SlideShare a Scribd company logo
Meenal V. Jagdale et al Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 7( Version 1), July 2014, pp.175-180 
www.ijera.com 175 | P a g e 
Reversible Encrypytion and Information Concealment Meenal V. Jagdale1, Dr. Shubhalaxmi P. Hingway2, Sheeja S. Suresh3 1 P.G. student at Department of Electronics and Telecommunication G.H.Raisoni Institute of Engineering and Technology For Women . Nagpur –India 2Professor at Department of Electronics and Telecommunication G.H.Raisoni Institute of Engineering and Technology For Women . Nagpur –India 3Asst. Professor at Department of Electronics and Telecommunication G.H.Raisoni Institute of Engineering and Technology For Women . Nagpur –India ABSTRACT Recently, a lot of attention is paid to reversible data hiding (RDH) in encrypted pictures, since it maintains the wonderful property that the initial image cover will be losslessly recovered when embedded data is extracted, whereas protects the image content that is need to be kept confidential. Other techniques used antecedently are to embed data by reversibly vacating area from the pictures, that area unit been encryted, may cause some errors on information extraction or image restoration. In this paper, we propose a unique methodology by reserving room before secret writing (i.e reserving room before encryption) with a conventional RDH algorithmic rule, and thus it becomes straightforward for hider to reversibly embed data in the encrypted image. The projected methodology is able to implement real reversibility, that is, information extraction and image recovery area unit free of any error. This methodology embedds larger payloads for constant image quality than the antecedently used techniques, like for PSNR= 40db. Keywords- Reversible data hiding, privacy protection, bar chart shift, image secret writing. 
I. INTRODUCTION 
Data concealment may be a technique that conceals secret knowledge into a carrier to convey messages. Digital pictures are one of all the media that's appropriate to convey messages due to many reasons. Firstly, digital pictures are typically transmitted over the internet which might raise very little suspicion. Secondly, the high correlation between pixels provides room for knowledge embedding. Once a digital image is employed as a carrier, the image accustomed introduce knowledge is thought because the cover image, and also the image with knowledge embedded is named the stego image. Within the embedding method, the pixels of the duvet image are changed and so, distortion happens. In general, the more the duvet image is distorted, the more vulnerable is that the stego image to steganalytic attempts. To forestall the stego image from being suspicious and detected, either visually statistically, the distortions caused by embedding the information ought to be as minimum as attainable, that imply that a prime quality embedded image is demanded. For many of the prevailing knowledge concealment techniques, the distortions caused by knowledge embedding are permanent i.e. the stego image cannot be rehabilitated to its original state. However, for a few applications, like medical or military pictures, it's desired that the first cover image are often utterly recovered owing to the wants for legal concerns or high exactness nature. To satisfy these needs, the reversible knowledge concealment theme for top quality pictures is introduced i.e reversible data hiding. In 2003, Tian planned a reversible knowledge concealment technique using the distinction enlargement technique. In this technique, one bit is often embedded into 2 consecutive pixels; thus, the highest embedding capability is 0.5 bpp. Alattar generalized the distinction enlargement technique in order that n-1 bits are often embedded into n pixels, ensuring the highest embedding capability to be (n- 1)/n bpp. However, the distinction enlargement based mostly reversible knowledge concealment strategies have to be compelled to double the variations between pixels; thus, a bigger distortion happens and will not be appropriate for applications wherever prime quality pictures are demanded. In 2006, Ni et al. planned a completely unique histogram-shifting reversible knowledge concealment technique. In Ni et al.’s method, pixel values are changed one gray scale value at the most and so, a prime quality stego image are often achieved. However, the highest payload is restricted by the peak height of the image histogram; thus, the payload of this technique is comparatively low. Hwang et al.also planned a reversible knowledge concealment technique supported histogram-shifting and had higher embedding potency compared to Ni et al.’s work. 
In 2007, Thodi and Rodriguez planned a totally different technique by increasing the prediction errors.As the result of the prediction error is 
RESEARCH ARTICLE OPEN ACCESS
Meenal V. Jagdale et al Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 7( Version 1), July 2014, pp.175-180 
www.ijera.com 176 | P a g e 
sometimes smaller than the distinction between 2 consecutive pixel values, the stego image quality obtained by this technique is healthier than that of Tian’s technique. However, Thodi and Rodriguez’s technique is additionally supported by expansion- embedding technique, a bigger distortion could occur; thus, their technique isn't appropriate for applications requiring prime quality pictures. II. PLANNED TECHNIQUE 
Vacating space from the encrypted pictures losslessly is comparatively troublesome and conjointly typically inefficient. Thus, we use a method to reverse the order of encoding and vacating space, i.e. reserving room before encryption at content owner facet, the RDH tasks in encrypted pictures would be a lot natural and also easier that leads North American country to the framework, “reserving space before encoding (RRBE)”.As shown in Fig. 1(b), the content owner initially reserves enough space on original image and so converts the image into its encrypted version with the encoding key. The data embedding method in encrypted pictures is inherently reversible for the data hider, solely has to accommodate data into the spare space previously emptied out. The information extraction and image recovery is the image of the Framework VRAE where standard RDH algorithm is the ideal operator for reserving space before encryption and might be simply applied to Framework RRBE to offer higher performance as compared with techniques from Framework VRAE. This can be as a result of the new framework, where we follow the customary concept that initially losslessly compresses the redundant image content (e.g.by applying best RDH techniques) and encrypts it with reference to protect the privacy. Next, we have a tendency to elaborate a sensible technique supported the Framework “RRBE”, that primarily consists of 4 stages: generation of encrypted image, information concealment in encrypted image, information extraction and image recovery. (a) (b) (c) Fig 1. Block diagram: (a) Encryption and data embedding flow (b) Decryption (c) Complete architecture.
Meenal V. Jagdale et al Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 7( Version 1), July 2014, pp.175-180 
www.ijera.com 177 | P a g e 
[A] GENERATION OF ENCRYPTED IMAGE To construct the encrypted image 3 steps are followed: image partition, self-reversible embedding followed by image cryptography. 
(1) Image Partition: The operator here for reserving room before encryption may be a customary RDH technique, therefore the goal of image partition is to construct a smoother space B, on that customary RDH algorithms are able to aquier higher performance .Assume the initial image C is of eight bits gray-scale image with its size M x N and pixels Cij € [0,255], 1≤ i ≤ M, 1≤ j ≤ N. First, the content owner extracts from the initial image, on the rows, several overlapping blocks whose variety is decided by the size of the embedded message, denoted by l. In detail, every block consists of rows, wherever m = [l/N] and therefore the variety of blocks may be computed through n = M – m + 1. For each block, here a function is stated to measure its first-order smoothness ….(1) 
Higher f relates to blocks that contain comparatively additional complicated textures. The content owner, therefore, selects the actual block with the best f to be A, and puts it to the front of the image concatenated by the remainder half B with fewer rough-textured areas, as shown in Fig. 2.Here at the most 3 LSB-planes of A are used. 
Fig (a) Original image Fig (b) Final A Fig(c) Final B
Meenal V. Jagdale et al Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 7( Version 1), July 2014, pp.175-180 
www.ijera.com 178 | P a g e 
Fig 2. Illustration of Image patition and embedding process. 
(2) Self-Reversible Embedding: The motive of self-reversible 
embedding is to embed the LSB-planes of 
A into B by using ancient RDH algorithms. Pixels in 
image B are firstly classified into 2 sets as, white 
pixels with its indices i and j satisfying ( i +j)mod 
2=0 and black pixels with indices ( i +j)mod 2= 
1 as in Fig. 2. Then, every white pixel Bi,j is 
calculable by the interpolation price obtained with the 
four black pixels encompassing it as follows, 
….. (2) 
Where the weight wi 1 ≤ i ≤ 4. Then the 
