SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Latest Technology in Engineering, Management & Applied Science (IJLTEMAS)
Volume VI, Issue IV, April 2017 | ISSN 2278-2540
www.ijltemas.in Page 81
A Comparative Case Study on The Various
Techniques of Reversible Data Hiding
Dr. E. Kavitha
Department of ECE
Sri Krishna Institute of Technology
Bangalore, India
Anitha Grace Jeslyn B
Department of ECE
Sri Krishna Institute of Technology
Bangalore, India
Abstract-: Secured transmission of data is an important concern
now a days. A number of techniques are available for hiding and
transmitting the data through the images. It may be a simple or a
complex technique. In the receiver part if the host image is
recovered without any loss it is said to be reversible data hiding.
In this paper it is proposed to compare the reversible and lossless
data hiding techniques where both the host image and the hidden
data can be recovered without any loss. There are many
techniques that is presented as block based, pixel based and
interpolation based techniques. In the past data was embedded in
encrypted images with irreversible data hiding and now it is
reversible .The PSNR and the data hiding capacity que for these
methods are compared in this paper.
Keywords: - RDH (Reversible data hiding), PSNR, host Image ,
Image hiding Capacity.
I. INTRODUCTION
he concept of encrypting the data was developed to secure
the data from hackers and unauthorised users .Now a days
the interest towards the encryption of data and images have
increased due to the rapid increase in the data and image
transfer over the internet. The interest in securing the data was
achieved by cryptography and stegenography. Where in
cryptography the data will by encrypted using the encryption
algorithms and they will be converted into cipher text before
the transmission. The receiver end can decrypt the image by
sing the shared public or private keys .In stegenography the
encrypted cipher text can be embedded on a image (hidden
data) and then transmitted .In stegenography the host image is
not of interest and the data can be decrypted that makes the
process as a irreversible method as host image cannot be
retrieved. In the advancement of this technique even the host
image and the data can be retrieved that is reversible lossless
data hiding techniques.
The various available RDH methods are
1. Block based RDH
 Histogram and color histogram
 Mapping
 Pixel differencing
 Authentication
2. Pixel based RDH
 Pixel modification
 Pixel differencing
 Arithmetic coding
3. Interpolation Based RDH
Not only images even audio and video can be used as a host
medium or cover medium. Some information as business
logo and private annotations can be the data that can be
embedded on an cover medium. By this means claims of
digital content, copywrite protection can be fulfilled these
image hiding techniques can be used for covert
communication i.e., named as stegnography and those used
for ownership and copyright protection is called
watermarking. Irreversible data hiding techniques were
initially intended for the securing the data but in major
applications as remote sensing ,medical image system and
military applications the host medium or the host image also
has to be recovered with greater accuracy. Reversible data
hiding (RDH) techniques hides the data that has to be secured
in an image and only the authorised person will be able to
decode the data and the image used in the reversible data
hiding technique so the RDH provides authentication also.
The efficiency of the reversible data hiding algorithm is
calculated by estimating the visual quality and security of the
data and image, degree of complexity involved in the
technique and the payload capacity. In the reversible data
hiding technique equal importance is to be given to the
security both the data and the image or audio or video that is
used for hiding.[3]
The encryption process converts an plaintext into an
encrypted cipher text. The method of lossless data hiding is
said to be lossless when the cover signal or host signal having
the hidden data is same as that of unique host. for example the
pixels in a picture with the most utilized shading are doled to
some rarely used or unused shading lists for conveying extra
information. Now even though the pixel values are modified,
the original pixel values are still retained which will make the
T
International Journal of Latest Technology in Engineering, Management & Applied Science (IJLTEMAS)
Volume VI, Issue IV, April 2017 | ISSN 2278-2540
www.ijltemas.in Page 82
process as reversible process.[4] Lossy data hiding helps to
hide a large amount of data but host image cannot be
recovered. In some applications the data security is of major
concern .There are some cases when the content owner may
not want the data to be known to the data hider. Here the data
can be encrypted before going for data hiding. In real time
applications the secured medical image of a patient can be
transmitted securely without being viewed by the channel
administrator or inferior assistant by first encrypting the
