SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 3, Ver. VI (May-Jun. 2016), PP 32-36
www.iosrjournals.org
DOI: 10.9790/0661-1803063236 www.iosrjournals.org 32 | Page
Hiding the Data into Meaningful Encrypted Image Using
Reversible Data Hiding Technique
G.Malathi1
, Dr.S.Raju2
1-
Student, 2-
Professor Department Of Computer Science And Engineering Sri Venkateswara College of
Engineering Pennalur -602117
Abstract: Data hacking is one of the challenging problems in Internet world. It is possible to greatly improve
our understanding and also should provide security to network data. The most existing encryption algorithms
designed to protect image contents transform original image into a texture-like or noise-like image which
results in a significantly large number of attacks. A New Image Encryption System (NIES) concept is introduced
to transform an original image into a visually meaningful encrypted one and to hide the data in image by using
Reversible Data Hiding (RDH) technique. The proposed methods have potential applications for privacy and
copyright protection in networks and cloud computing. In which gives effective protection to the secret data and
also low computation cost.
Keywords: New Image Encryption System, Reversible Data Hiding.
I. Introduction
Enormous amount of data emerges because of the modern social media. The data may be structured,
semi structured and unstructured. The relational database has a predefined data model in which the structured
data fitted into it. Mainly the structured data is based on the operational data (i.e., numeric, character, floating
point, etc.) Semi structured data is a combination of structured and unstructured data. Semi structured data
contain tags that separate the semantic elements and will not fit into formal data model. Unstructured data do not
fit into relational data base and predefined data model. Unstructured data are text, audio, image, video and
internet data. In this paper, unstructured data is used. These unstructured data occupies more storage like
megabyte, gigabyte, terabytes, etc. There will be a problem to store these kinds of data.
In the computer society, cloud plays major role in past ten years. Cloud computing provides large
amount of online spaces for storage in order to overcome the limitations of storage. The multimedia data has
private, classified and value information, to protect this information from leakage, becomes major issues for
individuals and organizations. Image Processing is a technique used to enhance raw images from various
applications. To enhance images from spacecraft, space probes and military flights, many techniques are
developed. Image Encryption is a tool used to protect multimedia data. Image Encryption algorithm has many
technologies to protect images by changing the locations or their pixel values [3, 4]. These technologies contain
two domain, frequency domain and spatial domain. Frequency image encryption can change the image data in
frequency domain using coefficients like, discrete fractional Fourier transform, Quantum Fourier transform and
Reciprocal-orthogonal parametric transform. Spatial image encryption algorithm contains two methods,
Permutation and substitution [5, 6]. Permutation method will change the location of the pixel position, where the
Substitution method will change the pixel values.
Both permutation and substitution method provides high level security to image content by encrypting
the images into texture- like or noise -like encrypted images, such as Fig 1(a) and (b). However these kinds of
images will indicates that they are encrypted and secret or valued information are encrypted in it [9]. In order to
protect that, an original image is transformed into a meaningful encrypted image, by seeing it cannot be
identified that they are encrypted Fig 1 (c). Nowadays data hacking is a major issue, in order to protect text data.
For security reasons the text data can also be encrypted in that meaningful image. The text data can be encrypted
using the reversible data hiding technique (RDH), which provides a lossless data retrieval.
Figure 1-(a) Texture image (b) Noise image (c) Meaningful image
Hiding the Data into Meaningful Encrypted Image Using Reversible Data Hiding Technique
DOI: 10.9790/0661-1803063236 www.iosrjournals.org 33 | Page
There are ways to implement this technique by using vacating room after encryption and reserving
room before encryption [8]. Here first empty out room by embedding LSBs of some pixels into other pixels with
a traditional RDH method and then encrypt the image, so the positions of these LSBs in the encrypted image can
be used to embed data. Real reversibility is realized, that is, data extraction and image recovery are free of any
error.
II. Related Works
‘Reversibility improved lossless data hiding’, was proposed by X.Gao, L.An, X.Li, D.Tao, (2009),
recently, lossless data hiding has attracted increasing interests. As a reversible watermark scheme, the host
media and hidden data should be recovered without distortion. A latest lossless data hiding technique based on
image blocking and block classification has achieved good performance for image authentication. However, this
method cannot always fully restore all the blocks of host images and watermarks. For this purpose, we propose