estimating error is calculated via eij = Bi,j – B’i,j 
alongside embedding some knowledge into the 
estimating error sequence with bar chart shift. After 
this we calculate the estimating errors of black pixels 
with the assistance of encompassing white pixels that 
are being changed. Then another estimating error 
sequence is made which will accommodate messages. 
Thus, we summarize that, to take advantage of all 
pixels of B, 2 estimating error sequences are created 
for embedding messages in each single-layer of 
embedding method. Using two-way bar chart shift, 
some messages are often embedded on every error 
sequence. In RDH algorithms, there happens the 
overflow and underflow once the natural boundary 
pixels modifies from 255 to 256 or from zero to -1. 
For its rejection, a boundary map is introduced to 
point whether or not boundary pixels in marked 
image natural or pseudo in extracting method. 
(3) Image Cryptography: When the rearranged 
self-embedded image that is denoted by X is 
generated, we encrypt X to construct the encrypted 
image denoted by E .Using stream cipher, the 
encoding version of X are often simply obtained. For 
an example, a grey value Xi,j starting from 0 to 255 
are often shown by 8 bits, Xi,j(0), Xi,j(1), . . . , 
Xi,j(7), such that 
….. (3) 
The encrypted bits Ei,j(k) can be calculated through 
exclusive-or operation 
….. (4) 
Where ri,j(k) is generated via a regular stream cipher. 
Finally, embed 10 bits of data into LSB’s of 1st 10 
pixels in encrypted version of A to point knowledge 
hider the full range of rows and therefore the bit-planes 
he will enter information into. 
[B] INFORMATION CONCEALMENT IN 
ENCRYPTED IMAGE 
Once the information hider acquires the 
encrypted image E, he can embed some information 
into it, though he doesn't get access to the original 
image. The embedding method initiates by locating 
the encrypted version of A, denoted by AE. Since AE 
has been rearranged to the highest of E, it's simple for 
data hider to read 10 bits information in LSB’s of 1st 
10 encrypted pixels. After knowing the quantity of 
bit-planes and rows of pixels he can modify, the data 
hider merely adopts LSB replacement to substitute 
the offered bit-planes with extra data m Here, the 
data hider sets a label to signifies the top position of 
embedding method and then encrypts accordingly 
with the data concealment key to formulate marked 
encrypted image E'. 
[C] INFORMATION EXTRACTION AND 
IMAGE RECOVERY 
Extraction of information is totally freelance 
from image coding and therefore its order implies 2 
completely different applications. 
(1) Case 1: Extracting information From Encrypted 
Images:
Meenal V. Jagdale et al Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 7( Version 1), July 2014, pp.175-180 
www.ijera.com 179 | P a g e 
In accordance to update and manage personal 
information of pictures that are encrypted for 
shielding clients’ privacy, an inferior information 
manager might solely get access to the data 
concealment key and have to be compelled to 
manipulate data in encrypted domain. The order of 
information extraction before image coding 
guarantees the feasibleness. The information manager 
will decode the LSB-planes of AE and extract the 
extra information m by directly reading the decrypted 
version once supplied with the information 
concealment key. 
(2) Case 2: Extracting information From Decrypted 
Images: 
In the previous case each embedding and extraction 
of the information are manipulated in encrypted 
domain, whereas there exists a special scenario 
wherever the user desires to decode the image 1st and 
extract the information from the decrypted image 
once it's required. 
(a) Generating the Marked Decrypted Image: To 
accumulate the marked decrypted image X” that is 
created of A" and B", the content owner ought to do 
following 2 steps: 
• Step 1: With the cryptography key, the content 
owner decrypts the image except the LSB-planes of 
AE. The decrypted version of E' containing the 
embedded information are often calculated by, 
….. (5) 
And 
….. (6) 
Where E’i,j(k) and X”i,j(k) area unit the binary bits 
of E’i.j and X”i,j obtained via (3) severally. 
• Step 2: Rearrange A” and B” to its original state, we 
can acquire the plain image containing embedded 
information because the marked decrypted image X” 
is clone of rearranged X except LSB-planes of A. At 
the meanwhile, it keeps sensory activity transparency 
compared with original image C. More specifically, 
the distortion is introduced via 2 separate ways: the 
embedding method by modifying the LSB-planes of 
A and self-reversible embedding method by 
embedding LSB-planes of A into B. 
(b) Information Extraction and Image Restoration: 
Nextly, the content owner will extract the 
information and recover original image after 
generating the marked decrypted image. The method 
is comparable to the normal RDH ways. The 
subsequent outlines the particular steps: 
• Step 1: Record and decode the LSB-planes of A” 
consistent with the information concealment key; 
extract the information till the top label is reached. 
• Step 2: Extract LN, RN, LM, RM, LP, RP, Rb, x 
and boundary map from the LSB of marginal space 
of B”. Then, scan B” to undertake the subsequent 
steps. 
• Step 3: If Rb is equal to zero, which implies no 
black pixels participate in embedding method, move 
to Step5. 
• Step 4: Calculate estimating errors e’i,j of the black 
pixels B”i,j . If B”i,j belongs to [1, 254], recover the 
estimating error and original pixel value in a very 
reverse order and extract embedded bits once e’i,j is 
equal to LN, LM (or LP), RM (or RP ) and RN. If b = 
0, skip this, else operate like B”i,j € [1, 254] . Repeat 
this step till the part of payload Rb is extracted. 
• Step 5: Calculate estimating errors e’i,j of the 
white pixels B”i,j ,and extract embedded bits and 
recover white pixels within the same manner as with 
Step 4. 
• Step 6: Continue Step 2 to Step 5, (x – 1) rounds on 
B” and merge all extracted bits to create LSB-planes 
of A. Until now, we've utterly recovered B. 
• Step 7: Replace marked LSB-planes of A” with its 
original bits extracted from B” to urge original cover 
image C. 
OUTPUT OBTAINED: 
Fig 3.(a) Original image, (b) encrypted image, (c) decrypted image containing message, (d) recovery version.
Meenal V. Jagdale et al Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 7( Version 1), July 2014, pp.175-180 
www.ijera.com 180 | P a g e 
(e) Corresponding command window indicating the increased PSNR value to 39.48db. 
III .CONCLUSION Reversible information concealment in encrypted pictures is a new idea drawing attention owing to the privacy-preserving needs from cloud information management. In previous strategies RDH method was incorporated in encrypted pictures by vacating space once encrypting the image, while in opposition with it we implemented reserving room before encrypting the image. Hence, the information hider have an advantage of the additional area emptied in the previous stage and make the information concealment method relatively more easy and effortless. This technique profits over all the ancient RDH techniques for plain pictures and reach high performance with no loss of secrecy. Moreover, this novel technique gains separate information extraction, real reversibility and great improvement on the standard of marked decrypted pictures. REFERENCES [1] Kede Ma,Weiming Zhang,Xeianfeng Zhao,”Reversible data hiding in encrypted images by reserving room before encryption” IEEE Trans. On information forensic and security,VOL.8NO.3 March 2013. [2] W. Zhang, B. Chen, and N. Yu, “Improving various reversible data hiding schemes via optimal codes for binary covers,” IEEE Trans.Image Process., vol. 21, no. 6, pp. 2991–3003,Jun. 2012. [3] W.Zhang, B. Chen, and N. Yu, “Capacity- approaching codes for reversible data hiding,” in Proc 13th Information Hiding (IH’2011) LNCS 6958, 2011, pp. 255–269, SpringerVerlag. [4] T. Kalker and F.M.Willems, “Capacity bounds and code constructions for reversible data hiding,” in Proc. 14th Int. Conf. Digital Signal Processing (DSP2002), 2002, pp. 71–76. 
[5] X. L. Li, B. Yang, and T. Y. Zeng, “Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection, IEEE Trans. Image Process., vol. 20, no. 12, pp. 3524–3533, Dec. 2011. [6] L. Luo et al., “Reversible image watermarking using interpolation technique,” IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 187–193,Mar. 2010. [7] P. Tsai, Y. C. Hu, and H. L. Yeh, “Reversible image hiding scheme using predictive coding and histogram shifting,” Signal Process., vol.89, pp. 1129–1143, 2009. [8] D.M. Thodi and J. J. Rodriguez, “Expansion embedding techniques for reversible watermarking,” IEEE Trans. Image Process., vol. 16, no. 3, pp. 721–730, Mar. 2007. [9] Z. Ni, Y. Shi, N. Ansari, and S. Wei, “Reversible data hiding,” IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354–362, Mar.2006. [10] J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. Circuits Syst.Video Technol., vol. 13, no. 8, pp. 890–896 Aug. 2003. [11] J. Fridrich and M. Goljan, “Lossless data embedding for all image formats,” in Proc. SPIE Proc. Photonics West, Electronic Imaging, Securityand Watermarking of Multimedia Contents, San Jose, CA, USA, Jan. 2002, vol. 4675, pp. 5

