 LSBs of pixels of set S1 and calculate the XOR of the resultant bit stream r
and, we obtain a block m, n
. Either m, n
or m, n
is identical to the original block H m, n
, and the
other one will be the block with three LSBs of every pixels flipped. Because the pixels are de-
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 285
correlated in the flipped blocks, the original blocks often exhibit smoother than those of flipped
blocks. By comparing the smoothness of these two blocks, the embedded bits can be extracted.
Smoothness calculation in existing method is
= 	 | , −
, 	 + , 	 + 	, 	 + , 		 	
4
|
Where pu,v denotes the pixel value at position (u, v), |x| is the absolute value of x. Let the calculated
smoothness of m, n
and m, n
be m, n
and m, n
respectively. If m, n
< m, n
, a bit “0” is extracted, and
m,n
is the original block. Otherwise, a bit “1” is extracted, and m,n
is the original block
In our method the border pixels of blocks are included in the process of smooth calculation.
Moreover, the correlations between blocks are also considered in data extraction. These two facts
could be exploited to enhance the correctness of extracted data. This method proposes a new smooth-
evaluation function that fully exploits the pixels in blocks for evaluating the pixel fluctuations in
images. A side-match mechanism is also introduced to evaluate the smoothness of those ambiguous
blocks, where the absolute difference between and are smaller than a predefined threshold. With
these sophisticated approaches, the correctness of data extraction will be further increased.
III.PROPOSED METHOD
In [9], the evaluation of block smoothness is crucial for obtaining a correct data extraction.
However, the four borders of each block do not join the calculation of block smoothness. This may
decrease the rate of correctness of data extraction, especially when the block size is small. For
example, for a block of size 8X8, there are 64 pixels and around 43.75% of them (28 pixels) are
located in the four borders. These border pixels are not employed to calculate the block smoothness,
and the percentage is increased as the block size decreased. Besides, [9] extracts the embedded bits
by evaluating the smoothness of a single block. However, flipping 3 LSBs of these complex blocks
will not cause a significant increase in complexness. Based on these observations, this letter proposes
an improved version for a better estimation of block smoothness. In the new smoothness estimation,
the summation of the absolute of two neighboring pixels is employed. Moreover, the extraction and
recovery are performed starting from the most noticeable changes in smoothness to the least ones.
Besides, we also adopt the side-match technique to evaluate the block smoothness by concatenating
the border of recovered blocks to the unrecovered blocks. The data encryption and data embedding
process is the same as [9]. Therefore, we address only the calculation of smoothness and the process
of image recovery.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 286
Figure2. (a) Decrypted image using content owner’s key. (b) Blocks of incorrect recovery of Zhang’s method.
(c) Blocks of incorrect recovery of the proposed
Figure3. Block diagram of proposed method
A.CALCULATION OF BLOCK SMOOTHNESS
The smoothness of an image block can be evaluated by calculating the absolute difference of
neighboring pixels. The larger the summation of absolute differences, the more complex the image
blocks is. Therefore, we estimate the block smoothness by calculating the summation of the vertical
absolute differences and horizontal absolute differences of pixels in image blocks using the following
equation:
= 	 |p , − , | + 	
	