an improved algorithm, which is characterized by two aspects [7].
First, a block skipping scheme (BSS) is developed for the host blocks selection to embed watermark;
secondly, the embedding level is modified by a novel parameter model to guarantee that the host blocks can be
recovered without distortion as well as the embedded data. Extensive experiments conducted on standard
grayscale images, medical images, and color images have demonstrated the effectiveness of the improved
lossless data hiding scheme. Consequently, in the proposed system not only recovers the host image and
watermark without distortion, but also has the same merits as the previous one, i.e. (1) no salt-and-pepper noise,
(2) capacity adjustment.
This framework, a content owner encrypts the original image using a standard cipher with an
encryption key. After producing the encrypted image, the content owner hands over it to a data hider (e.g., a
database manager) and the data hider can embed some auxiliary data into the encrypted image by lossless
vacating some room according to a data hiding key. Then a receiver, maybe the content owner himself or an
authorized third party can extract the embedded data with the data hiding key and further recover the original
image from the encrypted version according to the encryption key.
Cryptography is a means of storing and transmitting data in a form that only targeted people can read or
process. It is an effective way of protecting sensitive data stored on media or transmitted over unsecured
network communication paths. On the receiving end, the encrypted information is then processed and decrypted
by humans or machines to reveal the original message [1]. The goal of cryptography is to hide information from
unauthorized individuals. The changes that cryptography has undergone closely follow advances in technology
[2]. Image cryptography has many applications in various areas. Researchers may employ the traditional text
cryptosystems to encrypt images directly; however, since image sizes are far greater than text, and differ in
nature from normal text, traditional text encryption methods are not applicable to images. Image encryption
methods can be classified into either lossy or lossless. In lossy encryption methods, were the image details are
somewhat distorted, the resulting decrypted image is different from the original image. Due to the characteristics
of human perception, and depending on the application, a decrypted image with little distortion is usually
acceptable. However, lossless encryption methods are more applicable in applications where the distorted-free
original image is required, such as in: medical images, aerospace images, satellite images, and in applications
that involve highly classified images.
Iii. Proposed Work
In the existing system, New Image Encryption System (NIES) enhances the security with low
computation cost using Discrete Wavelet transform (DWT) which transform original image into visually
meaningful image and the reference image is larger than the original image. Original image is encrypted by any
encryption algorithm. That encrypted image is stated as pre encrypted image. Then pre encrypted image is
transformed by DWTCT algorithm, that is approximation, horizontal, diagonal, vertical. By adding a module
that hides the text data into the encrypted image enhances the existing algorithm. The Reversible Data Hiding
(RDH) technique is suitable to hide confidential data with high security.
Reversible data hiding technique which gives lossless data while decrypting the encrypted image. RDH
also recover the image without any loss while encryption and decryption of image. It will reduce the
computation cost and increase the protection over the contents.
Hiding the Data into Meaningful Encrypted Image Using Reversible Data Hiding Technique
DOI: 10.9790/0661-1803063236 www.iosrjournals.org 34 | Page
Figure 2 – Block Diagram of Proposed System
A. Pre Encryption Method:
In pre encryption method, the original image is processed to noise like or texture like image by using
permutation and substitution methods. Where permutation method change the location of the pixel positions and
substitution method will change the pixel value. Here Advanced Encryption Standards (AES) is used for
encrypting the original image into pre encrypted image [12].
Figure 3 – Pre Encrypted Process
The pre encrypted image will be noise-like or texture-like image. Figure 3.1 shows the pre encrypted image.
Figure 3.1 – Pre encrypted image
B. Image Transformation:
In image transformation module, the pre encrypted image is transformed to vertical and diagonal part
by using DWTCT and reference image is transformed into four sub bands and in vertical and diagonal part the
original image value will be encrypted [10]. So pre encrypted image is transformed into visually meaningful
encrypted image.
Figure 4 – Image Transformation process
Algorithm for dividing the pre encrypted image into vertical and diagonal. For example this pre encrypted image
pixel value is 234, then 234/10 is equal to 23 and 234 mod 10 is equal to 4.
Input: Pre encrypted image X with a size of m×n, reference image R with a size of 2m×2n, and parameter Pt,
Hiding the Data into Meaningful Encrypted Image Using Reversible Data Hiding Technique