More Related Content

What's hot

A0540106
A0540106A0540106
A0540106
IOSR Journals
 
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDING
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDINGMULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDING
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDING
ijistjournal
 
MULTIPLE RECONSTRUCTION COMPRESSION FRAMEWORK BASED ON PNG IMAGE
MULTIPLE RECONSTRUCTION COMPRESSION FRAMEWORK BASED ON PNG IMAGEMULTIPLE RECONSTRUCTION COMPRESSION FRAMEWORK BASED ON PNG IMAGE
MULTIPLE RECONSTRUCTION COMPRESSION FRAMEWORK BASED ON PNG IMAGE
ijcsity
 
Image compression and reconstruction using a new approach by artificial neura...
Image compression and reconstruction using a new approach by artificial neura...Image compression and reconstruction using a new approach by artificial neura...
Image compression and reconstruction using a new approach by artificial neura...
Hưng Đặng
 
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATION
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATIONUSING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATION
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATION
IJNSA Journal
 
Image Compression and Reconstruction Using Artificial Neural Network
Image Compression and Reconstruction Using Artificial Neural NetworkImage Compression and Reconstruction Using Artificial Neural Network
Image Compression and Reconstruction Using Artificial Neural Network
IRJET Journal
 
A Survey of Image Based Steganography
A Survey of Image Based SteganographyA Survey of Image Based Steganography
A Survey of Image Based Steganography
editor1knowledgecuddle
 
Reversible encrypted data concealment in images by reserving room approach
Reversible encrypted data concealment in images by reserving room approachReversible encrypted data concealment in images by reserving room approach
Reversible encrypted data concealment in images by reserving room approach
IAEME Publication
 