|p , − , |
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 287
Where p u, v represents the pixel values located at position of (u, v) a given image block of size
S1 * S2 .Above Equation fully exploits the absolute difference between two consecutive pixels in
both vertical and horizontal directions and thus, the smoothness of blocks can be better estimated.
B. DATA EXTRACTION AND IMAGE RECOVERY USING SIDE MATCH
Let the cover image be and the encrypted image with messages embedded be I”. Firstly, a
random sequence is generated using the encryption key. The XOR of the 5 MSBs of I” and r are
calculated to recover the five MSBs of the cover image. According to the data hiding key, the pixels
in sets S0 and S1 of block H‘m,n
are obtained. Flip the three LSBs of pixels in set S0, and calculate
the XOR of the resultant bit string and r, we obtain m, n
. Similarly, flip the three LSBs of pixels in
set, and calculate the XOR of the resultant bit string and, we obtained m, n
, above equation is then
applied to evaluate the smoothness of m, n
and m, n
, and to obtain the evaluated results m, n
and
m, n
, respectively. The difference Am, n
between m, n
and m, n
is obtained by the following equation
A m, n
= m, n
- m, n
A larger | A m, n
| indicates that H ~m, n
is more dissimilar to H ^ m, n
, which implies that the
block H m, n
becomes more complex after flipping 3 LSBs. Therefore, we calculate |Am, n
| for all
blocks, and sort |Am, n
| in descending order. The data extraction and image recovery of blocks is then
preformed using the sorted order of |Am, n
|.
IV. EXPERIMENTAL RESULTS
We used four gray level images of size 512x12, including Lena, Baboon, Sailboat, and Splash
as the test images, as shown in Fig. 1. These images can be obtained from USC-SIPI image database
[11]. The experimental results are compared with [9].
To demonstrate the performance of the proposed method, we take Lena image as an example.
Fig. 2(a) shows the decrypted Lena image with 5 MSBs recovered (suppose the block size is 8X8).
Figs. 2(b) and (c) show the recovery results using [9] and the proposed method, respectively, where
the incorrect recovered blocks are marked by white. Note that most of the incorrect recovered blocks
are sparsely distributed over the complex regions of the Lena image. Comparing Figs. 2(b) and (c),
we see that the proposed method recovers the image blocks more accurate than that of [9]. Although
the experiments were based on Lena image, experiments on other test images also showed the
proposed method effectively improves Zhang’s method, especially when the block size is small.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 288
Fig. 3. The error rate comparison. (a) Lena. (b) Baboon. (c) Sailboat. (d) Splash.
V. CONCLUSION
This paper proposes a scheme for Enhanced Separable Reversible Data Hiding in Encrypted
images Using Side Match. We used a new algorithm to better estimate the smoothness of image
blocks. The extraction and recovery of blocks are performed according to the descending order of the
absolute smoothness difference between two candidate blocks. The side match technique is
employed to further reduce the error rate. The experimental results show that the propose method
effectively improves Zhang’s method, especially when the block size is small
VI. REFERENCES
[1] J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. Circuits Syst. Video Technol., vol.
13, no. 8, pp. 890–896, 2003.
[2] M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, “Lossless generalized- LSB data embedding,” IEEE Trans.
Image Process., vol. 14, no. 2, pp. 253–266, 2005.
[3] Z. Ni, Y. Q. Shi, N. Ansari, andW. Su, “Reversible data hiding,” IEEE Trans. Circuits Syst. Video Technol., vol. 16,
no. 8, pp. 354–362, 2006.
[4] D.M. Thodi and J. J. Rodriguez, “Expansion embedding techniques for reversible watermarking,” IEEE Trans. Image
Process., vol. 16, no. 3, pp. 721–730, 2007.
[5] W. Hong and T. S. Chen, “Reversible data embedding for high quality images using interpolation and reference pixel
distribution mechanism,” J. Vis. Commun. Image Represent., vol. 22, no. 2, pp. 131–140, 2011.
[6] D.Kundur andK.Karthik, “Video fingerprinting and encryption principles for digital rights management,” Proc. IEEE,
vol. 92, pp. 918–932, 2004.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 289
[7] S. Lian, Z. Liu, Z. Ren, and H. Wang, “Commutative encryption and watermarking in video compression,” IEEE
Trans. Circuits Syst. Video Technol., vol. 17, no. 6, pp. 774–778, 2007.
[8] M. Cancellaro, F. Battisti, M. Carli, G. Boato, F. G. B. Natale, and A. Neri, “A commutative digital image
watermarking and encryption method in the tree structured haar transform domain,” Signal Process.: Image Commun.,
vol. 26, no. 1, pp. 1–12, 2011.
[9] X. Zhang, “Reversible data hiding in encrypted images,” IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255–258,
2011.
[10] X. Zhang, “Separable reversible data hiding in encrypted image,” IEEE Trans. Inf. Forensics Security,
10.1109/TIFS.2011.2176120.
[11] Image database [Online]. Available: http://sipi.use.edu/database/
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE MATCH
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE MATCH

More Related Content

What's hot

Ax31139148
Ax31139148Ax31139148
Ax31139148IJMER
 
Secure High Capacity Data Hiding in Images using EDBTC
Secure High Capacity Data Hiding in Images using EDBTCSecure High Capacity Data Hiding in Images using EDBTC
Secure High Capacity Data Hiding in Images using EDBTCijsrd.com
 