DOI: 10.9790/0661-1803063236 www.iosrjournals.org 35 | Page
1: Apply DWT defined by parameter Pt to the reference image Y; obtain CA, CH, CV and CD
2: for M=1tom do
3: for N=1tondo
4: CV (M, N) = X (M, N)/10
5: CD (M, N) = X (M, N) mod 10
6: end for
7: end for
8: Apply the inverse DWT to CA, CH, CV and CD sub bands
Output: The final encrypted image E with a size of 2m×2n.
Here CA is approximation, CH is horizontal, CV is vertical and CD is diagonal. Then the Pre encrypted
image is splitted into two bands, that is, vertical and diagonal. Whereas the reference image will be transformed
into four sub bands (Figure 4.1) .Where the first image is approximation , second image is horizontal , third
image is vertical and four image is diagonal. So in this vertical and diagonal part the pre encrypted image values
will be encoded. Then the original image is completely transformed into meaningful reference image.
Figure 4.1 – DWT image
C. Data Hiding:
In this method, hiding the data into encrypted image by using Reversible Data Hiding technique. The
encrypted image is divided into two parts and in one part the secret text data will be added and encrypted into
the encrypted image.
Figure 5 – Data Hiding Process
D. Decryption:
In this method, the encrypted image is decrypted by using inverse Discrete Wavelet Transform (DWT).
The secret text data and original image is retrieved without any loss and error free data.
In image decryption, the encrypted image is firstly decomposed into four sub bands by the wavelet
filters defined by Pt. There construction of the pre- encrypted image can be defined by,
X (M,N)=10C’V(M,N)+C’D(M,N)
Where C’V and C’D are sub bands corresponding to CV and CD of the encrypted image. X (M,N) is the
reconstructed pre-encrypted image. So there will be no data loss during decryption process.
Figure 6 – Decryption Process
III. Result Analysis
For image encryption the original image and reference image has different histogram graph shown in
(Figure 7.1). While decrypting the encrypted image, the same histogram graph value is received (Figure 7.2). So
there will be no data loss and error in the proposed system.
Hiding the Data into Meaningful Encrypted Image Using Reversible Data Hiding Technique
DOI: 10.9790/0661-1803063236 www.iosrjournals.org 36 | Page
(a) (b) (c)
Figure 7.1 – Encryption of two images (a) 1st
image histogram (b) 2nd
image histogram (c) Encrypted image
histogram
(a) (b)
Figure 7.2 – Histogram of Decryption of encrypted image (a) decrypted 1st
image (b) decrypted 2nd
image
IV. Conclusion
The proposed concept is able to protect the original image with a much higher security level compared
with most existing encryption algorithms. A new concept of image encryption is to encrypt meaningful
encrypted images that usually are considered as normal images rather than encrypted ones. The proposed
concept ensures the attackers’ difficulty of correctly distinguishing and locating the encrypted images from all
normal images.
An image encryption system utilizes a pre-encryption process to protect the original image contents,
and an effective DWT based content transform to generate visually meaningful encrypted images with many
different visual appearances and the proposed encryption concept and system show excellent encryption
performance and enhance the security of existing image encryption algorithms with a low computation cost. The
proposed methods have potential for security, lossless data and error free. It provides a low computation cost.
Reference
[1]. Y. Chen, Comment on ‘‘Cheating prevention in visual cryptography’’, IEEE Trans. Image Process. 21 (7) (2012) 3319–3323.
[2]. X. Zhang, Scalable coding of encrypted images, IEEE Trans. Image Process. 21 (6) (2012) 3108–3114.
[3]. M. Zanin, A. N. Pisarchik, Gray code permutation algorithm for high-dimensional data encryption, Information Sciences 270 (0)
(2014) 288–297.
[4]. Y. Q. Zhang, X. Y. Wang, A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice,
Information Sciences 273 (0) (2014) 329–351.
[5]. S. Tedmori, N. Al Najdawi, Image cryptographic algorithm based on the haar wavelet transform, Information Sciences 269 (0)
(2014) 21–34.
[6]. Y. Zhou, L. Bao, C. L. Philip Chen, A new 1D chaotic system for image encryption, Signal Processing 97 (2014) 172–182.
[7]. X. Gao, L. An, X. Li, D. Tao, Reversibility improved lossless data hiding, Signal Process. 89 (10) (2009) 2053–2065.
[8]. K. Ma, W. Zhang, X. Zhao, N. Yu, F. Li, Reversible data hiding in encrypted images by reserving room before encryption, IEEE
Trans. Inf. Forensics Secure. 8 (3) (2013) 553–562.
[9]. Long Bao, Yicong Zhou, Image encryption: Generating visually meaningful encrypted images, Information Sciences 324 (2015)
197–207.
[10]. A. R. Calder bank, I. Daubechies, W. Sweldens, B. L. Yeo, Wavelet transforms that map integers to integers, Appl. Comput.
Harmonic Analysis. 5 (3) (1998) 332–369.
[11]. X. Liao, S. Lai, Q. Zhou, A novel image encryption algorithm based on self-adaptive wave transmission, Signal Process. 90 (2010)
2714–2722.
[12]. L. Bao, Y. Zhou, C. L. P. Chen, H. Liu, A new chaotic system for image encryption, in: Proceedings of the 2012 International
Conference on System Science and Engineering (ICSSE), 2012, pp. 69–73.

