SlideShare ist ein Scribd-Unternehmen logo
1 von 5
SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGE


OBJECTIVE:


          The objective of this project is to provide an efficient data hiding
technique and image Encryption in which the data and the image can be
retrieved independently.


PROBLEM DIFINITION:


      The problem found in our existing system as, the secret key used for
encryption of compressed image and the data hiding is same. So, the user who
knows the secret key used for encryption can access the data embedded and the
original data. The original Image can be retrieved from the encrypted image
after extracting or removing the data hidden in the image. The content owner
and the data hider share the same encryption key for the encryption of the
Image and data hiding.


ABSTRACT:


              The use of computer networks for data transmissions has created
the need of security. Many robust message encryption techniques have been
developed to supply this demand. The amount of digital images has increased
rapidly on the Internet. Image security becomes increasingly important for
many applications, e.g., confidential transmission, video surveillance, military
and medical applications. Nowadays, the transmission of images is a daily



                           Z Technologies
             www.ztech.in info@ztech.in call : 91760 91765
routine and it is necessary to find an efficient way to transmit them over
networks.
      To decrease the transmission time, the data compression is necessary.
The protection of this multimedia data can be done with encryption or data
hiding algorithms. Since few years, a problem is to try to combine
compression, encryption and data hiding in a single step. For example, some
solutions was proposed in3 to combine image encryption and compression.
Two main groups of technologies have been developed for this purpose.


      The first one is based on content protection through encryption. There
are several methods to encrypt binary images or gray level images. In this
group proper decryption of data requires a key. The second group bases the
protection on digital watermarking or data hiding, aimed at secretly embedding
a message into the data. Encryption and watermarking algorithms rely on the
Kirchhoff’s principle: all the details of the algorithm are known, and only the
key to encrypt and decrypt the data should be secret.


EXISTING SYSTEM:
                     In the existing system reversible data hiding technique the
image is compressed and encrypted by using the encryption key and the data to
hide is embedded in to the image by using the same encryption key. The user
who knows the secret encryption key used can access the image and decrypt it
after extracting or removing the data hidden in the image. After extracting the
data hidden in the image then only can be the original image is retrieved.




                          Z Technologies
             www.ztech.in info@ztech.in call : 91760 91765
DISADVANTAGES:


      The secret key used for encryption of compressed image and the data
       hiding is same. So, the user who knows the secret key used for
       encryption can access the data embedded and the original data.
      The original Image can be retrieved from the encrypted image after
       extracting or removing the data hidden in the image.
      The content owner and the data hider share the same encryption key for
       the encryption of the Image and data hiding.


PROPOSED SYSTEM:


                        In proposed method the image is encrypted by content
owner by using the encryption key. The data hider can hide the data in the
encrypted image compressing the least significant bits of the encrypted image
to obtain the space to hide the data by using data hiding key. At the receiver
side the data can be retrieved using the data hiding key by decrypting the
image. But, the encrypted image unchanged still it is decrypted using the
encryption key. The receiver who has the both the encryption and data hiding
keys can access the data embedded as well as the original image.


ADVANTAGES:


        The data hiding and image encryption are done by using two
          different keys. That is encryption key and the data hiding key.
        The receiver who has the data hiding key can retrieve the data
          embedded.

                          Z Technologies
             www.ztech.in info@ztech.in call : 91760 91765
 The receiver who has the encryption key can retrieve the original
       image without removing or extracting the data embedded in the
       encrypted image.
     The receiver who has the both the keys can retrieve the data hidden
       and the original image from the encrypted image.




ALGORITHM USED:


   1. LSB (Least Significant Bit)
   2. DES (Data Encryption Standard)


ARCHITECTURE DIAGRAM:




SYSTEM REQUIREMENTS:
                       Z Technologies
          www.ztech.in info@ztech.in call : 91760 91765
Hardware Requirements:

         •     Intel Pentium IV
         •     256/512 MB RAM
         •     1 GB Free disk space or greater
         •     1 GB on Boot Drive
         •     1 Network Interface Card (NIC)
         •     GSM
 Software Requirements:

         •     MS Windows XP/2000
         •     MS IE Browser 6.0/later
         •     MS .Net Framework 2.0
         •     MS Visual Studio.Net 2005
         •     Internet Information Server (IIS)
         •     MS SQL Server 2000
         •     Windows Installer 3.1


APPLICATIONS:


        1. Deductive Agencies
         2. Consultancies
         3.            Bank              Information     Sharing’s




                      Z Technologies
         www.ztech.in info@ztech.in call : 91760 91765

Weitere ähnliche Inhalte

Mehr von ZTech Proje

Psdot 18 performance analysis of cloud computing
Psdot 18 performance analysis of cloud computingPsdot 18 performance analysis of cloud computing
Psdot 18 performance analysis of cloud computingZTech Proje
 