Efficient & Secure Data Hiding Using Secret Reference Matrix
Efficient & Secure Data Hiding Using Secret Reference MatrixEfficient & Secure Data Hiding Using Secret Reference Matrix
Efficient & Secure Data Hiding Using Secret Reference MatrixIJNSA Journal
 
Modified weighted embedding method for image steganography
Modified  weighted embedding method for image steganographyModified  weighted embedding method for image steganography
Modified weighted embedding method for image steganographyIAEME Publication
 
Performance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism HardwarePerformance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism HardwareCSCJournals
 
Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique ...
Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique ...Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique ...
Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique ...AM Publications,India
 
Improved block based segmentation for jpeg compressed document images
Improved block based segmentation for jpeg compressed document imagesImproved block based segmentation for jpeg compressed document images
Improved block based segmentation for jpeg compressed document imageseSAT Journals
 
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATION
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATIONUSING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATION
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATIONIJNSA Journal
 
Intelligent Parallel Processing and Compound Image Compression
Intelligent Parallel Processing and Compound Image CompressionIntelligent Parallel Processing and Compound Image Compression
Intelligent Parallel Processing and Compound Image CompressionDR.P.S.JAGADEESH KUMAR
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingijctet
 
IMPROVED PARALLEL THINNING ALGORITHM TO OBTAIN UNIT-WIDTH SKELETON
IMPROVED PARALLEL THINNING ALGORITHM TO OBTAIN UNIT-WIDTH SKELETONIMPROVED PARALLEL THINNING ALGORITHM TO OBTAIN UNIT-WIDTH SKELETON
IMPROVED PARALLEL THINNING ALGORITHM TO OBTAIN UNIT-WIDTH SKELETONijma
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
 

What's hot (13)

Ax31139148
Ax31139148Ax31139148
Ax31139148
 
Secure High Capacity Data Hiding in Images using EDBTC
Secure High Capacity Data Hiding in Images using EDBTCSecure High Capacity Data Hiding in Images using EDBTC
Secure High Capacity Data Hiding in Images using EDBTC
 
Efficient & Secure Data Hiding Using Secret Reference Matrix
Efficient & Secure Data Hiding Using Secret Reference MatrixEfficient & Secure Data Hiding Using Secret Reference Matrix
Efficient & Secure Data Hiding Using Secret Reference Matrix
 
Modified weighted embedding method for image steganography
Modified  weighted embedding method for image steganographyModified  weighted embedding method for image steganography
Modified weighted embedding method for image steganography
 
Performance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism HardwarePerformance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism Hardware
 
Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique ...
Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique ...Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique ...
Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique ...
 
Improved block based segmentation for jpeg compressed document images
Improved block based segmentation for jpeg compressed document imagesImproved block based segmentation for jpeg compressed document images
Improved block based segmentation for jpeg compressed document images
 
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATION
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATIONUSING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATION
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATION
 
Intelligent Parallel Processing and Compound Image Compression
Intelligent Parallel Processing and Compound Image CompressionIntelligent Parallel Processing and Compound Image Compression
Intelligent Parallel Processing and Compound Image Compression
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarking
 
IMPROVED PARALLEL THINNING ALGORITHM TO OBTAIN UNIT-WIDTH SKELETON
IMPROVED PARALLEL THINNING ALGORITHM TO OBTAIN UNIT-WIDTH SKELETONIMPROVED PARALLEL THINNING ALGORITHM TO OBTAIN UNIT-WIDTH SKELETON
IMPROVED PARALLEL THINNING ALGORITHM TO OBTAIN UNIT-WIDTH SKELETON
 
Ijnsa050205
Ijnsa050205Ijnsa050205
Ijnsa050205
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 

Viewers also liked

Keyless approach of separable hiding data into encrypted image
Keyless approach of separable hiding data into encrypted imageKeyless approach of separable hiding data into encrypted image
Keyless approach of separable hiding data into encrypted imageprjpublications
 
SEO Report Card - Slides
SEO Report Card - SlidesSEO Report Card - Slides
SEO Report Card - SlidesChiranjit Paul
 
Search Engine Optimization
Search Engine OptimizationSearch Engine Optimization
Search Engine OptimizationHazem Torab
 
Reversible data hiding using histogram shifting method
Reversible data hiding using histogram shifting methodReversible data hiding using histogram shifting method
Reversible data hiding using histogram shifting methodHimanshu Bal
 
Reversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionReversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionPapitha Velumani
 
Google seo-search-engine-optimization-introduction-powerpoint-presentation
Google seo-search-engine-optimization-introduction-powerpoint-presentationGoogle seo-search-engine-optimization-introduction-powerpoint-presentation
Google seo-search-engine-optimization-introduction-powerpoint-presentationSandeep Sharma
 
SEO-all about Search engine optimization
SEO-all about Search engine optimizationSEO-all about Search engine optimization
SEO-all about Search engine optimizationAnusree Krishnanunni
 
Seo 7 step seo process
Seo 7 step seo processSeo 7 step seo process
Seo 7 step seo processPractical SEO
 
Introduction to SEO Presentation
Introduction to SEO PresentationIntroduction to SEO Presentation
Introduction to SEO Presentation7thingsmedia
 
Search Engine Optimization PPT
Search Engine Optimization PPT Search Engine Optimization PPT
Search Engine Optimization PPT Kranthi Shaik
 
Basic SEO Presentation
Basic SEO PresentationBasic SEO Presentation
Basic SEO PresentationPaul Kortman
 
Search Engine Optimization (SEO)
Search Engine Optimization (SEO)Search Engine Optimization (SEO)
Search Engine Optimization (SEO)Dennis Deacon
 
Introduction to SEO
Introduction to SEOIntroduction to SEO
Introduction to SEORand Fishkin
 

Viewers also liked (14)

Keyless approach of separable hiding data into encrypted image
Keyless approach of separable hiding data into encrypted imageKeyless approach of separable hiding data into encrypted image
Keyless approach of separable hiding data into encrypted image
 
SEO Report Card - Slides
SEO Report Card - SlidesSEO Report Card - Slides
SEO Report Card - Slides
 
Search Engine Optimization
Search Engine OptimizationSearch Engine Optimization
Search Engine Optimization
 
Reversible data hiding using histogram shifting method
Reversible data hiding using histogram shifting methodReversible data hiding using histogram shifting method
Reversible data hiding using histogram shifting method
 
Reversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionReversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryption
 
Google seo-search-engine-optimization-introduction-powerpoint-presentation
Google seo-search-engine-optimization-introduction-powerpoint-presentationGoogle seo-search-engine-optimization-introduction-powerpoint-presentation
Google seo-search-engine-optimization-introduction-powerpoint-presentation
 
SEO-all about Search engine optimization
SEO-all about Search engine optimizationSEO-all about Search engine optimization
SEO-all about Search engine optimization
 
Seo 7 step seo process
Seo 7 step seo processSeo 7 step seo process
Seo 7 step seo process
 
SEO PPT
SEO PPTSEO PPT
SEO PPT
 
Introduction to SEO Presentation
Introduction to SEO PresentationIntroduction to SEO Presentation
Introduction to SEO Presentation
 
Search Engine Optimization PPT
Search Engine Optimization PPT Search Engine Optimization PPT
Search Engine Optimization PPT
 
Basic SEO Presentation
Basic SEO PresentationBasic SEO Presentation
Basic SEO Presentation
 
Search Engine Optimization (SEO)
Search Engine Optimization (SEO)Search Engine Optimization (SEO)
Search Engine Optimization (SEO)
 
Introduction to SEO
Introduction to SEOIntroduction to SEO
Introduction to SEO
 

Similar to AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE MATCH

Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...IRJET Journal
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTIONAN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTIONijcseit
 
IRJET- LS Chaotic based Image Encryption System Via Permutation Models
IRJET- LS Chaotic based Image Encryption System Via Permutation ModelsIRJET- LS Chaotic based Image Encryption System Via Permutation Models
IRJET- LS Chaotic based Image Encryption System Via Permutation ModelsIRJET Journal
 
1. updated document ed sat
1. updated document ed sat1. updated document ed sat
1. updated document ed satIAESIJEECS
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
 
A new hybrid steganographic method for histogram preservation
A new hybrid steganographic method for histogram preservation A new hybrid steganographic method for histogram preservation
A new hybrid steganographic method for histogram preservation IJEEE
 
Steganography - Anup Palarapwar
Steganography - Anup PalarapwarSteganography - Anup Palarapwar
Steganography - Anup PalarapwarANUP PALARAPWAR
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptographyeSAT Publishing House
 