Weitere ähnliche Inhalte

Was ist angesagt?

Lossless and reversible data hiding in encrypted images with public key crypt...
Lossless and reversible data hiding in encrypted images with public key crypt...Lossless and reversible data hiding in encrypted images with public key crypt...
Lossless and reversible data hiding in encrypted images with public key crypt...LeMeniz Infotech
 
separable reversible data hiding in encrypted image
separable reversible data hiding in encrypted imageseparable reversible data hiding in encrypted image
separable reversible data hiding in encrypted imageZTech Proje
 
Lossless and reversible data hiding in encrypted images with public key crypt...
Lossless and reversible data hiding in encrypted images with public key crypt...Lossless and reversible data hiding in encrypted images with public key crypt...
Lossless and reversible data hiding in encrypted images with public key crypt...LogicMindtech Nologies
 
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...IOSR Journals
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Dr. Amarjeet Singh
 
Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...CSCJournals
 
Secured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
Secured Reversible Data Hiding In Encrypted Images Using Hyper ChaosSecured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
Secured Reversible Data Hiding In Encrypted Images Using Hyper ChaosCSCJournals
 
DIP Using Image Encryption and XOR Operation Affine Transform
DIP Using Image Encryption and XOR Operation Affine TransformDIP Using Image Encryption and XOR Operation Affine Transform
DIP Using Image Encryption and XOR Operation Affine Transformiosrjce
 
Using SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageUsing SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageCSCJournals
 
(Sample) image encryption
(Sample) image encryption(Sample) image encryption
(Sample) image encryptionAnsabArshad
 
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...ijceronline
 
A comparative case study on the various techniques of reversible data hiding
A comparative case study on the various techniques of reversible data hidingA comparative case study on the various techniques of reversible data hiding
A comparative case study on the various techniques of reversible data hidingIJLT EMAS
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMSECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMJournal For Research
 
Iaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure imageIaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure imageIaetsd Iaetsd
 
DCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video SequenceDCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video SequenceIJERA Editor
 
LSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security SystemLSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security Systemijtsrd
 
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...CSCJournals
 

Was ist angesagt? (20)

Lossless and reversible data hiding in encrypted images with public key crypt...
Lossless and reversible data hiding in encrypted images with public key crypt...Lossless and reversible data hiding in encrypted images with public key crypt...
Lossless and reversible data hiding in encrypted images with public key crypt...
 
separable reversible data hiding in encrypted image
separable reversible data hiding in encrypted imageseparable reversible data hiding in encrypted image
separable reversible data hiding in encrypted image
 
Lossless and reversible data hiding in encrypted images with public key crypt...
Lossless and reversible data hiding in encrypted images with public key crypt...Lossless and reversible data hiding in encrypted images with public key crypt...
Lossless and reversible data hiding in encrypted images with public key crypt...
 
A010520107
A010520107A010520107
A010520107
 
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
 
Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...
 
Secured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
Secured Reversible Data Hiding In Encrypted Images Using Hyper ChaosSecured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
Secured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
 
DIP Using Image Encryption and XOR Operation Affine Transform
DIP Using Image Encryption and XOR Operation Affine TransformDIP Using Image Encryption and XOR Operation Affine Transform
DIP Using Image Encryption and XOR Operation Affine Transform
 
Sub1584
Sub1584Sub1584
Sub1584
 
Using SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageUsing SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG Image
 
(Sample) image encryption
(Sample) image encryption(Sample) image encryption
(Sample) image encryption
 
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...
 
A comparative case study on the various techniques of reversible data hiding
A comparative case study on the various techniques of reversible data hidingA comparative case study on the various techniques of reversible data hiding
A comparative case study on the various techniques of reversible data hiding
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMSECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
 
Iaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure imageIaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure image
 
DCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video SequenceDCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video Sequence
 
LSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security SystemLSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security System
 
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
 

Andere mochten auch

Path-Loss Determination of 91.5 MHZ FM Radio Channel of Ekiti State
Path-Loss Determination of 91.5 MHZ FM Radio Channel of Ekiti StatePath-Loss Determination of 91.5 MHZ FM Radio Channel of Ekiti State
Path-Loss Determination of 91.5 MHZ FM Radio Channel of Ekiti StateIOSR Journals
 
Congestion Control: A Dynamic Approach
Congestion Control: A Dynamic ApproachCongestion Control: A Dynamic Approach
Congestion Control: A Dynamic ApproachIOSR Journals
 
Detection of Replica Nodes in Wireless Sensor Network: A Survey
Detection of Replica Nodes in Wireless Sensor Network: A SurveyDetection of Replica Nodes in Wireless Sensor Network: A Survey
Detection of Replica Nodes in Wireless Sensor Network: A SurveyIOSR Journals
 
