Reversible data hiding in encrypted images by reserving room before encryption
1. REVERSIBLE DATA HIDING IN
ENCRYPTED IMAGES BY RESERVING
ROOM BEFORE ENCRYPTION
Presented by:
LansA Informatics Pvt Ltd
2. ABSTRACT
Recently, more and more attention is paid to reversible data hiding (RDH) in
encrypted images, since it maintains the excellent property that the original
cover can be losslessly recovered after embedded data is extracted while
protecting the image content’s confidentiality. All previous methods embed
data by reversibly vacating room from the encrypted images, which may be
subject to some errors on data extraction and/or image restoration. In this
paper, we propose a novel method by reserving room before encryption with a
traditional RDH algorithm, and thus it is easy for the data hider to reversibly
embed data in the encrypted image. The proposed method can achieve real
reversibility, that is, data extraction and image recovery are free of any error.
Experiments show that this novel method can embed more than 10 times as
large payloads for the same image quality as the previous methods, such as for
PSNR =40dB.
3. In this framework, a content owner encrypts the original image
using a standard cipher with an encryption key. After producing the
encrypted image, the content owner hands over it to a data hider
(e.g., a database manager) and the data hider can embed some
auxiliary data into the encrypted image by losslessly vacating some
room according to a data hiding key. Then a receiver, maybe the
content owner himself or an authorized third party can extract the
embedded data with the data hiding key and further recover the
original image from the encrypted version according to the
encryption key
4. All previous methods embed data by reversibly vacating
room from the encrypted images, which may be subject to
some errors on data extraction and/or image restoration.
It is difficult for data hider to reversibly hide the data
behind the image.
5. Since losslessly vacating room from the encrypted images is
relatively difficult and sometimes inefficient, why are we
still so obsessed to find novel RDH techniques working
directly for encrypted images? If we reverse the order of
encryption and vacating room, i.e., reserving room prior to
image encryption at content owner side, the RDH tasks in
encrypted images would be more natural and much easier
which leads us to the novel framework, “reserving room
before encryption (RRBE)”.
Obviously, standard RDH algorithms are the ideal operator
for reserving room before encryption and can be easily
applied to Framework RRBE to achieve better performance
compared with techniques from Framework VRAE.
6. In this system it uses traditional RDH algorithm, and thus it
is easy for the data hider to reversibly embed data in the
encrypted image.
Using this system data extraction and image recovery are
free of any error.
7. SYSTEM CONFIGURATION:-
HARDWARE REQUIREMENTS:-
Processor - Pentium –IV
Speed - 1.1 Ghz
RAM - 512 MB(min)
Hard Disk - 40 GB
Key Board - Standard Windows Keyboard
Mouse - Two or Three Button Mouse
Monitor - LCD/LED
9. SYSTEM CONFIGURATION:-
SOFTWARE REQUIREMENTS:-
Operating system: Windows XP.
Coding Language : Android
Data Base : SQLite
Tool : Eclipse.
10. Authentication:
In this module it allows user to enter the user name and
password in order to restrict the user to access the system.
Then it validates the entered user name and password, if it
is correct it will allow the user to access the application.
Change Password:
In this module it allows user to change the password as
required. For that user has to enter the old password and
then the new password. If it matches then the changes will
be carried out.
11. Encrypt:
In this module it allows to pick the image from the gallery
and then to enter the password key for encryption after that
has to enter the message, that have to be encrypted. Once
this all over, encryption is carried out.
Decrypt:
In this module it allows to pick the encrypted image from
the gallery and then to enter the password key to decrypt.
If the image and the key is correct then the corresponding
message will be displayed.
12. Histogram:
In this module it compares the histogram of the image
before encryption and the image after encryption.
Database:
In this module stores the username and password to order
for authentication and also the key to decrypt the message
from the image.
17. REFERENCE:
Kede Ma, Weiming Zhang, Xianfeng Zhao, Nenghai Yu, and Fenghua Li,
“REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY
RESERVING ROOM BEFORE ENCRYPTION” IEEE
TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY,
VOL. 8, NO. 3, MARCH 2013.