image and then the personal information of the patient may be
embedded into the encrypted medical image to maintain the
records in the database of the hospital. Here the channel
administrator can embed information without knowing the
medical image of the patient. There are basically two levels of
security in encrypting the signal i.e., low level and high level.
In low level the visual quality has degraded compared to the
original image and still the information is readable by the
viewers[5][6].In high level the image looks like a random
noise and it is not understandable by the viewer at all. The
data hiding technique is simply linking the set of data’s to be
transmitted safely with the set of data in the host medium that
is an image. These techniques are used for stegno analysis and
authentication.
Some of the approaches for data hiding are block based, pixel
based and interpolation based techniques. Block based
reversible data hiding technique are generally adopted
techniques as other techniques require more capacity.
II. BLOCK BASED RDH
A. Histogram :
In the histogram approach there are various schemes that was
adopted like colour histogram, adaptive histogram, difference
histogram. Histogram involves adaptive division of cover
images and they are formed as blocks to provide good quality
and improved capacity to store data. Adaptive histogram
provides better PSNR. Dividing the cover image into blocks
enhances the hiding capacity. Peak pixel is generated for each
of the block .Later development in histogram instead of peak
pixel in the block the neighbouring pixels were used to embed
data. The 8x8 image is divided as 4x8, 8x4, 4x4 and complete
8x8
The histogram based shifting of reversible data hiding
technique is completed using four steps that is histogram
shifting, encoding process, embedding and extraction process.
Histogram shifting depends on the following as converting a
difference image for a grey scale image, using histogram bins
for extension embedding and modification of pixels.
The concept of histogram is dividing the host image into
blocks and the pixels in the image is converted into even and
odd values by computing the optimal value mean value
,median value or min max average nearer to the pixel in the
block is the optimal value. On the receiving end the data is
extracted and host image can also be recovered by calculating
the same optimal value. Histogram based on shifting was
initially proposed and this involves two stages an error
prediction stage and an error modification stage. A scheme
has been reported is the difference histogram in which there
are totally nine basic scan paths that are formed and this
method by selecting the best scan and the best pixel difference
large number of data could be hidden. Another effective
method was proposed in which the host image is divided into
titles and histogram shifting of low and high frequency image
parts. Another method (RW-HPBS) in this method original
image can be used for data hiding in two steps that is by
dividing the image into non overlapping sub blocks and then a
wavelet transform is applied to each of the sub block. This
method provided a better visual effect after embedding the
data and also better PSNR. In a next recent paper in 2006 by
Ni et al.[14] Message was hidden into histogram bins. The
hiding capacity reported here was low in this method.
In 2007 a new approach was reported by chrysochos called as
quasi lossless method in which least occurring colours were
used for incrementing the hiding capacity.[13] The image
quality of host message was improved in this method with
reduced hiding capacity. From single level multi level data
hiding technique was developed but this schemes efficiency
was depending on mainly the histogram modification scheme
involved. Another paper was proposed with lossless data
hiding using interior wavelet transform.
The approach of hiding data in grey scale was extended to
colour image increasing the multipeek histogram. The spatial
domain of RGB is used for hiding image. Below figure shows
the histogram way of data hiding.
B. Mapping:
Block based mapping scheme there are look up table, location
mapping and control mapping methods exist. Look up table
(LUT) embed data inside the media by using the lowest
distortion look up table. Mapping the data is mapped into the
stable responses instead of unstable responses. Contrast
mapping is a rapid watermarking embedded scheme.
C. Authentication and pixel differencing:
Block based authentication the algorithms are categorized as
fragile authentication, embedding capacity, semi fragile
authentication.
Another method in block based method is the block based
pixel differencing scheme. Similar to the previously proposed
scheme the neighbouring pixel difference is considered.
International Journal of Latest Technology in Engineering, Management & Applied Science (IJLTEMAS)
Volume VI, Issue IV, April 2017 | ISSN 2278-2540
www.ijltemas.in Page 83
Because of the greyscale values adjacent pixel values are
close to each other and that is used for hiding the data.
III. PIXEL BASED RDH