Synthesis Characterization And Antimicrobial Activity Of 6- Oxido-1- ((5 -5- ...
Synthesis Characterization And Antimicrobial Activity Of 6- Oxido-1- ((5 -5- ...Synthesis Characterization And Antimicrobial Activity Of 6- Oxido-1- ((5 -5- ...
Synthesis Characterization And Antimicrobial Activity Of 6- Oxido-1- ((5 -5- ...IOSR Journals
 

Andere mochten auch (20)

D1103012736
D1103012736D1103012736
D1103012736
 
B010131115
B010131115B010131115
B010131115
 
C010631015
C010631015C010631015
C010631015
 
L010416873
L010416873L010416873
L010416873
 
F010133036
F010133036F010133036
F010133036
 
B012620814
B012620814B012620814
B012620814
 
O1304039196
O1304039196O1304039196
O1304039196
 
H010634043
H010634043H010634043
H010634043
 
Path-Loss Determination of 91.5 MHZ FM Radio Channel of Ekiti State
Path-Loss Determination of 91.5 MHZ FM Radio Channel of Ekiti StatePath-Loss Determination of 91.5 MHZ FM Radio Channel of Ekiti State
Path-Loss Determination of 91.5 MHZ FM Radio Channel of Ekiti State
 
Congestion Control: A Dynamic Approach
Congestion Control: A Dynamic ApproachCongestion Control: A Dynamic Approach
Congestion Control: A Dynamic Approach
 
G012454144
G012454144G012454144
G012454144
 
H010424954
H010424954H010424954
H010424954
 
P01821104110
P01821104110P01821104110
P01821104110
 
C010321630
C010321630C010321630
C010321630
 
M01267378
M01267378M01267378
M01267378
 
D017252327
D017252327D017252327
D017252327
 
Detection of Replica Nodes in Wireless Sensor Network: A Survey
Detection of Replica Nodes in Wireless Sensor Network: A SurveyDetection of Replica Nodes in Wireless Sensor Network: A Survey
Detection of Replica Nodes in Wireless Sensor Network: A Survey
 
Synthesis Characterization And Antimicrobial Activity Of 6- Oxido-1- ((5 -5- ...
Synthesis Characterization And Antimicrobial Activity Of 6- Oxido-1- ((5 -5- ...Synthesis Characterization And Antimicrobial Activity Of 6- Oxido-1- ((5 -5- ...
Synthesis Characterization And Antimicrobial Activity Of 6- Oxido-1- ((5 -5- ...
 
M017218088
M017218088M017218088
M017218088
 
L017158389
L017158389L017158389
L017158389
 

Ähnlich wie F1803063236

Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...IRJET Journal
 
Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...
Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...
Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...IRJET Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Scalable Image Encryption Based Lossless Image Compression
Scalable Image Encryption Based Lossless Image CompressionScalable Image Encryption Based Lossless Image Compression
Scalable Image Encryption Based Lossless Image CompressionIJERA Editor
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYIRJET Journal
 
A secured data transmission system by reversible data hiding with scalable co...
A secured data transmission system by reversible data hiding with scalable co...A secured data transmission system by reversible data hiding with scalable co...
A secured data transmission system by reversible data hiding with scalable co...IAEME Publication
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...IRJET Journal
 
A Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted ImagesA Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted Imagesijsrd.com
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...IRJET Journal
 
Image Encryption Using Differential Evolution Approach in Frequency Domain
Image Encryption Using Differential Evolution Approach in Frequency DomainImage Encryption Using Differential Evolution Approach in Frequency Domain
Image Encryption Using Differential Evolution Approach in Frequency Domainsipij
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUEijcisjournal
 
IRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data HidingIRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data HidingIRJET Journal
 

Ähnlich wie F1803063236 (20)

REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE ENCRYPTIO...
REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE ENCRYPTIO...REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE ENCRYPTIO...
REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE ENCRYPTIO...
 
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
 
Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...
Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...
Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
K041068072
K041068072K041068072
K041068072
 
Scalable Image Encryption Based Lossless Image Compression
Scalable Image Encryption Based Lossless Image CompressionScalable Image Encryption Based Lossless Image Compression
Scalable Image Encryption Based Lossless Image Compression
 
B017250715
B017250715B017250715
B017250715
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
 
A secured data transmission system by reversible data hiding with scalable co...
A secured data transmission system by reversible data hiding with scalable co...A secured data transmission system by reversible data hiding with scalable co...
A secured data transmission system by reversible data hiding with scalable co...
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
 
A Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted ImagesA Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted Images
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
It3116411644
It3116411644It3116411644
It3116411644
 