Secret-Fragment Visible Mosaic Images by Genetic Algorithm
Secret-Fragment Visible Mosaic Images by Genetic AlgorithmSecret-Fragment Visible Mosaic Images by Genetic Algorithm
Secret-Fragment Visible Mosaic Images by Genetic AlgorithmIRJET Journal
 
An image steganography using improved hyper-chaotic Henon map and fractal Tro...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...An image steganography using improved hyper-chaotic Henon map and fractal Tro...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...IJECEIAES
 
Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling cscpconf
 
A Hybrid Steganography Technique Based On LSBMR And OPAP
A Hybrid Steganography Technique Based On LSBMR And OPAPA Hybrid Steganography Technique Based On LSBMR And OPAP
A Hybrid Steganography Technique Based On LSBMR And OPAPIOSRJVSP
 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domainijistjournal
 
A New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and DecryptionA New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and DecryptionIRJET Journal
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsEswar Publications
 

Similar to AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE MATCH (20)

Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTIONAN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
 
IRJET- LS Chaotic based Image Encryption System Via Permutation Models
IRJET- LS Chaotic based Image Encryption System Via Permutation ModelsIRJET- LS Chaotic based Image Encryption System Via Permutation Models
IRJET- LS Chaotic based Image Encryption System Via Permutation Models
 
1. updated document ed sat
1. updated document ed sat1. updated document ed sat
1. updated document ed sat
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
 
Id62
Id62Id62
Id62
 
A new hybrid steganographic method for histogram preservation
A new hybrid steganographic method for histogram preservation A new hybrid steganographic method for histogram preservation
A new hybrid steganographic method for histogram preservation
 
Steganography - Anup Palarapwar
Steganography - Anup PalarapwarSteganography - Anup Palarapwar
Steganography - Anup Palarapwar
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
 
Secret-Fragment Visible Mosaic Images by Genetic Algorithm
Secret-Fragment Visible Mosaic Images by Genetic AlgorithmSecret-Fragment Visible Mosaic Images by Genetic Algorithm
Secret-Fragment Visible Mosaic Images by Genetic Algorithm
 
Ijcatr04041020
Ijcatr04041020Ijcatr04041020
Ijcatr04041020
 
An image steganography using improved hyper-chaotic Henon map and fractal Tro...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...An image steganography using improved hyper-chaotic Henon map and fractal Tro...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...
 
Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling
 
A Hybrid Steganography Technique Based On LSBMR And OPAP
A Hybrid Steganography Technique Based On LSBMR And OPAPA Hybrid Steganography Technique Based On LSBMR And OPAP
A Hybrid Steganography Technique Based On LSBMR And OPAP
 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
 
A New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and DecryptionA New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and Decryption
 
T01022103108
T01022103108T01022103108
T01022103108
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime Pixels
 
Is3314841490
Is3314841490Is3314841490
Is3314841490
 

More from Editor IJMTER

A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIPA NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIPEditor IJMTER
 
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...Editor IJMTER
 
Analysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentAnalysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentEditor IJMTER
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationEditor IJMTER
 
Aging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetAging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetEditor IJMTER
 
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...Editor IJMTER
 
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESA CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESEditor IJMTER
 
Sustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialSustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialEditor IJMTER
 
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTUSE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTEditor IJMTER
 
Textual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisTextual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisEditor IJMTER
 
Testing of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsTesting of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsEditor IJMTER
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection TechniquesEditor IJMTER
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICEEditor IJMTER
 
SURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSSURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSEditor IJMTER
 
Survey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkSurvey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkEditor IJMTER
 
Step up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveStep up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveEditor IJMTER
 
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONSPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONEditor IJMTER
 
Software Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeSoftware Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeEditor IJMTER
 
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisEditor IJMTER
 
Software Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeSoftware Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeEditor IJMTER
 

More from Editor IJMTER (20)

A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIPA NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
 
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
 
Analysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentAnalysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX Environment
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-Duplication
 
Aging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetAging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the Internet
 
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
 
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESA CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
 
Sustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialSustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building Material
 
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTUSE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
 
Textual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisTextual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative Analysis
 
Testing of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsTesting of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different Processors
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection Techniques
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
 
SURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSSURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODS
 