RDH (Reversible data hiding) has second alternate method as
pixel based where the pixels are either modified or shifted or
undergoes some logic based arithmetic computation.
In the pixel modification the pixels pairs that contain the
confidential data imply matrix and they create the stegno
image. After generating the stegno image the cipher text data
can be hidden into the image by modifying the little data with
the encrypted image. In the receiver side the encrypted image
is first decrypted using the encryption key and then the code
conversion helps to recover the image.
In the pixel differencing scheme by keeping the distortion low
the dispersion of pixel is used to achieve large hiding
capacity. In the pixel based on arithmetic coding the host
image is recovered by first subtraction of embedded
information .The subtraction of image and data is done by
using the arithmetic coding techniques. By the prediction
based encoder coding the compression efficiency is increased
without losing the data embedding capacity.[11,12]
Interpolation based data hiding scheme is based on neighbour
mean interpolation using R weighted coding method
developed in 2010.In 2014 a reversible data hiding method
with high capacity was developed based on the neighbouring
mean method .
IV. COMPARISON RESULTS
The experimental comparison results given in various papers
has been studied and the PSNR and the capacity of data hiding
in each of the methods are tabulated
S.no Method used authors PSNR capacity
1
Color
histogram
Thanuja et al. [5] 44.47 1080033
2
Histogram
modification
Gui et al. [7] 35.39 262144
3
Histogram
shifting
Hong et al. [6] 48.93 86178
4 Location map Jia et al. [8] 55.40 163840
5
Contrast
mapping
Lu et al. [9] 41.17 52628
6
Block based
authentication
Shi et al. [10] 44.20 39321
7
pixel
modification
Chang et al. [11] 45.11 262144
8
Arithmetic
coding
Celik et al. [12] 38.00 9325
V. CONCLUSION
The various methods of reversible data hiding schemes has
been analysed and it can be concluded that the RDH
techniques discussed provide a good tool for the secured
transmission of data. While analysing the experimental
results the wavelet transform methods are more efficient
than the spatial transform.
REFERENCES
[1]. Xinpeng Zhang Separable reversible data hiding in encrypted
messages
[2]. W.C. Kuo, D.J. Jiang, and Y.C. Huang. A reversible data hiding
scheme based on block division. In Proceedings CISP 2008, Vol.
1, pages 365–369, 2008
[3]. C.-H. Yang, C.-Y. Weng, S.-J. Wang, and H.-M. Sun. Adaptive
data hiding in edge areas of images with spatial LSB domain
systems. IEEE Trans. Information Forensics and Security, 3(3),
2008
[4]. N. A. Saleh, H. N. Boghdad, S. I. Shaheen, A. M. Darwish, “High
Capacity Lossless Data Embedding Technique for Palette Images
Based on Histogram Analysis,” Digital Signal Processing, 20, pp.
1629−1636, 2010.
[5]. Thanuja T. C., Kumari U. Invertible Data Hiding In Color Images
Using Multiple Peaks Histogram, Proceedings On International
Conference on Signal Processing Systems, 2009.
[6]. Hong W., Chen T. S., and Shiu C. W. Reversible Data Hiding
Based On Histogram Shifting Of Prediction Errors, Proceedings
On International Workshop On Geoscience And Remote Sensing
Amd International Workshop On Education Technology And
Training, ETT and GRS, Vol. 2, 2008.
[7]. Gui X., Li X., and Yang B. A High Capacity Reversible Data
Hiding Scheme Based On Generalized PredictionError Expansion
And Adaptive Embedding, Signal Processing, Vol. 98, 2014, Pp.
370-380.
[8]. Jia L., Shin S. H., and Yoo K. Y. A Reversible Data Hiding
Scheme Using Inverse Embedding Methods In DoubleEmbedding
Strategies, Proceedings on the 7th International Conference On
Informatics And Systems (INFOS), 2010.
International Journal of Latest Technology in Engineering, Management & Applied Science (IJLTEMAS)
Volume VI, Issue IV, April 2017 | ISSN 2278-2540
www.ijltemas.in Page 84
[9]. Lu T. C., Huang Y. H. An Effective Lossless Hiding Technique
Based On Reversible Contrast Mapping And Histogram
Embedding Methods, Proceedings On Fifth International
Conference On Information Assurance And Security, IAS'09, Vol.
2, 2009.
[10]. Shi Y. Q., Ni Z., Zou D., Liang C., and Xuan G. Lossless Data
Hiding: Fundamentals, Algorithms and Applications, Proceedings
on International Symposium on Circuits And Systems, Vol. 2,
Published By IEEE, 2004.
[11]. Chang C. C., Kieu T. D., and Chou Y. C. Reversible Data Hiding
Scheme Using Two Steganographic Images, Proceedings On
TENCON 2007-IEEE Region 10 Conference, Published By IEEE,
2007.
[12]. Celik M. U., Sharma G., Tekalp A. M., and Saber E. Reversible
Data Hiding, Proceedings On International Conference On Image
Processing. , Vol. 2, 2002.
[13]. Chrysochos E., Fotopoulos V., Skodras A., and Xenos M.
Reversible Image Watermarking Based On Histogram
Modification, Proceedings On Proc. 11th Panhellenic Conf.
Informatics (PCI 2007), 2007.
[14]. Ni Z., Shi Y. Q., Ansari N., Su W., Sun Q., and Lin X. Robust
Lossless Image Data Hiding, Proceedings On ICME'04
International Conference On Multimedia And Expo, Vol. 3,
Published By IEEE, 2004.