Image Encryption Using Differential Evolution Approach in Frequency Domain
Image Encryption Using Differential Evolution Approach in Frequency DomainImage Encryption Using Differential Evolution Approach in Frequency Domain
Image Encryption Using Differential Evolution Approach in Frequency Domain
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
 
19_2
19_219_2
19_2
 
IRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data HidingIRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data Hiding
 

Mehr von IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Kürzlich hochgeladen

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 

F1803063236

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 3, Ver. VI (May-Jun. 2016), PP 32-36 www.iosrjournals.org DOI: 10.9790/0661-1803063236 www.iosrjournals.org 32 | Page Hiding the Data into Meaningful Encrypted Image Using Reversible Data Hiding Technique G.Malathi1 , Dr.S.Raju2 1- Student, 2- Professor Department Of Computer Science And Engineering Sri Venkateswara College of Engineering Pennalur -602117 Abstract: Data hacking is one of the challenging problems in Internet world. It is possible to greatly improve our understanding and also should provide security to network data. The most existing encryption algorithms designed to protect image contents transform original image into a texture-like or noise-like image which results in a significantly large number of attacks. A New Image Encryption System (NIES) concept is introduced to transform an original image into a visually meaningful encrypted one and to hide the data in image by using Reversible Data Hiding (RDH) technique. The proposed methods have potential applications for privacy and copyright protection in networks and cloud computing. In which gives effective protection to the secret data and also low computation cost. Keywords: New Image Encryption System, Reversible Data Hiding. I. Introduction Enormous amount of data emerges because of the modern social media. The data may be structured, semi structured and unstructured. The relational database has a predefined data model in which the structured data fitted into it. Mainly the structured data is based on the operational data (i.e., numeric, character, floating point, etc.) Semi structured data is a combination of structured and unstructured data. Semi structured data contain tags that separate the semantic elements and will not fit into formal data model. Unstructured data do not fit into relational data base and predefined data model. Unstructured data are text, audio, image, video and internet data. In this paper, unstructured data is used. These unstructured data occupies more storage like megabyte, gigabyte, terabytes, etc. There will be a problem to store these kinds of data. In the computer society, cloud plays major role in past ten years. Cloud computing provides large amount of online spaces for storage in order to overcome the limitations of storage. The multimedia data has private, classified and value information, to protect this information from leakage, becomes major issues for individuals and organizations. Image Processing is a technique used to enhance raw images from various applications. To enhance images from spacecraft, space probes and military flights, many techniques are developed. Image Encryption is a tool used to protect multimedia data. Image Encryption algorithm has many technologies to protect images by changing the locations or their pixel values [3, 4]. These technologies contain two domain, frequency domain and spatial domain. Frequency image encryption can change the image data in frequency domain using coefficients like, discrete fractional Fourier transform, Quantum Fourier transform and Reciprocal-orthogonal parametric transform. Spatial image encryption algorithm contains two methods, Permutation and substitution [5, 6]. Permutation method will change the location of the pixel position, where the Substitution method will change the pixel values. Both permutation and substitution method provides high level security to image content by encrypting the images into texture- like or noise -like encrypted images, such as Fig 1(a) and (b). However these kinds of images will indicates that they are encrypted and secret or valued information are encrypted in it [9]. In order to protect that, an original image is transformed into a meaningful encrypted image, by seeing it cannot be identified that they are encrypted Fig 1 (c). Nowadays data hacking is a major issue, in order to protect text data. For security reasons the text data can also be encrypted in that meaningful image. The text data can be encrypted using the reversible data hiding technique (RDH), which provides a lossless data retrieval. Figure 1-(a) Texture image (b) Noise image (c) Meaningful image