A010520107
A010520107A010520107
A010520107
IOSR Journals
 
A secured data transmission system by reversible data hiding with scalable co...
A secured data transmission system by reversible data hiding with scalable co...A secured data transmission system by reversible data hiding with scalable co...
A secured data transmission system by reversible data hiding with scalable co...
IAEME Publication
 
E017443136
E017443136E017443136
E017443136
IOSR Journals
 
High PSNR Based Image Steganography
High PSNR Based Image SteganographyHigh PSNR Based Image Steganography
High PSNR Based Image Steganography
rahulmonikasharma
 
Thesis on Image compression by Manish Myst
Thesis on Image compression by Manish MystThesis on Image compression by Manish Myst
Thesis on Image compression by Manish Myst
Manish Myst
 
06 17443 an neuro fuzzy...
06 17443 an neuro fuzzy...06 17443 an neuro fuzzy...
06 17443 an neuro fuzzy...
IAESIJEECS
 
E1102012537
E1102012537E1102012537
E1102012537
IOSR Journals
 
Reversible data hiding using histogram shifting method
Reversible data hiding using histogram shifting methodReversible data hiding using histogram shifting method
Reversible data hiding using histogram shifting method
Himanshu Bal
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
ijsrd.com
 

What's hot (17)

A0540106
A0540106A0540106
A0540106
 
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDING
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDINGMULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDING
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDING
 
MULTIPLE RECONSTRUCTION COMPRESSION FRAMEWORK BASED ON PNG IMAGE
MULTIPLE RECONSTRUCTION COMPRESSION FRAMEWORK BASED ON PNG IMAGEMULTIPLE RECONSTRUCTION COMPRESSION FRAMEWORK BASED ON PNG IMAGE
MULTIPLE RECONSTRUCTION COMPRESSION FRAMEWORK BASED ON PNG IMAGE
 
Image compression and reconstruction using a new approach by artificial neura...
Image compression and reconstruction using a new approach by artificial neura...Image compression and reconstruction using a new approach by artificial neura...
Image compression and reconstruction using a new approach by artificial neura...
 
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATION
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATIONUSING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATION
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATION
 
Image Compression and Reconstruction Using Artificial Neural Network
Image Compression and Reconstruction Using Artificial Neural NetworkImage Compression and Reconstruction Using Artificial Neural Network
Image Compression and Reconstruction Using Artificial Neural Network
 
A Survey of Image Based Steganography
A Survey of Image Based SteganographyA Survey of Image Based Steganography
A Survey of Image Based Steganography
 
Reversible encrypted data concealment in images by reserving room approach
Reversible encrypted data concealment in images by reserving room approachReversible encrypted data concealment in images by reserving room approach
Reversible encrypted data concealment in images by reserving room approach
 
A010520107
A010520107A010520107
A010520107
 
A secured data transmission system by reversible data hiding with scalable co...
A secured data transmission system by reversible data hiding with scalable co...A secured data transmission system by reversible data hiding with scalable co...
A secured data transmission system by reversible data hiding with scalable co...
 
E017443136
E017443136E017443136
E017443136
 
High PSNR Based Image Steganography
High PSNR Based Image SteganographyHigh PSNR Based Image Steganography
High PSNR Based Image Steganography
 
Thesis on Image compression by Manish Myst
Thesis on Image compression by Manish MystThesis on Image compression by Manish Myst
Thesis on Image compression by Manish Myst
 
06 17443 an neuro fuzzy...
06 17443 an neuro fuzzy...06 17443 an neuro fuzzy...
06 17443 an neuro fuzzy...
 
E1102012537
E1102012537E1102012537
E1102012537
 
Reversible data hiding using histogram shifting method
Reversible data hiding using histogram shifting methodReversible data hiding using histogram shifting method
Reversible data hiding using histogram shifting method
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
 

Viewers also liked

D046012124
D046012124D046012124
D046012124
IJERA Editor
 
Scalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
Scalable and Robust Hierarchical Group of Data in Wireless Sensor NetworksScalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
Scalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
IJERA Editor
 
Memristor Modeling Using PSPICE
Memristor Modeling Using PSPICEMemristor Modeling Using PSPICE
Memristor Modeling Using PSPICE
IJERA Editor
 
U50202126129
U50202126129U50202126129
U50202126129
IJERA Editor
 
Waste Metal For Improving Concrete Performance And Utilisation As An Alternat...
Waste Metal For Improving Concrete Performance And Utilisation As An Alternat...Waste Metal For Improving Concrete Performance And Utilisation As An Alternat...
Waste Metal For Improving Concrete Performance And Utilisation As An Alternat...
IJERA Editor
 
A Survey Ondecision Tree Learning Algorithms for Knowledge Discovery
A Survey Ondecision Tree Learning Algorithms for Knowledge DiscoveryA Survey Ondecision Tree Learning Algorithms for Knowledge Discovery
A Survey Ondecision Tree Learning Algorithms for Knowledge Discovery
IJERA Editor
 
Identification of Closest and Phantom Nodes in Mobile Ad Hoc Networks
Identification of Closest and Phantom Nodes in Mobile Ad Hoc NetworksIdentification of Closest and Phantom Nodes in Mobile Ad Hoc Networks
Identification of Closest and Phantom Nodes in Mobile Ad Hoc Networks
IJERA Editor
 
B42060609
B42060609B42060609
B42060609
IJERA Editor
 
Magnetohydrodynamic Rayleigh Problem with Hall Effect in a porous Plate
Magnetohydrodynamic Rayleigh Problem with Hall Effect in a porous PlateMagnetohydrodynamic Rayleigh Problem with Hall Effect in a porous Plate
Magnetohydrodynamic Rayleigh Problem with Hall Effect in a porous Plate
IJERA Editor
 
P044058595
P044058595P044058595
P044058595
IJERA Editor
 
Bp044411416
Bp044411416Bp044411416
Bp044411416
IJERA Editor
 
R4502106114
R4502106114R4502106114
R4502106114
IJERA Editor
 
A045040110
A045040110A045040110
A045040110
IJERA Editor
 
B046060611
B046060611B046060611
B046060611
IJERA Editor
 
Kernel Estimation of Videodeblurringalgorithm and Motion Compensation of Resi...
Kernel Estimation of Videodeblurringalgorithm and Motion Compensation of Resi...Kernel Estimation of Videodeblurringalgorithm and Motion Compensation of Resi...
Kernel Estimation of Videodeblurringalgorithm and Motion Compensation of Resi...
IJERA Editor
 