More Related Content

What's hot

What's hot (19)

AN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHY
AN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHYAN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHY
AN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHY
 
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
 
IRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data HidingIRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data Hiding
 
Image Steganography Techniques: An Overview
Image Steganography Techniques: An OverviewImage Steganography Techniques: An Overview
Image Steganography Techniques: An Overview
 
High Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet TransformHigh Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet Transform
 
IRJET- A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...
IRJET-  	  A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...IRJET-  	  A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...
IRJET- A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...
 
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
 
Reversible data hiding using histogram shifting method
Reversible data hiding using histogram shifting methodReversible data hiding using histogram shifting method
Reversible data hiding using histogram shifting method
 
Lossless and reversible data hiding in encrypted images with public key crypt...
Lossless and reversible data hiding in encrypted images with public key crypt...Lossless and reversible data hiding in encrypted images with public key crypt...
Lossless and reversible data hiding in encrypted images with public key crypt...
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
 
Sub1584
Sub1584Sub1584
Sub1584
 
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
 
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
 
A secure image steganography based on burrows wheeler transform and dynamic b...
A secure image steganography based on burrows wheeler transform and dynamic b...A secure image steganography based on burrows wheeler transform and dynamic b...
A secure image steganography based on burrows wheeler transform and dynamic b...
 
A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...
A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...
A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...
 
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...
 
Improved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesImproved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB images
 
An Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile CommunicationAn Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile Communication
 
Ijetcas14 527
Ijetcas14 527Ijetcas14 527
Ijetcas14 527
 

Similar to A comparative case study on the various techniques of reversible data hiding

Ensuring Distributed Accountability for Data Sharing Using Reversible Data Hi...
Ensuring Distributed Accountability for Data Sharing Using Reversible Data Hi...Ensuring Distributed Accountability for Data Sharing Using Reversible Data Hi...
Ensuring Distributed Accountability for Data Sharing Using Reversible Data Hi...
IOSR Journals
 

Similar to A comparative case study on the various techniques of reversible data hiding (20)

REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE ENCRYPTIO...
REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE ENCRYPTIO...REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE ENCRYPTIO...
REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE ENCRYPTIO...
 
K041068072
K041068072K041068072
K041068072
 
Reversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast EnhancementReversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast Enhancement
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
 
Implementation of image steganography using lab view
Implementation of image steganography using lab viewImplementation of image steganography using lab view
Implementation of image steganography using lab view
 
P017329498
P017329498P017329498
P017329498
 
A secured data transmission system by reversible data hiding with scalable co...
A secured data transmission system by reversible data hiding with scalable co...A secured data transmission system by reversible data hiding with scalable co...
A secured data transmission system by reversible data hiding with scalable co...
 
Data Hiding Using Reversibly Designed Difference-Pair Method
Data Hiding Using Reversibly Designed Difference-Pair MethodData Hiding Using Reversibly Designed Difference-Pair Method
Data Hiding Using Reversibly Designed Difference-Pair Method
 
A Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted ImagesA Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted Images
 
Secured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
Secured Reversible Data Hiding In Encrypted Images Using Hyper ChaosSecured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
Secured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
 
Ensuring Distributed Accountability for Data Sharing Using Reversible Data Hi...
Ensuring Distributed Accountability for Data Sharing Using Reversible Data Hi...Ensuring Distributed Accountability for Data Sharing Using Reversible Data Hi...
Ensuring Distributed Accountability for Data Sharing Using Reversible Data Hi...
 
High capacity histogram shifting based reversible data hiding with data compr...
High capacity histogram shifting based reversible data hiding with data compr...High capacity histogram shifting based reversible data hiding with data compr...
High capacity histogram shifting based reversible data hiding with data compr...
 
Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...
Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...
Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
 
Applying Information Security to Healthcare Services
Applying Information Security to Healthcare ServicesApplying Information Security to Healthcare Services
Applying Information Security to Healthcare Services
 
Scalable Image Encryption Based Lossless Image Compression
Scalable Image Encryption Based Lossless Image CompressionScalable Image Encryption Based Lossless Image Compression
Scalable Image Encryption Based Lossless Image Compression
 
Two Stage Reversible Data Hiding Based On Image Interpolation and Histogram ...
Two Stage Reversible Data Hiding Based On Image Interpolation  and Histogram ...Two Stage Reversible Data Hiding Based On Image Interpolation  and Histogram ...
Two Stage Reversible Data Hiding Based On Image Interpolation and Histogram ...
 
G017444651
G017444651G017444651
G017444651
 
Hiding algorithm based fused images and Caesar cipher with intelligent securi...
Hiding algorithm based fused images and Caesar cipher with intelligent securi...Hiding algorithm based fused images and Caesar cipher with intelligent securi...
Hiding algorithm based fused images and Caesar cipher with intelligent securi...
 