Psdot 18 performance analysis of cloud computing
Psdot 18 performance analysis of cloud computingPsdot 18 performance analysis of cloud computing
Psdot 18 performance analysis of cloud computingZTech Proje
 
Psdot 17 new channel selection rule for jpeg steganography
Psdot 17 new channel selection rule for jpeg steganographyPsdot 17 new channel selection rule for jpeg steganography
Psdot 17 new channel selection rule for jpeg steganographyZTech Proje
 
Psdot 16 a new framework for credit card transactions involving mutual authen...
Psdot 16 a new framework for credit card transactions involving mutual authen...Psdot 16 a new framework for credit card transactions involving mutual authen...
Psdot 16 a new framework for credit card transactions involving mutual authen...ZTech Proje
 
Psdot 15 performance analysis of cloud computing
Psdot 15 performance analysis of cloud computingPsdot 15 performance analysis of cloud computing
Psdot 15 performance analysis of cloud computingZTech Proje
 
Psdot 14 using data mining techniques in heart
Psdot 14 using data mining techniques in heartPsdot 14 using data mining techniques in heart
Psdot 14 using data mining techniques in heartZTech Proje
 
Psdot 13 robust data leakage and email filtering system
Psdot 13 robust data leakage and email filtering systemPsdot 13 robust data leakage and email filtering system
Psdot 13 robust data leakage and email filtering systemZTech Proje
 
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storageZTech Proje
 
Psdot 11 highly secured net banking system using fingerprint recognition tech...
Psdot 11 highly secured net banking system using fingerprint recognition tech...Psdot 11 highly secured net banking system using fingerprint recognition tech...
Psdot 11 highly secured net banking system using fingerprint recognition tech...ZTech Proje
 
Psdot 10 real time smart car lock security system using
Psdot 10 real time smart car lock security system usingPsdot 10 real time smart car lock security system using
Psdot 10 real time smart car lock security system usingZTech Proje
 
Psdot 9 facial expression recognition in perceptual
Psdot 9 facial expression recognition in perceptualPsdot 9 facial expression recognition in perceptual
Psdot 9 facial expression recognition in perceptualZTech Proje
 
Psdot 23 airport reasoning about time-dependent parking lot occupancy
Psdot 23 airport reasoning about time-dependent parking lot occupancyPsdot 23 airport reasoning about time-dependent parking lot occupancy
Psdot 23 airport reasoning about time-dependent parking lot occupancyZTech Proje
 
Psdot 8 a weak security notion for visual
Psdot 8 a weak security notion for visualPsdot 8 a weak security notion for visual
Psdot 8 a weak security notion for visualZTech Proje
 
Psdot 6 web based security analysis of opass authentication schemes using mob...
Psdot 6 web based security analysis of opass authentication schemes using mob...Psdot 6 web based security analysis of opass authentication schemes using mob...
Psdot 6 web based security analysis of opass authentication schemes using mob...ZTech Proje
 
Psdot 4 scalable and secure sharing of personal health records in cloud compu...
Psdot 4 scalable and secure sharing of personal health records in cloud compu...Psdot 4 scalable and secure sharing of personal health records in cloud compu...
Psdot 4 scalable and secure sharing of personal health records in cloud compu...ZTech Proje
 
Psdot 3 building and maintaining trust in internet voting with biometrics aut...
Psdot 3 building and maintaining trust in internet voting with biometrics aut...Psdot 3 building and maintaining trust in internet voting with biometrics aut...
Psdot 3 building and maintaining trust in internet voting with biometrics aut...ZTech Proje
 
Psdot 7 change detection algorithm for visual
Psdot 7 change detection algorithm for visualPsdot 7 change detection algorithm for visual
Psdot 7 change detection algorithm for visualZTech Proje
 
Psdot 2 design and implementation of persuasive cued click-points and evalua...
Psdot 2 design and implementation of persuasive cued  click-points and evalua...Psdot 2 design and implementation of persuasive cued  click-points and evalua...
Psdot 2 design and implementation of persuasive cued click-points and evalua...ZTech Proje
 
Psdot 1 optimization of resource provisioning cost in cloud computing
Psdot 1 optimization of resource provisioning cost in cloud computingPsdot 1 optimization of resource provisioning cost in cloud computing
Psdot 1 optimization of resource provisioning cost in cloud computingZTech Proje
 

Mehr von ZTech Proje (19)

Psdot 18 performance analysis of cloud computing
Psdot 18 performance analysis of cloud computingPsdot 18 performance analysis of cloud computing
Psdot 18 performance analysis of cloud computing
 
Psdot 18 performance analysis of cloud computing
Psdot 18 performance analysis of cloud computingPsdot 18 performance analysis of cloud computing
Psdot 18 performance analysis of cloud computing
 
Psdot 17 new channel selection rule for jpeg steganography
Psdot 17 new channel selection rule for jpeg steganographyPsdot 17 new channel selection rule for jpeg steganography
Psdot 17 new channel selection rule for jpeg steganography
 
Psdot 16 a new framework for credit card transactions involving mutual authen...
Psdot 16 a new framework for credit card transactions involving mutual authen...Psdot 16 a new framework for credit card transactions involving mutual authen...
Psdot 16 a new framework for credit card transactions involving mutual authen...
 