A typical Realization of the process with linear recovery of Aldosterone
A typical Realization of the process with linear recovery of AldosteroneA typical Realization of the process with linear recovery of Aldosterone
A typical Realization of the process with linear recovery of Aldosterone
IJERA Editor
 
A44090104
A44090104A44090104
A44090104
IJERA Editor
 
U04507118124
U04507118124U04507118124
U04507118124
IJERA Editor
 
Energy Storage Management in Grid Connected Solar Photovoltaic System
Energy Storage Management in Grid Connected Solar Photovoltaic SystemEnergy Storage Management in Grid Connected Solar Photovoltaic System
Energy Storage Management in Grid Connected Solar Photovoltaic System
IJERA Editor
 
Cw4201656660
Cw4201656660Cw4201656660
Cw4201656660
IJERA Editor
 

Viewers also liked (20)

D046012124
D046012124D046012124
D046012124
 
Scalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
Scalable and Robust Hierarchical Group of Data in Wireless Sensor NetworksScalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
Scalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
 
Memristor Modeling Using PSPICE
Memristor Modeling Using PSPICEMemristor Modeling Using PSPICE
Memristor Modeling Using PSPICE
 
U50202126129
U50202126129U50202126129
U50202126129
 
Waste Metal For Improving Concrete Performance And Utilisation As An Alternat...
Waste Metal For Improving Concrete Performance And Utilisation As An Alternat...Waste Metal For Improving Concrete Performance And Utilisation As An Alternat...
Waste Metal For Improving Concrete Performance And Utilisation As An Alternat...
 
A Survey Ondecision Tree Learning Algorithms for Knowledge Discovery
A Survey Ondecision Tree Learning Algorithms for Knowledge DiscoveryA Survey Ondecision Tree Learning Algorithms for Knowledge Discovery
A Survey Ondecision Tree Learning Algorithms for Knowledge Discovery
 
Identification of Closest and Phantom Nodes in Mobile Ad Hoc Networks
Identification of Closest and Phantom Nodes in Mobile Ad Hoc NetworksIdentification of Closest and Phantom Nodes in Mobile Ad Hoc Networks
Identification of Closest and Phantom Nodes in Mobile Ad Hoc Networks
 
B42060609
B42060609B42060609
B42060609
 
Magnetohydrodynamic Rayleigh Problem with Hall Effect in a porous Plate
Magnetohydrodynamic Rayleigh Problem with Hall Effect in a porous PlateMagnetohydrodynamic Rayleigh Problem with Hall Effect in a porous Plate
Magnetohydrodynamic Rayleigh Problem with Hall Effect in a porous Plate
 
P044058595
P044058595P044058595
P044058595
 
Bp044411416
Bp044411416Bp044411416
Bp044411416
 
R4502106114
R4502106114R4502106114
R4502106114
 
A045040110
A045040110A045040110
A045040110
 
B046060611
B046060611B046060611
B046060611
 
Kernel Estimation of Videodeblurringalgorithm and Motion Compensation of Resi...
Kernel Estimation of Videodeblurringalgorithm and Motion Compensation of Resi...Kernel Estimation of Videodeblurringalgorithm and Motion Compensation of Resi...
Kernel Estimation of Videodeblurringalgorithm and Motion Compensation of Resi...
 
A typical Realization of the process with linear recovery of Aldosterone
A typical Realization of the process with linear recovery of AldosteroneA typical Realization of the process with linear recovery of Aldosterone
A typical Realization of the process with linear recovery of Aldosterone
 
A44090104
A44090104A44090104
A44090104
 
U04507118124
U04507118124U04507118124
U04507118124
 
Energy Storage Management in Grid Connected Solar Photovoltaic System
Energy Storage Management in Grid Connected Solar Photovoltaic SystemEnergy Storage Management in Grid Connected Solar Photovoltaic System
Energy Storage Management in Grid Connected Solar Photovoltaic System
 
Cw4201656660
Cw4201656660Cw4201656660
Cw4201656660
 

Similar to Reversible Encrypytion and Information Concealment

Secured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
Secured Reversible Data Hiding In Encrypted Images Using Hyper ChaosSecured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
Secured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
CSCJournals
 
Reversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast EnhancementReversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast Enhancement
IRJET Journal
 
Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...
Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...
Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...
IRJET Journal
 
IRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data HidingIRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data Hiding
IRJET Journal
 
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDING
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDINGMULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDING
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDING
ijistjournal
 
K041068072
K041068072K041068072
K041068072
ijceronline
 
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET Journal
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
IJERA Editor
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
IJERA Editor
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
ijsrd.com
 
F1803063236
F1803063236F1803063236
F1803063236
IOSR Journals
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
IRJET Journal
 
Az2419511954
Az2419511954Az2419511954
Az2419511954
IJMER
 
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
CSCJournals
 
Reversible Data Hiding Using Contrast Enhancement Approach
Reversible Data Hiding Using Contrast Enhancement ApproachReversible Data Hiding Using Contrast Enhancement Approach
Reversible Data Hiding Using Contrast Enhancement Approach
CSCJournals
 
IMAGE SEGMENTATION AND ITS TECHNIQUES
IMAGE SEGMENTATION AND ITS TECHNIQUESIMAGE SEGMENTATION AND ITS TECHNIQUES
IMAGE SEGMENTATION AND ITS TECHNIQUES
IRJET Journal
 
Ijetcas14 527
Ijetcas14 527Ijetcas14 527
Ijetcas14 527
Iasir Journals
 
High capacity histogram shifting based reversible data hiding with data compr...
High capacity histogram shifting based reversible data hiding with data compr...High capacity histogram shifting based reversible data hiding with data compr...
High capacity histogram shifting based reversible data hiding with data compr...
IAEME Publication
 
Image Encryption Using Differential Evolution Approach in Frequency Domain
Image Encryption Using Differential Evolution Approach in Frequency DomainImage Encryption Using Differential Evolution Approach in Frequency Domain
Image Encryption Using Differential Evolution Approach in Frequency Domain
sipij
 
IRJET- Low Light Image Enhancement using Convolutional Neural Network
IRJET-  	  Low Light Image Enhancement using Convolutional Neural NetworkIRJET-  	  Low Light Image Enhancement using Convolutional Neural Network
IRJET- Low Light Image Enhancement using Convolutional Neural Network
IRJET Journal
 

Similar to Reversible Encrypytion and Information Concealment (20)

Secured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
Secured Reversible Data Hiding In Encrypted Images Using Hyper ChaosSecured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
Secured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
 
Reversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast EnhancementReversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast Enhancement
 
Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...
Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...
Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...
 
IRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data HidingIRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data Hiding
 
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDING
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDINGMULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDING
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDING
 
K041068072
K041068072K041068072
K041068072
 
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
 
F1803063236
F1803063236F1803063236
F1803063236
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
Az2419511954
Az2419511954Az2419511954
Az2419511954
 
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
 
Reversible Data Hiding Using Contrast Enhancement Approach
Reversible Data Hiding Using Contrast Enhancement ApproachReversible Data Hiding Using Contrast Enhancement Approach
Reversible Data Hiding Using Contrast Enhancement Approach
 
IMAGE SEGMENTATION AND ITS TECHNIQUES
IMAGE SEGMENTATION AND ITS TECHNIQUESIMAGE SEGMENTATION AND ITS TECHNIQUES
IMAGE SEGMENTATION AND ITS TECHNIQUES
 
Ijetcas14 527
Ijetcas14 527Ijetcas14 527
Ijetcas14 527
 
High capacity histogram shifting based reversible data hiding with data compr...
High capacity histogram shifting based reversible data hiding with data compr...High capacity histogram shifting based reversible data hiding with data compr...
High capacity histogram shifting based reversible data hiding with data compr...
 
Image Encryption Using Differential Evolution Approach in Frequency Domain
Image Encryption Using Differential Evolution Approach in Frequency DomainImage Encryption Using Differential Evolution Approach in Frequency Domain
Image Encryption Using Differential Evolution Approach in Frequency Domain
 
IRJET- Low Light Image Enhancement using Convolutional Neural Network
IRJET-  	  Low Light Image Enhancement using Convolutional Neural NetworkIRJET-  	  Low Light Image Enhancement using Convolutional Neural Network
IRJET- Low Light Image Enhancement using Convolutional Neural Network
 

Recently uploaded

CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
sachin chaurasia
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
Aditya Rajan Patra
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
HODECEDSIET
 

Recently uploaded (20)

CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
 

Reversible Encrypytion and Information Concealment

  • 1. Meenal V. Jagdale et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 7( Version 1), July 2014, pp.175-180 www.ijera.com 175 | P a g e Reversible Encrypytion and Information Concealment Meenal V. Jagdale1, Dr. Shubhalaxmi P. Hingway2, Sheeja S. Suresh3 1 P.G. student at Department of Electronics and Telecommunication G.H.Raisoni Institute of Engineering and Technology For Women . Nagpur –India 2Professor at Department of Electronics and Telecommunication G.H.Raisoni Institute of Engineering and Technology For Women . Nagpur –India 3Asst. Professor at Department of Electronics and Telecommunication G.H.Raisoni Institute of Engineering and Technology For Women . Nagpur –India ABSTRACT Recently, a lot of attention is paid to reversible data hiding (RDH) in encrypted pictures, since it maintains the wonderful property that the initial image cover will be losslessly recovered when embedded data is extracted, whereas protects the image content that is need to be kept confidential. Other techniques used antecedently are to embed data by reversibly vacating area from the pictures, that area unit been encryted, may cause some errors on information extraction or image restoration. In this paper, we propose a unique methodology by reserving room before secret writing (i.e reserving room before encryption) with a conventional RDH algorithmic rule, and thus it becomes straightforward for hider to reversibly embed data in the encrypted image. The projected methodology is able to implement real reversibility, that is, information extraction and image recovery area unit free of any error. This methodology embedds larger payloads for constant image quality than the antecedently used techniques, like for PSNR= 40db. Keywords- Reversible data hiding, privacy protection, bar chart shift, image secret writing. I. INTRODUCTION Data concealment may be a technique that conceals secret knowledge into a carrier to convey messages. Digital pictures are one of all the media that's appropriate to convey messages due to many reasons. Firstly, digital pictures are typically transmitted over the internet which might raise very little suspicion. Secondly, the high correlation between pixels provides room for knowledge embedding. Once a digital image is employed as a carrier, the image accustomed introduce knowledge is thought because the cover image, and also the image with knowledge embedded is named the stego image. Within the embedding method, the pixels of the duvet image are changed and so, distortion happens. In general, the more the duvet image is distorted, the more vulnerable is that the stego image to steganalytic attempts. To forestall the stego image from being suspicious and detected, either visually statistically, the distortions caused by embedding the information ought to be as minimum as attainable, that imply that a prime quality embedded image is demanded. For many of the prevailing knowledge concealment techniques, the distortions caused by knowledge embedding are permanent i.e. the stego image cannot be rehabilitated to its original state. However, for a few applications, like medical or military pictures, it's desired that the first cover image are often utterly recovered owing to the wants for legal concerns or high exactness nature. To satisfy these needs, the reversible knowledge concealment theme for top quality pictures is introduced i.e reversible data hiding. In 2003, Tian planned a reversible knowledge concealment technique using the distinction enlargement technique. In this technique, one bit is often embedded into 2 consecutive pixels; thus, the highest embedding capability is 0.5 bpp. Alattar generalized the distinction enlargement technique in order that n-1 bits are often embedded into n pixels, ensuring the highest embedding capability to be (n- 1)/n bpp. However, the distinction enlargement based mostly reversible knowledge concealment strategies have to be compelled to double the variations between pixels; thus, a bigger distortion happens and will not be appropriate for applications wherever prime quality pictures are demanded. In 2006, Ni et al. planned a completely unique histogram-shifting reversible knowledge concealment technique. In Ni et al.’s method, pixel values are changed one gray scale value at the most and so, a prime quality stego image are often achieved. However, the highest payload is restricted by the peak height of the image histogram; thus, the payload of this technique is comparatively low. Hwang et al.also planned a reversible knowledge concealment technique supported histogram-shifting and had higher embedding potency compared to Ni et al.’s work. In 2007, Thodi and Rodriguez planned a totally different technique by increasing the prediction errors.As the result of the prediction error is RESEARCH ARTICLE OPEN ACCESS
  • 2. Meenal V. Jagdale et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 7( Version 1), July 2014, pp.175-180 www.ijera.com 176 | P a g e sometimes smaller than the distinction between 2 consecutive pixel values, the stego image quality obtained by this technique is healthier than that of Tian’s technique. However, Thodi and Rodriguez’s technique is additionally supported by expansion- embedding technique, a bigger distortion could occur; thus, their technique isn't appropriate for applications requiring prime quality pictures. II. PLANNED TECHNIQUE Vacating space from the encrypted pictures losslessly is comparatively troublesome and conjointly typically inefficient. Thus, we use a method to reverse the order of encoding and vacating space, i.e. reserving room before encryption at content owner facet, the RDH tasks in encrypted pictures would be a lot natural and also easier that leads North American country to the framework, “reserving space before encoding (RRBE)”.As shown in Fig. 1(b), the content owner initially reserves enough space on original image and so converts the image into its encrypted version with the encoding key. The data embedding method in encrypted pictures is inherently reversible for the data hider, solely has to accommodate data into the spare space previously emptied out. The information extraction and image recovery is the image of the Framework VRAE where standard RDH algorithm is the ideal operator for reserving space before encryption and might be simply applied to Framework RRBE to offer higher performance as compared with techniques from Framework VRAE. This can be as a result of the new framework, where we follow the customary concept that initially losslessly compresses the redundant image content (e.g.by applying best RDH techniques) and encrypts it with reference to protect the privacy. Next, we have a tendency to elaborate a sensible technique supported the Framework “RRBE”, that primarily consists of 4 stages: generation of encrypted image, information concealment in encrypted image, information extraction and image recovery. (a) (b) (c) Fig 1. Block diagram: (a) Encryption and data embedding flow (b) Decryption (c) Complete architecture.
  • 3. Meenal V. Jagdale et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 7( Version 1), July 2014, pp.175-180 www.ijera.com 177 | P a g e [A] GENERATION OF ENCRYPTED IMAGE To construct the encrypted image 3 steps are followed: image partition, self-reversible embedding followed by image cryptography. (1) Image Partition: The operator here for reserving room before encryption may be a customary RDH technique, therefore the goal of image partition is to construct a smoother space B, on that customary RDH algorithms are able to aquier higher performance .Assume the initial image C is of eight bits gray-scale image with its size M x N and pixels Cij € [0,255], 1≤ i ≤ M, 1≤ j ≤ N. First, the content owner extracts from the initial image, on the rows, several overlapping blocks whose variety is decided by the size of the embedded message, denoted by l. In detail, every block consists of rows, wherever m = [l/N] and therefore the variety of blocks may be computed through n = M – m + 1. For each block, here a function is stated to measure its first-order smoothness ….(1) Higher f relates to blocks that contain comparatively additional complicated textures. The content owner, therefore, selects the actual block with the best f to be A, and puts it to the front of the image concatenated by the remainder half B with fewer rough-textured areas, as shown in Fig. 2.Here at the most 3 LSB-planes of A are used. Fig (a) Original image Fig (b) Final A Fig(c) Final B