More from IJLT EMAS

Lithological Investigation at Tombia and Opolo Using Vertical Electrical Soun...
Lithological Investigation at Tombia and Opolo Using Vertical Electrical Soun...Lithological Investigation at Tombia and Opolo Using Vertical Electrical Soun...
Lithological Investigation at Tombia and Opolo Using Vertical Electrical Soun...
IJLT EMAS
 
Public Health Implications of Locally Femented Milk (Nono) and Antibiotic Sus...
Public Health Implications of Locally Femented Milk (Nono) and Antibiotic Sus...Public Health Implications of Locally Femented Milk (Nono) and Antibiotic Sus...
Public Health Implications of Locally Femented Milk (Nono) and Antibiotic Sus...
IJLT EMAS
 
Bioremediation Potentials of Hydrocarbonoclastic Bacteria Indigenous in the O...
Bioremediation Potentials of Hydrocarbonoclastic Bacteria Indigenous in the O...Bioremediation Potentials of Hydrocarbonoclastic Bacteria Indigenous in the O...
Bioremediation Potentials of Hydrocarbonoclastic Bacteria Indigenous in the O...
IJLT EMAS
 
Impact of Organisational behaviour and HR Practices on Employee Retention in ...
Impact of Organisational behaviour and HR Practices on Employee Retention in ...Impact of Organisational behaviour and HR Practices on Employee Retention in ...
Impact of Organisational behaviour and HR Practices on Employee Retention in ...
IJLT EMAS
 
Hassle Free Travel
Hassle Free TravelHassle Free Travel
Hassle Free Travel
IJLT EMAS
 

More from IJLT EMAS (20)

Lithological Investigation at Tombia and Opolo Using Vertical Electrical Soun...
Lithological Investigation at Tombia and Opolo Using Vertical Electrical Soun...Lithological Investigation at Tombia and Opolo Using Vertical Electrical Soun...
Lithological Investigation at Tombia and Opolo Using Vertical Electrical Soun...
 
Public Health Implications of Locally Femented Milk (Nono) and Antibiotic Sus...
Public Health Implications of Locally Femented Milk (Nono) and Antibiotic Sus...Public Health Implications of Locally Femented Milk (Nono) and Antibiotic Sus...
Public Health Implications of Locally Femented Milk (Nono) and Antibiotic Sus...
 
Bioremediation Potentials of Hydrocarbonoclastic Bacteria Indigenous in the O...
Bioremediation Potentials of Hydrocarbonoclastic Bacteria Indigenous in the O...Bioremediation Potentials of Hydrocarbonoclastic Bacteria Indigenous in the O...
Bioremediation Potentials of Hydrocarbonoclastic Bacteria Indigenous in the O...
 
Comparison of Concurrent Mobile OS Characteristics
Comparison of Concurrent Mobile OS CharacteristicsComparison of Concurrent Mobile OS Characteristics
Comparison of Concurrent Mobile OS Characteristics
 
Design of Complex Adders and Parity Generators Using Reversible Gates
Design of Complex Adders and Parity Generators Using Reversible GatesDesign of Complex Adders and Parity Generators Using Reversible Gates
Design of Complex Adders and Parity Generators Using Reversible Gates
 
Design of Multiplexers, Decoder and a Full Subtractor using Reversible Gates
Design of Multiplexers, Decoder and a Full Subtractor using Reversible GatesDesign of Multiplexers, Decoder and a Full Subtractor using Reversible Gates
Design of Multiplexers, Decoder and a Full Subtractor using Reversible Gates
 
Multistage Classification of Alzheimer’s Disease
Multistage Classification of Alzheimer’s DiseaseMultistage Classification of Alzheimer’s Disease
Multistage Classification of Alzheimer’s Disease
 
Design and Analysis of Disc Brake for Low Brake Squeal
Design and Analysis of Disc Brake for Low Brake SquealDesign and Analysis of Disc Brake for Low Brake Squeal
Design and Analysis of Disc Brake for Low Brake Squeal
 
Tomato Processing Industry Management
Tomato Processing Industry ManagementTomato Processing Industry Management
Tomato Processing Industry Management
 
Management of Propylene Recovery Unit
Management of Propylene Recovery UnitManagement of Propylene Recovery Unit
Management of Propylene Recovery Unit
 
Online Grocery Market
Online Grocery MarketOnline Grocery Market
Online Grocery Market
 
Management of Home Textiles Export
Management of Home Textiles ExportManagement of Home Textiles Export
Management of Home Textiles Export
 
Coffee Shop Management
Coffee Shop ManagementCoffee Shop Management
Coffee Shop Management
 
Management of a Paper Manufacturing Industry
Management of a Paper Manufacturing IndustryManagement of a Paper Manufacturing Industry
Management of a Paper Manufacturing Industry
 
Application of Big Data Systems to Airline Management
Application of Big Data Systems to Airline ManagementApplication of Big Data Systems to Airline Management
Application of Big Data Systems to Airline Management
 
Impact of Organisational behaviour and HR Practices on Employee Retention in ...
Impact of Organisational behaviour and HR Practices on Employee Retention in ...Impact of Organisational behaviour and HR Practices on Employee Retention in ...
Impact of Organisational behaviour and HR Practices on Employee Retention in ...
 
