Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Reversible data hiding in encrypted images by reserving room before encryption

TO GET THIS PROJECT THROUGH ONLINE OR TRAINING SESSION CONTACT:
LansA Informatics Pvt Ltd
No 165, 5th Street,
Crosscut road, Gandhipuram,
Coimbatore - 641 012
Landline: 0422 - 4204373
Mobile: +91 90 953 953 33
Email :lansa.projects@gmail.com
Website: www.lansainformatics.com
Blog: www.lansastudentscdc.blogspot.com

  • Login to see the comments

Reversible data hiding in encrypted images by reserving room before encryption

  1. 1. REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE ENCRYPTION  Presented by: LansA Informatics Pvt Ltd
  2. 2. ABSTRACT Recently, more and more attention is paid to reversible data hiding (RDH) in encrypted images, since it maintains the excellent property that the original cover can be losslessly recovered after embedded data is extracted while protecting the image content’s confidentiality. All previous methods embed data by reversibly vacating room from the encrypted images, which may be subject to some errors on data extraction and/or image restoration. In this paper, we propose a novel method by reserving room before encryption with a traditional RDH algorithm, and thus it is easy for the data hider to reversibly embed data in the encrypted image. The proposed method can achieve real reversibility, that is, data extraction and image recovery are free of any error. Experiments show that this novel method can embed more than 10 times as large payloads for the same image quality as the previous methods, such as for PSNR =40dB.
  3. 3.  In this framework, a content owner encrypts the original image using a standard cipher with an encryption key. After producing the encrypted image, the content owner hands over it to a data hider (e.g., a database manager) and the data hider can embed some auxiliary data into the encrypted image by losslessly vacating some room according to a data hiding key. Then a receiver, maybe the content owner himself or an authorized third party can extract the embedded data with the data hiding key and further recover the original image from the encrypted version according to the encryption key
  4. 4.  All previous methods embed data by reversibly vacating room from the encrypted images, which may be subject to some errors on data extraction and/or image restoration.  It is difficult for data hider to reversibly hide the data behind the image.
  5. 5.  Since losslessly vacating room from the encrypted images is relatively difficult and sometimes inefficient, why are we still so obsessed to find novel RDH techniques working directly for encrypted images? If we reverse the order of encryption and vacating room, i.e., reserving room prior to image encryption at content owner side, the RDH tasks in encrypted images would be more natural and much easier which leads us to the novel framework, “reserving room before encryption (RRBE)”.  Obviously, standard RDH algorithms are the ideal operator for reserving room before encryption and can be easily applied to Framework RRBE to achieve better performance compared with techniques from Framework VRAE.
  6. 6.  In this system it uses traditional RDH algorithm, and thus it is easy for the data hider to reversibly embed data in the encrypted image.  Using this system data extraction and image recovery are free of any error.
  7. 7. SYSTEM CONFIGURATION:- HARDWARE REQUIREMENTS:- Processor - Pentium –IV Speed - 1.1 Ghz RAM - 512 MB(min) Hard Disk - 40 GB Key Board - Standard Windows Keyboard Mouse - Two or Three Button Mouse Monitor - LCD/LED
  8. 8. SYSTEM ARCHITECHTURE
  9. 9. SYSTEM CONFIGURATION:- SOFTWARE REQUIREMENTS:- Operating system: Windows XP. Coding Language : Android Data Base : SQLite Tool : Eclipse.
  10. 10.  Authentication: In this module it allows user to enter the user name and password in order to restrict the user to access the system. Then it validates the entered user name and password, if it is correct it will allow the user to access the application.  Change Password: In this module it allows user to change the password as required. For that user has to enter the old password and then the new password. If it matches then the changes will be carried out.
  11. 11.  Encrypt: In this module it allows to pick the image from the gallery and then to enter the password key for encryption after that has to enter the message, that have to be encrypted. Once this all over, encryption is carried out.  Decrypt: In this module it allows to pick the encrypted image from the gallery and then to enter the password key to decrypt. If the image and the key is correct then the corresponding message will be displayed.
  12. 12.  Histogram: In this module it compares the histogram of the image before encryption and the image after encryption.  Database: In this module stores the username and password to order for authentication and also the key to decrypt the message from the image.
  13. 13. Screen shot I
  14. 14. Screen shot II
  15. 15. Screen shot III
  16. 16. Screen shot IV
  17. 17. REFERENCE: Kede Ma, Weiming Zhang, Xianfeng Zhao, Nenghai Yu, and Fenghua Li, “REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE ENCRYPTION” IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 3, MARCH 2013.
  18. 18. OFFICE ADDRESS: LansA Informatics Pvt ltd No 165, 5th Street, Crosscut Road, Gandhipuram, Coimbatore - 641 015 OTHER MODE OF CONTACT: Landline: 0422 – 4204373 Mobile : +91 90 953 953 33 +91 91 591 159 69 Email ID: lansa.projects@gmail.com web: www.lansainformatics.com Blog: www.lansastudentscdc.blogspot.com Facebook: www.facebook.com/lansainformatics Twitter: www.twitter.com/lansainformatic CONTACT US

×