separable reversible data hiding in encrypted image
SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGEOBJECTIVE: The objective of this project is to provide an efficient data hidingtechnique and image Encryption in which the data and the image can beretrieved independently.PROBLEM DIFINITION: The problem found in our existing system as, the secret key used forencryption of compressed image and the data hiding is same. So, the user whoknows the secret key used for encryption can access the data embedded and theoriginal data. The original Image can be retrieved from the encrypted imageafter extracting or removing the data hidden in the image. The content ownerand the data hider share the same encryption key for the encryption of the Imageand data hiding.ABSTRACT: The use of computer networks for data transmissions has createdthe need of security. Many robust message encryption techniques have beendeveloped to supply this demand. The amount of digital images has increasedrapidly on the Internet. Image security becomes increasingly important formany applications, e.g., confidential transmission, video surveillance, militaryand medical applications. Nowadays, the transmission of images is a daily
routine and it is necessary to find an efficient way to transmit them overnetworks. To decrease the transmission time, the data compression is necessary. Theprotection of this multimedia data can be done with encryption or data hidingalgorithms. Since few years, a problem is to try to combine compression,encryption and data hiding in a single step. For example, some solutions wasproposed in3 to combine image encryption and compression. Two main groupsof technologies have been developed for this purpose. The first one is based on content protection through encryption. There areseveral methods to encrypt binary images or gray level images. In this groupproper decryption of data requires a key. The second group bases the protectionon digital watermarking or data hiding, aimed at secretly embedding a messageinto the data. Encryption and watermarking algorithms rely on the Kirchhoff’sprinciple: all the details of the algorithm are known, and only the key to encryptand decrypt the data should be secret.EXISTING SYSTEM: In the existing system reversible data hiding technique theimage is compressed and encrypted by using the encryption key and the data tohide is embedded in to the image by using the same encryption key. The userwho knows the secret encryption key used can access the image and decrypt itafter extracting or removing the data hidden in the image. After extracting thedata hidden in the image then only can be the original image is retrieved.
DISADVANTAGES: The secret key used for encryption of compressed image and the data hiding is same. So, the user who knows the secret key used for encryption can access the data embedded and the original data. The original Image can be retrieved from the encrypted image after extracting or removing the data hidden in the image. The content owner and the data hider share the same encryption key for the encryption of the Image and data hiding.PROPOSED SYSTEM: In proposed method the image is encrypted by contentowner by using the encryption key. The data hider can hide the data in theencrypted image compressing the least significant bits of the encrypted image toobtain the space to hide the data by using data hiding key. At the receiver sidethe data can be retrieved using the data hiding key by decrypting the image. But,the encrypted image unchanged still it is decrypted using the encryption key.The receiver who has the both the encryption and data hiding keys can accessthe data embedded as well as the original image.ADVANTAGES: The data hiding and image encryption are done by using two different keys. That is encryption key and the data hiding key. The receiver who has the data hiding key can retrieve the data embedded.
The receiver who has the encryption key can retrieve the original image without removing or extracting the data embedded in the encrypted image. The receiver who has the both the keys can retrieve the data hidden and the original image from the encrypted image.ALGORITHM USED: 1. LSB (Least Significant Bit) 2. DES (Data Encryption Standard)ARCHITECTURE DIAGRAM:
SYSTEM REQUIREMENTS: Hardware Requirements: Intel Pentium IV 256/512 MB RAM 1 GB Free disk space or greater 1 GB on Boot Drive 1 Network Interface Card (NIC) GSM Software Requirements: MS Windows XP/2000 MS IE Browser 6.0/later MS .Net Framework 2.0 MS Visual Studio.Net 2005 Internet Information Server (IIS) MS SQL Server 2000 Windows Installer 3.1APPLICATIONS: 1. Deductive Agencies 2. Consultancies 3. Bank Information Sharing’s