Sustainable Methods used to reduce the Energy Consumption by Various Faciliti...
Sustainable Methods used to reduce the Energy Consumption by Various Faciliti...Sustainable Methods used to reduce the Energy Consumption by Various Faciliti...
Sustainable Methods used to reduce the Energy Consumption by Various Faciliti...
 
Sweet-shop Management
Sweet-shop ManagementSweet-shop Management
Sweet-shop Management
 
Hassle Free Travel
Hassle Free TravelHassle Free Travel
Hassle Free Travel
 
Aviation Meteorology
Aviation MeteorologyAviation Meteorology
Aviation Meteorology
 

Recently uploaded

Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spain
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 

A comparative case study on the various techniques of reversible data hiding

  • 1. International Journal of Latest Technology in Engineering, Management & Applied Science (IJLTEMAS) Volume VI, Issue IV, April 2017 | ISSN 2278-2540 www.ijltemas.in Page 81 A Comparative Case Study on The Various Techniques of Reversible Data Hiding Dr. E. Kavitha Department of ECE Sri Krishna Institute of Technology Bangalore, India Anitha Grace Jeslyn B Department of ECE Sri Krishna Institute of Technology Bangalore, India Abstract-: Secured transmission of data is an important concern now a days. A number of techniques are available for hiding and transmitting the data through the images. It may be a simple or a complex technique. In the receiver part if the host image is recovered without any loss it is said to be reversible data hiding. In this paper it is proposed to compare the reversible and lossless data hiding techniques where both the host image and the hidden data can be recovered without any loss. There are many techniques that is presented as block based, pixel based and interpolation based techniques. In the past data was embedded in encrypted images with irreversible data hiding and now it is reversible .The PSNR and the data hiding capacity que for these methods are compared in this paper. Keywords: - RDH (Reversible data hiding), PSNR, host Image , Image hiding Capacity. I. INTRODUCTION he concept of encrypting the data was developed to secure the data from hackers and unauthorised users .Now a days the interest towards the encryption of data and images have increased due to the rapid increase in the data and image transfer over the internet. The interest in securing the data was achieved by cryptography and stegenography. Where in cryptography the data will by encrypted using the encryption algorithms and they will be converted into cipher text before the transmission. The receiver end can decrypt the image by sing the shared public or private keys .In stegenography the encrypted cipher text can be embedded on a image (hidden data) and then transmitted .In stegenography the host image is not of interest and the data can be decrypted that makes the process as a irreversible method as host image cannot be retrieved. In the advancement of this technique even the host image and the data can be retrieved that is reversible lossless data hiding techniques. The various available RDH methods are 1. Block based RDH  Histogram and color histogram  Mapping  Pixel differencing  Authentication 2. Pixel based RDH  Pixel modification  Pixel differencing  Arithmetic coding 3. Interpolation Based RDH Not only images even audio and video can be used as a host medium or cover medium. Some information as business logo and private annotations can be the data that can be embedded on an cover medium. By this means claims of digital content, copywrite protection can be fulfilled these image hiding techniques can be used for covert communication i.e., named as stegnography and those used for ownership and copyright protection is called watermarking. Irreversible data hiding techniques were initially intended for the securing the data but in major applications as remote sensing ,medical image system and military applications the host medium or the host image also has to be recovered with greater accuracy. Reversible data hiding (RDH) techniques hides the data that has to be secured in an image and only the authorised person will be able to decode the data and the image used in the reversible data hiding technique so the RDH provides authentication also. The efficiency of the reversible data hiding algorithm is calculated by estimating the visual quality and security of the data and image, degree of complexity involved in the technique and the payload capacity. In the reversible data hiding technique equal importance is to be given to the security both the data and the image or audio or video that is used for hiding.[3] The encryption process converts an plaintext into an encrypted cipher text. The method of lossless data hiding is said to be lossless when the cover signal or host signal having the hidden data is same as that of unique host. for example the pixels in a picture with the most utilized shading are doled to some rarely used or unused shading lists for conveying extra information. Now even though the pixel values are modified, the original pixel values are still retained which will make the T