Survey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkSurvey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor Network
 
Step up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveStep up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor Drive
 
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONSPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
 
Software Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeSoftware Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing Scheme
 
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global Analysis
 
Software Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeSoftware Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking Scheme
 

Recently uploaded

notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwaitjaanualu31
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfsmsksolar
 
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxnuruddin69
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersMairaAshraf6
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadhamedmustafa094
 

Recently uploaded (20)

notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdf
 
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptx
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 

AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE MATCH

  • 1. Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com @IJMTER-2014, All rights Reserved 283 e-ISSN: 2349-9745 p-ISSN: 2393-8161 AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE MATCH Mr. Khajavali Shaik1 , Mr. Muzammil Parvez2 M.Tech.,(Ph.D) PG Scholar, Communications & Signal Processing1 , Assistant Professor2 1,2 Nimra College of Engineering & Technology, Ibrahimpatnam Abstract- This paper proposes a scheme for Enhanced Separable Reversible Data Hiding in Encrypted images Using Side Match. In the first step the original image is encrypted using an encryption key. Then additional data is embedded into the image by modifying a small portion of the encrypted image using a data hiding key. With an encrypted image containing additional data, if a receiver has the data hiding key, he can extract the additional data. If the receiver has the encryption key, he can decrypt the image, but cannot extract the additional data. If the receiver has both the data hiding key and encryption key, he can extract the additional data and recover the original content by exploiting the spatial correlation in natural images. The accuracy of data extraction is improved by using a better scheme for measuring the smoothness of the received image, and uses the Side Match scheme to further decrease the error rate of extracted bits. Keywords: Encrypted image, reversible data hiding, smoothness, data extraction, side match. I.INTRODUCTION In recent years, signal processing in the encrypted domain has attracted considerable research interest. As an effective and popular means for privacy protection, encryption converts the ordinary signal into unintelligible data, so that the traditional signal processing usually takes place before encryption or after decryption. However, in some scenarios that a content owner does not trust the processing service provider, the ability to manipulate the encrypted data when keeping the plain content unrevealed is desired. For instance, when the secret data to be transmitted are encrypted, a channel provider without any knowledge of the cryptographic key may tend to compress the encrypted data due to the limited channel resource. II.EXISTING METHOD Reversible Data Hiding in images is a technique that embeds data in digital images by altering the pixel values for secret communication, and the embedded image can be recovered to its original state after the extraction of the secret data. Many reversible Data Hiding methods have been proposed recently. One method embeds data bits by expanding the difference of two consecutive pixels. Another one uses a lossless compression technique to create extra spaces for carry data bits. Another method shifts the bins of image histograms to leave an empty bin for data embedment. Another one adopts the difference expansion and histogram shifting for data embedment. Another one embeds data by shifting the histogram of prediction errors while considering the local activity of pixels to further enhance the quality of stego-image.
  • 2. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 284 Other applications could be for when the owner of the carrier might not want the other person, including data hider, to know the content of the carrier before Data Hiding is actually performed, such as military images or confidential medical images. In this case, the content owner has to encrypt the content before passing to the data hider for data embedment. The receiver side can extract the embedded message and recover the original image. For example, our method encrypts the cover image before embedding is actually performed. The cover image is encrypted by applying bitwise exclusive-or (XOR) operator to every bit of pixels using an encryption key. Let be an 8-bit cover image of size W*H and Ii, j be the pixel value at (i, j). Figure1. Four test images (a)Lena (b) Baboon (c)Sailboat (d)Splash We denote the 8-bit binary digits of Ii,j as Ii, j(0) ,Ii, j(1) …Ii, j(7) ,where Ii, j (k) =[ kjIi 2 , ]mod 2,0 < k < 7 To encrypt the cover image, a random sequence of size W*H*8 is generated using an encryption key: r = {r i, j (k) | r i, j (k) ϵ {0, 1}} 7 k=0 , 0 < i < w-1, 0 < j < h-1. Let H m, n is the block at position (m, n) of the partitioned blocks. According to a data-hiding key, data hider randomly and evenly classifies pixels in each block into sets S0 and S1. If the bit to be embedded in this block is “0”, flip 3 LSBs of pixels in set S0; Let the flipped results be H’ m, n , where H’ m, n (k) = , ( ), (u, v) ϵ S0, k=0, 1, 2… On the contrary, if the bit to be embedded is “1,” flip 3 LSBs of pixels in set S1, and the flipped result is H’ m, n (k) = , ( ) ,(u, v) ϵ S1, k=0, 1, 2… In above equations, ̅ denotes the bit-flipping result of H m, n and H’ m, n represent the kth LSB of pixels at position (u, v) in blocks H m, n and H’ m, n , respectively. Repeat this process until all the data bits are embedded. The embedded and encrypted image is defined as I”. To extract the embedded data bits, the random sequence is generated using the encryption key, and calculates the XOR of and the binary digits of I” to decrypt the image. The five MSBs of each pixel of the decrypted image will be identical to those of the cover image. According to the data-hiding key, pixels in sets S0 and S1 of each block are obtained. For block, H’ m, n flip three LSBs of pixels in set S0 and calculate the XOR of the resultant bit stream and r, we obtain a block H’m, n . Similarly, flip 3 LSBs of pixels of set S1 and calculate the XOR of the resultant bit stream r and, we obtain a block m, n . Either m, n or m, n is identical to the original block H m, n , and the other one will be the block with three LSBs of every pixels flipped. Because the pixels are de-
  • 3. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 285 correlated in the flipped blocks, the original blocks often exhibit smoother than those of flipped blocks. By comparing the smoothness of these two blocks, the embedded bits can be extracted. Smoothness calculation in existing method is = | , − , + , + , + , 4 | Where pu,v denotes the pixel value at position (u, v), |x| is the absolute value of x. Let the calculated smoothness of m, n and m, n be m, n and m, n respectively. If m, n < m, n , a bit “0” is extracted, and m,n is the original block. Otherwise, a bit “1” is extracted, and m,n is the original block In our method the border pixels of blocks are included in the process of smooth calculation. Moreover, the correlations between blocks are also considered in data extraction. These two facts could be exploited to enhance the correctness of extracted data. This method proposes a new smooth- evaluation function that fully exploits the pixels in blocks for evaluating the pixel fluctuations in images. A side-match mechanism is also introduced to evaluate the smoothness of those ambiguous blocks, where the absolute difference between and are smaller than a predefined threshold. With these sophisticated approaches, the correctness of data extraction will be further increased. III.PROPOSED METHOD In [9], the evaluation of block smoothness is crucial for obtaining a correct data extraction. However, the four borders of each block do not join the calculation of block smoothness. This may decrease the rate of correctness of data extraction, especially when the block size is small. For example, for a block of size 8X8, there are 64 pixels and around 43.75% of them (28 pixels) are located in the four borders. These border pixels are not employed to calculate the block smoothness, and the percentage is increased as the block size decreased. Besides, [9] extracts the embedded bits by evaluating the smoothness of a single block. However, flipping 3 LSBs of these complex blocks will not cause a significant increase in complexness. Based on these observations, this letter proposes an improved version for a better estimation of block smoothness. In the new smoothness estimation, the summation of the absolute of two neighboring pixels is employed. Moreover, the extraction and recovery are performed starting from the most noticeable changes in smoothness to the least ones. Besides, we also adopt the side-match technique to evaluate the block smoothness by concatenating the border of recovered blocks to the unrecovered blocks. The data encryption and data embedding process is the same as [9]. Therefore, we address only the calculation of smoothness and the process of image recovery.
  • 4. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 286 Figure2. (a) Decrypted image using content owner’s key. (b) Blocks of incorrect recovery of Zhang’s method. (c) Blocks of incorrect recovery of the proposed Figure3. Block diagram of proposed method A.CALCULATION OF BLOCK SMOOTHNESS The smoothness of an image block can be evaluated by calculating the absolute difference of neighboring pixels. The larger the summation of absolute differences, the more complex the image blocks is. Therefore, we estimate the block smoothness by calculating the summation of the vertical absolute differences and horizontal absolute differences of pixels in image blocks using the following equation: = |p , − , | + |p , − , |