  • 2. Hiding the Data into Meaningful Encrypted Image Using Reversible Data Hiding Technique DOI: 10.9790/0661-1803063236 www.iosrjournals.org 33 | Page There are ways to implement this technique by using vacating room after encryption and reserving room before encryption [8]. Here first empty out room by embedding LSBs of some pixels into other pixels with a traditional RDH method and then encrypt the image, so the positions of these LSBs in the encrypted image can be used to embed data. Real reversibility is realized, that is, data extraction and image recovery are free of any error. II. Related Works ‘Reversibility improved lossless data hiding’, was proposed by X.Gao, L.An, X.Li, D.Tao, (2009), recently, lossless data hiding has attracted increasing interests. As a reversible watermark scheme, the host media and hidden data should be recovered without distortion. A latest lossless data hiding technique based on image blocking and block classification has achieved good performance for image authentication. However, this method cannot always fully restore all the blocks of host images and watermarks. For this purpose, we propose an improved algorithm, which is characterized by two aspects [7]. First, a block skipping scheme (BSS) is developed for the host blocks selection to embed watermark; secondly, the embedding level is modified by a novel parameter model to guarantee that the host blocks can be recovered without distortion as well as the embedded data. Extensive experiments conducted on standard grayscale images, medical images, and color images have demonstrated the effectiveness of the improved lossless data hiding scheme. Consequently, in the proposed system not only recovers the host image and watermark without distortion, but also has the same merits as the previous one, i.e. (1) no salt-and-pepper noise, (2) capacity adjustment. This framework, a content owner encrypts the original image using a standard cipher with an encryption key. After producing the encrypted image, the content owner hands over it to a data hider (e.g., a database manager) and the data hider can embed some auxiliary data into the encrypted image by lossless vacating some room according to a data hiding key. Then a receiver, maybe the content owner himself or an authorized third party can extract the embedded data with the data hiding key and further recover the original image from the encrypted version according to the encryption key. Cryptography is a means of storing and transmitting data in a form that only targeted people can read or process. It is an effective way of protecting sensitive data stored on media or transmitted over unsecured network communication paths. On the receiving end, the encrypted information is then processed and decrypted by humans or machines to reveal the original message [1]. The goal of cryptography is to hide information from unauthorized individuals. The changes that cryptography has undergone closely follow advances in technology [2]. Image cryptography has many applications in various areas. Researchers may employ the traditional text cryptosystems to encrypt images directly; however, since image sizes are far greater than text, and differ in nature from normal text, traditional text encryption methods are not applicable to images. Image encryption methods can be classified into either lossy or lossless. In lossy encryption methods, were the image details are somewhat distorted, the resulting decrypted image is different from the original image. Due to the characteristics of human perception, and depending on the application, a decrypted image with little distortion is usually acceptable. However, lossless encryption methods are more applicable in applications where the distorted-free original image is required, such as in: medical images, aerospace images, satellite images, and in applications that involve highly classified images. Iii. Proposed Work In the existing system, New Image Encryption System (NIES) enhances the security with low computation cost using Discrete Wavelet transform (DWT) which transform original image into visually meaningful image and the reference image is larger than the original image. Original image is encrypted by any encryption algorithm. That encrypted image is stated as pre encrypted image. Then pre encrypted image is transformed by DWTCT algorithm, that is approximation, horizontal, diagonal, vertical. By adding a module that hides the text data into the encrypted image enhances the existing algorithm. The Reversible Data Hiding (RDH) technique is suitable to hide confidential data with high security. Reversible data hiding technique which gives lossless data while decrypting the encrypted image. RDH also recover the image without any loss while encryption and decryption of image. It will reduce the computation cost and increase the protection over the contents.
  • 3. Hiding the Data into Meaningful Encrypted Image Using Reversible Data Hiding Technique DOI: 10.9790/0661-1803063236 www.iosrjournals.org 34 | Page Figure 2 – Block Diagram of Proposed System A. Pre Encryption Method: In pre encryption method, the original image is processed to noise like or texture like image by using permutation and substitution methods. Where permutation method change the location of the pixel positions and substitution method will change the pixel value. Here Advanced Encryption Standards (AES) is used for encrypting the original image into pre encrypted image [12]. Figure 3 – Pre Encrypted Process The pre encrypted image will be noise-like or texture-like image. Figure 3.1 shows the pre encrypted image. Figure 3.1 – Pre encrypted image B. Image Transformation: In image transformation module, the pre encrypted image is transformed to vertical and diagonal part by using DWTCT and reference image is transformed into four sub bands and in vertical and diagonal part the original image value will be encrypted [10]. So pre encrypted image is transformed into visually meaningful encrypted image. Figure 4 – Image Transformation process Algorithm for dividing the pre encrypted image into vertical and diagonal. For example this pre encrypted image pixel value is 234, then 234/10 is equal to 23 and 234 mod 10 is equal to 4. Input: Pre encrypted image X with a size of m×n, reference image R with a size of 2m×2n, and parameter Pt,