  • 2. International Journal of Latest Technology in Engineering, Management & Applied Science (IJLTEMAS) Volume VI, Issue IV, April 2017 | ISSN 2278-2540 www.ijltemas.in Page 82 process as reversible process.[4] Lossy data hiding helps to hide a large amount of data but host image cannot be recovered. In some applications the data security is of major concern .There are some cases when the content owner may not want the data to be known to the data hider. Here the data can be encrypted before going for data hiding. In real time applications the secured medical image of a patient can be transmitted securely without being viewed by the channel administrator or inferior assistant by first encrypting the image and then the personal information of the patient may be embedded into the encrypted medical image to maintain the records in the database of the hospital. Here the channel administrator can embed information without knowing the medical image of the patient. There are basically two levels of security in encrypting the signal i.e., low level and high level. In low level the visual quality has degraded compared to the original image and still the information is readable by the viewers[5][6].In high level the image looks like a random noise and it is not understandable by the viewer at all. The data hiding technique is simply linking the set of data’s to be transmitted safely with the set of data in the host medium that is an image. These techniques are used for stegno analysis and authentication. Some of the approaches for data hiding are block based, pixel based and interpolation based techniques. Block based reversible data hiding technique are generally adopted techniques as other techniques require more capacity. II. BLOCK BASED RDH A. Histogram : In the histogram approach there are various schemes that was adopted like colour histogram, adaptive histogram, difference histogram. Histogram involves adaptive division of cover images and they are formed as blocks to provide good quality and improved capacity to store data. Adaptive histogram provides better PSNR. Dividing the cover image into blocks enhances the hiding capacity. Peak pixel is generated for each of the block .Later development in histogram instead of peak pixel in the block the neighbouring pixels were used to embed data. The 8x8 image is divided as 4x8, 8x4, 4x4 and complete 8x8 The histogram based shifting of reversible data hiding technique is completed using four steps that is histogram shifting, encoding process, embedding and extraction process. Histogram shifting depends on the following as converting a difference image for a grey scale image, using histogram bins for extension embedding and modification of pixels. The concept of histogram is dividing the host image into blocks and the pixels in the image is converted into even and odd values by computing the optimal value mean value ,median value or min max average nearer to the pixel in the block is the optimal value. On the receiving end the data is extracted and host image can also be recovered by calculating the same optimal value. Histogram based on shifting was initially proposed and this involves two stages an error prediction stage and an error modification stage. A scheme has been reported is the difference histogram in which there are totally nine basic scan paths that are formed and this method by selecting the best scan and the best pixel difference large number of data could be hidden. Another effective method was proposed in which the host image is divided into titles and histogram shifting of low and high frequency image parts. Another method (RW-HPBS) in this method original image can be used for data hiding in two steps that is by dividing the image into non overlapping sub blocks and then a wavelet transform is applied to each of the sub block. This method provided a better visual effect after embedding the data and also better PSNR. In a next recent paper in 2006 by Ni et al.[14] Message was hidden into histogram bins. The hiding capacity reported here was low in this method. In 2007 a new approach was reported by chrysochos called as quasi lossless method in which least occurring colours were used for incrementing the hiding capacity.[13] The image quality of host message was improved in this method with reduced hiding capacity. From single level multi level data hiding technique was developed but this schemes efficiency was depending on mainly the histogram modification scheme involved. Another paper was proposed with lossless data hiding using interior wavelet transform. The approach of hiding data in grey scale was extended to colour image increasing the multipeek histogram. The spatial domain of RGB is used for hiding image. Below figure shows the histogram way of data hiding. B. Mapping: Block based mapping scheme there are look up table, location mapping and control mapping methods exist. Look up table (LUT) embed data inside the media by using the lowest distortion look up table. Mapping the data is mapped into the stable responses instead of unstable responses. Contrast mapping is a rapid watermarking embedded scheme. C. Authentication and pixel differencing: Block based authentication the algorithms are categorized as fragile authentication, embedding capacity, semi fragile authentication. Another method in block based method is the block based pixel differencing scheme. Similar to the previously proposed scheme the neighbouring pixel difference is considered.