  • 5. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 287 Where p u, v represents the pixel values located at position of (u, v) a given image block of size S1 * S2 .Above Equation fully exploits the absolute difference between two consecutive pixels in both vertical and horizontal directions and thus, the smoothness of blocks can be better estimated. B. DATA EXTRACTION AND IMAGE RECOVERY USING SIDE MATCH Let the cover image be and the encrypted image with messages embedded be I”. Firstly, a random sequence is generated using the encryption key. The XOR of the 5 MSBs of I” and r are calculated to recover the five MSBs of the cover image. According to the data hiding key, the pixels in sets S0 and S1 of block H‘m,n are obtained. Flip the three LSBs of pixels in set S0, and calculate the XOR of the resultant bit string and r, we obtain m, n . Similarly, flip the three LSBs of pixels in set, and calculate the XOR of the resultant bit string and, we obtained m, n , above equation is then applied to evaluate the smoothness of m, n and m, n , and to obtain the evaluated results m, n and m, n , respectively. The difference Am, n between m, n and m, n is obtained by the following equation A m, n = m, n - m, n A larger | A m, n | indicates that H ~m, n is more dissimilar to H ^ m, n , which implies that the block H m, n becomes more complex after flipping 3 LSBs. Therefore, we calculate |Am, n | for all blocks, and sort |Am, n | in descending order. The data extraction and image recovery of blocks is then preformed using the sorted order of |Am, n |. IV. EXPERIMENTAL RESULTS We used four gray level images of size 512x12, including Lena, Baboon, Sailboat, and Splash as the test images, as shown in Fig. 1. These images can be obtained from USC-SIPI image database [11]. The experimental results are compared with [9]. To demonstrate the performance of the proposed method, we take Lena image as an example. Fig. 2(a) shows the decrypted Lena image with 5 MSBs recovered (suppose the block size is 8X8). Figs. 2(b) and (c) show the recovery results using [9] and the proposed method, respectively, where the incorrect recovered blocks are marked by white. Note that most of the incorrect recovered blocks are sparsely distributed over the complex regions of the Lena image. Comparing Figs. 2(b) and (c), we see that the proposed method recovers the image blocks more accurate than that of [9]. Although the experiments were based on Lena image, experiments on other test images also showed the proposed method effectively improves Zhang’s method, especially when the block size is small.
  • 6. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 288 Fig. 3. The error rate comparison. (a) Lena. (b) Baboon. (c) Sailboat. (d) Splash. V. CONCLUSION This paper proposes a scheme for Enhanced Separable Reversible Data Hiding in Encrypted images Using Side Match. We used a new algorithm to better estimate the smoothness of image blocks. The extraction and recovery of blocks are performed according to the descending order of the absolute smoothness difference between two candidate blocks. The side match technique is employed to further reduce the error rate. The experimental results show that the propose method effectively improves Zhang’s method, especially when the block size is small VI. REFERENCES [1] J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896, 2003. [2] M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, “Lossless generalized- LSB data embedding,” IEEE Trans. Image Process., vol. 14, no. 2, pp. 253–266, 2005. [3] Z. Ni, Y. Q. Shi, N. Ansari, andW. Su, “Reversible data hiding,” IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 8, pp. 354–362, 2006. [4] D.M. Thodi and J. J. Rodriguez, “Expansion embedding techniques for reversible watermarking,” IEEE Trans. Image Process., vol. 16, no. 3, pp. 721–730, 2007. [5] W. Hong and T. S. Chen, “Reversible data embedding for high quality images using interpolation and reference pixel distribution mechanism,” J. Vis. Commun. Image Represent., vol. 22, no. 2, pp. 131–140, 2011. [6] D.Kundur andK.Karthik, “Video fingerprinting and encryption principles for digital rights management,” Proc. IEEE, vol. 92, pp. 918–932, 2004.
  • 7. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 289 [7] S. Lian, Z. Liu, Z. Ren, and H. Wang, “Commutative encryption and watermarking in video compression,” IEEE Trans. Circuits Syst. Video Technol., vol. 17, no. 6, pp. 774–778, 2007. [8] M. Cancellaro, F. Battisti, M. Carli, G. Boato, F. G. B. Natale, and A. Neri, “A commutative digital image watermarking and encryption method in the tree structured haar transform domain,” Signal Process.: Image Commun., vol. 26, no. 1, pp. 1–12, 2011. [9] X. Zhang, “Reversible data hiding in encrypted images,” IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255–258, 2011. [10] X. Zhang, “Separable reversible data hiding in encrypted image,” IEEE Trans. Inf. Forensics Security, 10.1109/TIFS.2011.2176120. [11] Image database [Online]. Available: http://sipi.use.edu/database/