  • 4. Hiding the Data into Meaningful Encrypted Image Using Reversible Data Hiding Technique DOI: 10.9790/0661-1803063236 www.iosrjournals.org 35 | Page 1: Apply DWT defined by parameter Pt to the reference image Y; obtain CA, CH, CV and CD 2: for M=1tom do 3: for N=1tondo 4: CV (M, N) = X (M, N)/10 5: CD (M, N) = X (M, N) mod 10 6: end for 7: end for 8: Apply the inverse DWT to CA, CH, CV and CD sub bands Output: The final encrypted image E with a size of 2m×2n. Here CA is approximation, CH is horizontal, CV is vertical and CD is diagonal. Then the Pre encrypted image is splitted into two bands, that is, vertical and diagonal. Whereas the reference image will be transformed into four sub bands (Figure 4.1) .Where the first image is approximation , second image is horizontal , third image is vertical and four image is diagonal. So in this vertical and diagonal part the pre encrypted image values will be encoded. Then the original image is completely transformed into meaningful reference image. Figure 4.1 – DWT image C. Data Hiding: In this method, hiding the data into encrypted image by using Reversible Data Hiding technique. The encrypted image is divided into two parts and in one part the secret text data will be added and encrypted into the encrypted image. Figure 5 – Data Hiding Process D. Decryption: In this method, the encrypted image is decrypted by using inverse Discrete Wavelet Transform (DWT). The secret text data and original image is retrieved without any loss and error free data. In image decryption, the encrypted image is firstly decomposed into four sub bands by the wavelet filters defined by Pt. There construction of the pre- encrypted image can be defined by, X (M,N)=10C’V(M,N)+C’D(M,N) Where C’V and C’D are sub bands corresponding to CV and CD of the encrypted image. X (M,N) is the reconstructed pre-encrypted image. So there will be no data loss during decryption process. Figure 6 – Decryption Process III. Result Analysis For image encryption the original image and reference image has different histogram graph shown in (Figure 7.1). While decrypting the encrypted image, the same histogram graph value is received (Figure 7.2). So there will be no data loss and error in the proposed system.
  • 5. Hiding the Data into Meaningful Encrypted Image Using Reversible Data Hiding Technique DOI: 10.9790/0661-1803063236 www.iosrjournals.org 36 | Page (a) (b) (c) Figure 7.1 – Encryption of two images (a) 1st image histogram (b) 2nd image histogram (c) Encrypted image histogram (a) (b) Figure 7.2 – Histogram of Decryption of encrypted image (a) decrypted 1st image (b) decrypted 2nd image IV. Conclusion The proposed concept is able to protect the original image with a much higher security level compared with most existing encryption algorithms. A new concept of image encryption is to encrypt meaningful encrypted images that usually are considered as normal images rather than encrypted ones. The proposed concept ensures the attackers’ difficulty of correctly distinguishing and locating the encrypted images from all normal images. An image encryption system utilizes a pre-encryption process to protect the original image contents, and an effective DWT based content transform to generate visually meaningful encrypted images with many different visual appearances and the proposed encryption concept and system show excellent encryption performance and enhance the security of existing image encryption algorithms with a low computation cost. The proposed methods have potential for security, lossless data and error free. It provides a low computation cost. Reference [1]. Y. Chen, Comment on ‘‘Cheating prevention in visual cryptography’’, IEEE Trans. Image Process. 21 (7) (2012) 3319–3323. [2]. X. Zhang, Scalable coding of encrypted images, IEEE Trans. Image Process. 21 (6) (2012) 3108–3114. [3]. M. Zanin, A. N. Pisarchik, Gray code permutation algorithm for high-dimensional data encryption, Information Sciences 270 (0) (2014) 288–297. [4]. Y. Q. Zhang, X. Y. Wang, A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice, Information Sciences 273 (0) (2014) 329–351. [5]. S. Tedmori, N. Al Najdawi, Image cryptographic algorithm based on the haar wavelet transform, Information Sciences 269 (0) (2014) 21–34. [6]. Y. Zhou, L. Bao, C. L. Philip Chen, A new 1D chaotic system for image encryption, Signal Processing 97 (2014) 172–182. [7]. X. Gao, L. An, X. Li, D. Tao, Reversibility improved lossless data hiding, Signal Process. 89 (10) (2009) 2053–2065. [8]. K. Ma, W. Zhang, X. Zhao, N. Yu, F. Li, Reversible data hiding in encrypted images by reserving room before encryption, IEEE Trans. Inf. Forensics Secure. 8 (3) (2013) 553–562. [9]. Long Bao, Yicong Zhou, Image encryption: Generating visually meaningful encrypted images, Information Sciences 324 (2015) 197–207. [10]. A. R. Calder bank, I. Daubechies, W. Sweldens, B. L. Yeo, Wavelet transforms that map integers to integers, Appl. Comput. Harmonic Analysis. 5 (3) (1998) 332–369. [11]. X. Liao, S. Lai, Q. Zhou, A novel image encryption algorithm based on self-adaptive wave transmission, Signal Process. 90 (2010) 2714–2722. [12]. L. Bao, Y. Zhou, C. L. P. Chen, H. Liu, A new chaotic system for image encryption, in: Proceedings of the 2012 International Conference on System Science and Engineering (ICSSE), 2012, pp. 69–73.