  • 3. International Journal of Latest Technology in Engineering, Management & Applied Science (IJLTEMAS) Volume VI, Issue IV, April 2017 | ISSN 2278-2540 www.ijltemas.in Page 83 Because of the greyscale values adjacent pixel values are close to each other and that is used for hiding the data. III. PIXEL BASED RDH RDH (Reversible data hiding) has second alternate method as pixel based where the pixels are either modified or shifted or undergoes some logic based arithmetic computation. In the pixel modification the pixels pairs that contain the confidential data imply matrix and they create the stegno image. After generating the stegno image the cipher text data can be hidden into the image by modifying the little data with the encrypted image. In the receiver side the encrypted image is first decrypted using the encryption key and then the code conversion helps to recover the image. In the pixel differencing scheme by keeping the distortion low the dispersion of pixel is used to achieve large hiding capacity. In the pixel based on arithmetic coding the host image is recovered by first subtraction of embedded information .The subtraction of image and data is done by using the arithmetic coding techniques. By the prediction based encoder coding the compression efficiency is increased without losing the data embedding capacity.[11,12] Interpolation based data hiding scheme is based on neighbour mean interpolation using R weighted coding method developed in 2010.In 2014 a reversible data hiding method with high capacity was developed based on the neighbouring mean method . IV. COMPARISON RESULTS The experimental comparison results given in various papers has been studied and the PSNR and the capacity of data hiding in each of the methods are tabulated S.no Method used authors PSNR capacity 1 Color histogram Thanuja et al. [5] 44.47 1080033 2 Histogram modification Gui et al. [7] 35.39 262144 3 Histogram shifting Hong et al. [6] 48.93 86178 4 Location map Jia et al. [8] 55.40 163840 5 Contrast mapping Lu et al. [9] 41.17 52628 6 Block based authentication Shi et al. [10] 44.20 39321 7 pixel modification Chang et al. [11] 45.11 262144 8 Arithmetic coding Celik et al. [12] 38.00 9325 V. CONCLUSION The various methods of reversible data hiding schemes has been analysed and it can be concluded that the RDH techniques discussed provide a good tool for the secured transmission of data. While analysing the experimental results the wavelet transform methods are more efficient than the spatial transform. REFERENCES [1]. Xinpeng Zhang Separable reversible data hiding in encrypted messages [2]. W.C. Kuo, D.J. Jiang, and Y.C. Huang. A reversible data hiding scheme based on block division. In Proceedings CISP 2008, Vol. 1, pages 365–369, 2008 [3]. C.-H. Yang, C.-Y. Weng, S.-J. Wang, and H.-M. Sun. Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Trans. Information Forensics and Security, 3(3), 2008 [4]. N. A. Saleh, H. N. Boghdad, S. I. Shaheen, A. M. Darwish, “High Capacity Lossless Data Embedding Technique for Palette Images Based on Histogram Analysis,” Digital Signal Processing, 20, pp. 1629−1636, 2010. [5]. Thanuja T. C., Kumari U. Invertible Data Hiding In Color Images Using Multiple Peaks Histogram, Proceedings On International Conference on Signal Processing Systems, 2009. [6]. Hong W., Chen T. S., and Shiu C. W. Reversible Data Hiding Based On Histogram Shifting Of Prediction Errors, Proceedings On International Workshop On Geoscience And Remote Sensing Amd International Workshop On Education Technology And Training, ETT and GRS, Vol. 2, 2008. [7]. Gui X., Li X., and Yang B. A High Capacity Reversible Data Hiding Scheme Based On Generalized PredictionError Expansion And Adaptive Embedding, Signal Processing, Vol. 98, 2014, Pp. 370-380. [8]. Jia L., Shin S. H., and Yoo K. Y. A Reversible Data Hiding Scheme Using Inverse Embedding Methods In DoubleEmbedding Strategies, Proceedings on the 7th International Conference On Informatics And Systems (INFOS), 2010.
  • 4. International Journal of Latest Technology in Engineering, Management & Applied Science (IJLTEMAS) Volume VI, Issue IV, April 2017 | ISSN 2278-2540 www.ijltemas.in Page 84 [9]. Lu T. C., Huang Y. H. An Effective Lossless Hiding Technique Based On Reversible Contrast Mapping And Histogram Embedding Methods, Proceedings On Fifth International Conference On Information Assurance And Security, IAS'09, Vol. 2, 2009. [10]. Shi Y. Q., Ni Z., Zou D., Liang C., and Xuan G. Lossless Data Hiding: Fundamentals, Algorithms and Applications, Proceedings on International Symposium on Circuits And Systems, Vol. 2, Published By IEEE, 2004. [11]. Chang C. C., Kieu T. D., and Chou Y. C. Reversible Data Hiding Scheme Using Two Steganographic Images, Proceedings On TENCON 2007-IEEE Region 10 Conference, Published By IEEE, 2007. [12]. Celik M. U., Sharma G., Tekalp A. M., and Saber E. Reversible Data Hiding, Proceedings On International Conference On Image Processing. , Vol. 2, 2002. [13]. Chrysochos E., Fotopoulos V., Skodras A., and Xenos M. Reversible Image Watermarking Based On Histogram Modification, Proceedings On Proc. 11th Panhellenic Conf. Informatics (PCI 2007), 2007. [14]. Ni Z., Shi Y. Q., Ansari N., Su W., Sun Q., and Lin X. Robust Lossless Image Data Hiding, Proceedings On ICME'04 International Conference On Multimedia And Expo, Vol. 3, Published By IEEE, 2004.