  • 4. Meenal V. Jagdale et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 7( Version 1), July 2014, pp.175-180 www.ijera.com 178 | P a g e Fig 2. Illustration of Image patition and embedding process. (2) Self-Reversible Embedding: The motive of self-reversible embedding is to embed the LSB-planes of A into B by using ancient RDH algorithms. Pixels in image B are firstly classified into 2 sets as, white pixels with its indices i and j satisfying ( i +j)mod 2=0 and black pixels with indices ( i +j)mod 2= 1 as in Fig. 2. Then, every white pixel Bi,j is calculable by the interpolation price obtained with the four black pixels encompassing it as follows, ….. (2) Where the weight wi 1 ≤ i ≤ 4. Then the estimating error is calculated via eij = Bi,j – B’i,j alongside embedding some knowledge into the estimating error sequence with bar chart shift. After this we calculate the estimating errors of black pixels with the assistance of encompassing white pixels that are being changed. Then another estimating error sequence is made which will accommodate messages. Thus, we summarize that, to take advantage of all pixels of B, 2 estimating error sequences are created for embedding messages in each single-layer of embedding method. Using two-way bar chart shift, some messages are often embedded on every error sequence. In RDH algorithms, there happens the overflow and underflow once the natural boundary pixels modifies from 255 to 256 or from zero to -1. For its rejection, a boundary map is introduced to point whether or not boundary pixels in marked image natural or pseudo in extracting method. (3) Image Cryptography: When the rearranged self-embedded image that is denoted by X is generated, we encrypt X to construct the encrypted image denoted by E .Using stream cipher, the encoding version of X are often simply obtained. For an example, a grey value Xi,j starting from 0 to 255 are often shown by 8 bits, Xi,j(0), Xi,j(1), . . . , Xi,j(7), such that ….. (3) The encrypted bits Ei,j(k) can be calculated through exclusive-or operation ….. (4) Where ri,j(k) is generated via a regular stream cipher. Finally, embed 10 bits of data into LSB’s of 1st 10 pixels in encrypted version of A to point knowledge hider the full range of rows and therefore the bit-planes he will enter information into. [B] INFORMATION CONCEALMENT IN ENCRYPTED IMAGE Once the information hider acquires the encrypted image E, he can embed some information into it, though he doesn't get access to the original image. The embedding method initiates by locating the encrypted version of A, denoted by AE. Since AE has been rearranged to the highest of E, it's simple for data hider to read 10 bits information in LSB’s of 1st 10 encrypted pixels. After knowing the quantity of bit-planes and rows of pixels he can modify, the data hider merely adopts LSB replacement to substitute the offered bit-planes with extra data m Here, the data hider sets a label to signifies the top position of embedding method and then encrypts accordingly with the data concealment key to formulate marked encrypted image E'. [C] INFORMATION EXTRACTION AND IMAGE RECOVERY Extraction of information is totally freelance from image coding and therefore its order implies 2 completely different applications. (1) Case 1: Extracting information From Encrypted Images:
  • 5. Meenal V. Jagdale et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 7( Version 1), July 2014, pp.175-180 www.ijera.com 179 | P a g e In accordance to update and manage personal information of pictures that are encrypted for shielding clients’ privacy, an inferior information manager might solely get access to the data concealment key and have to be compelled to manipulate data in encrypted domain. The order of information extraction before image coding guarantees the feasibleness. The information manager will decode the LSB-planes of AE and extract the extra information m by directly reading the decrypted version once supplied with the information concealment key. (2) Case 2: Extracting information From Decrypted Images: In the previous case each embedding and extraction of the information are manipulated in encrypted domain, whereas there exists a special scenario wherever the user desires to decode the image 1st and extract the information from the decrypted image once it's required. (a) Generating the Marked Decrypted Image: To accumulate the marked decrypted image X” that is created of A" and B", the content owner ought to do following 2 steps: • Step 1: With the cryptography key, the content owner decrypts the image except the LSB-planes of AE. The decrypted version of E' containing the embedded information are often calculated by, ….. (5) And ….. (6) Where E’i,j(k) and X”i,j(k) area unit the binary bits of E’i.j and X”i,j obtained via (3) severally. • Step 2: Rearrange A” and B” to its original state, we can acquire the plain image containing embedded information because the marked decrypted image X” is clone of rearranged X except LSB-planes of A. At the meanwhile, it keeps sensory activity transparency compared with original image C. More specifically, the distortion is introduced via 2 separate ways: the embedding method by modifying the LSB-planes of A and self-reversible embedding method by embedding LSB-planes of A into B. (b) Information Extraction and Image Restoration: Nextly, the content owner will extract the information and recover original image after generating the marked decrypted image. The method is comparable to the normal RDH ways. The subsequent outlines the particular steps: • Step 1: Record and decode the LSB-planes of A” consistent with the information concealment key; extract the information till the top label is reached. • Step 2: Extract LN, RN, LM, RM, LP, RP, Rb, x and boundary map from the LSB of marginal space of B”. Then, scan B” to undertake the subsequent steps. • Step 3: If Rb is equal to zero, which implies no black pixels participate in embedding method, move to Step5. • Step 4: Calculate estimating errors e’i,j of the black pixels B”i,j . If B”i,j belongs to [1, 254], recover the estimating error and original pixel value in a very reverse order and extract embedded bits once e’i,j is equal to LN, LM (or LP), RM (or RP ) and RN. If b = 0, skip this, else operate like B”i,j € [1, 254] . Repeat this step till the part of payload Rb is extracted. • Step 5: Calculate estimating errors e’i,j of the white pixels B”i,j ,and extract embedded bits and recover white pixels within the same manner as with Step 4. • Step 6: Continue Step 2 to Step 5, (x – 1) rounds on B” and merge all extracted bits to create LSB-planes of A. Until now, we've utterly recovered B. • Step 7: Replace marked LSB-planes of A” with its original bits extracted from B” to urge original cover image C. OUTPUT OBTAINED: Fig 3.(a) Original image, (b) encrypted image, (c) decrypted image containing message, (d) recovery version.
  • 6. Meenal V. Jagdale et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 7( Version 1), July 2014, pp.175-180 www.ijera.com 180 | P a g e (e) Corresponding command window indicating the increased PSNR value to 39.48db. III .CONCLUSION Reversible information concealment in encrypted pictures is a new idea drawing attention owing to the privacy-preserving needs from cloud information management. In previous strategies RDH method was incorporated in encrypted pictures by vacating space once encrypting the image, while in opposition with it we implemented reserving room before encrypting the image. Hence, the information hider have an advantage of the additional area emptied in the previous stage and make the information concealment method relatively more easy and effortless. This technique profits over all the ancient RDH techniques for plain pictures and reach high performance with no loss of secrecy. Moreover, this novel technique gains separate information extraction, real reversibility and great improvement on the standard of marked decrypted pictures. REFERENCES [1] Kede Ma,Weiming Zhang,Xeianfeng Zhao,”Reversible data hiding in encrypted images by reserving room before encryption” IEEE Trans. On information forensic and security,VOL.8NO.3 March 2013. [2] W. Zhang, B. Chen, and N. Yu, “Improving various reversible data hiding schemes via optimal codes for binary covers,” IEEE Trans.Image Process., vol. 21, no. 6, pp. 2991–3003,Jun. 2012. [3] W.Zhang, B. Chen, and N. Yu, “Capacity- approaching codes for reversible data hiding,” in Proc 13th Information Hiding (IH’2011) LNCS 6958, 2011, pp. 255–269, SpringerVerlag. [4] T. Kalker and F.M.Willems, “Capacity bounds and code constructions for reversible data hiding,” in Proc. 14th Int. Conf. Digital Signal Processing (DSP2002), 2002, pp. 71–76. [5] X. L. Li, B. Yang, and T. Y. Zeng, “Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection, IEEE Trans. Image Process., vol. 20, no. 12, pp. 3524–3533, Dec. 2011. [6] L. Luo et al., “Reversible image watermarking using interpolation technique,” IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 187–193,Mar. 2010. [7] P. Tsai, Y. C. Hu, and H. L. Yeh, “Reversible image hiding scheme using predictive coding and histogram shifting,” Signal Process., vol.89, pp. 1129–1143, 2009. [8] D.M. Thodi and J. J. Rodriguez, “Expansion embedding techniques for reversible watermarking,” IEEE Trans. Image Process., vol. 16, no. 3, pp. 721–730, Mar. 2007. [9] Z. Ni, Y. Shi, N. Ansari, and S. Wei, “Reversible data hiding,” IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354–362, Mar.2006. [10] J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. Circuits Syst.Video Technol., vol. 13, no. 8, pp. 890–896 Aug. 2003. [11] J. Fridrich and M. Goljan, “Lossless data embedding for all image formats,” in Proc. SPIE Proc. Photonics West, Electronic Imaging, Securityand Watermarking of Multimedia Contents, San Jose, CA, USA, Jan. 2002, vol. 4675, pp. 5