Psdot 15 performance analysis of cloud computing
Psdot 15 performance analysis of cloud computingPsdot 15 performance analysis of cloud computing
Psdot 15 performance analysis of cloud computing
 
Psdot 14 using data mining techniques in heart
Psdot 14 using data mining techniques in heartPsdot 14 using data mining techniques in heart
Psdot 14 using data mining techniques in heart
 
Psdot 13 robust data leakage and email filtering system
Psdot 13 robust data leakage and email filtering systemPsdot 13 robust data leakage and email filtering system
Psdot 13 robust data leakage and email filtering system
 
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
 
Psdot 11 highly secured net banking system using fingerprint recognition tech...
Psdot 11 highly secured net banking system using fingerprint recognition tech...Psdot 11 highly secured net banking system using fingerprint recognition tech...
Psdot 11 highly secured net banking system using fingerprint recognition tech...
 
Psdot 10 real time smart car lock security system using
Psdot 10 real time smart car lock security system usingPsdot 10 real time smart car lock security system using
Psdot 10 real time smart car lock security system using
 
Psdot 9 facial expression recognition in perceptual
Psdot 9 facial expression recognition in perceptualPsdot 9 facial expression recognition in perceptual
Psdot 9 facial expression recognition in perceptual
 
Psdot 23 airport reasoning about time-dependent parking lot occupancy
Psdot 23 airport reasoning about time-dependent parking lot occupancyPsdot 23 airport reasoning about time-dependent parking lot occupancy
Psdot 23 airport reasoning about time-dependent parking lot occupancy
 
Psdot 8 a weak security notion for visual
Psdot 8 a weak security notion for visualPsdot 8 a weak security notion for visual
Psdot 8 a weak security notion for visual
 
Psdot 6 web based security analysis of opass authentication schemes using mob...
Psdot 6 web based security analysis of opass authentication schemes using mob...Psdot 6 web based security analysis of opass authentication schemes using mob...
Psdot 6 web based security analysis of opass authentication schemes using mob...
 
Psdot 4 scalable and secure sharing of personal health records in cloud compu...
Psdot 4 scalable and secure sharing of personal health records in cloud compu...Psdot 4 scalable and secure sharing of personal health records in cloud compu...
Psdot 4 scalable and secure sharing of personal health records in cloud compu...
 
Psdot 3 building and maintaining trust in internet voting with biometrics aut...
Psdot 3 building and maintaining trust in internet voting with biometrics aut...Psdot 3 building and maintaining trust in internet voting with biometrics aut...
Psdot 3 building and maintaining trust in internet voting with biometrics aut...
 
Psdot 7 change detection algorithm for visual
Psdot 7 change detection algorithm for visualPsdot 7 change detection algorithm for visual
Psdot 7 change detection algorithm for visual
 
Psdot 2 design and implementation of persuasive cued click-points and evalua...
Psdot 2 design and implementation of persuasive cued  click-points and evalua...Psdot 2 design and implementation of persuasive cued  click-points and evalua...
Psdot 2 design and implementation of persuasive cued click-points and evalua...
 
Psdot 1 optimization of resource provisioning cost in cloud computing
Psdot 1 optimization of resource provisioning cost in cloud computingPsdot 1 optimization of resource provisioning cost in cloud computing
Psdot 1 optimization of resource provisioning cost in cloud computing
 

Kürzlich hochgeladen

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIShubhangi Sonawane
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 

Kürzlich hochgeladen (20)

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 

separable reversible data hiding in encrypted image

  • 1. SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGE OBJECTIVE: The objective of this project is to provide an efficient data hiding technique and image Encryption in which the data and the image can be retrieved independently. PROBLEM DIFINITION: The problem found in our existing system as, the secret key used for encryption of compressed image and the data hiding is same. So, the user who knows the secret key used for encryption can access the data embedded and the original data. The original Image can be retrieved from the encrypted image after extracting or removing the data hidden in the image. The content owner and the data hider share the same encryption key for the encryption of the Image and data hiding. ABSTRACT: The use of computer networks for data transmissions has created the need of security. Many robust message encryption techniques have been developed to supply this demand. The amount of digital images has increased rapidly on the Internet. Image security becomes increasingly important for many applications, e.g., confidential transmission, video surveillance, military and medical applications. Nowadays, the transmission of images is a daily Z Technologies www.ztech.in info@ztech.in call : 91760 91765
  • 2. routine and it is necessary to find an efficient way to transmit them over networks. To decrease the transmission time, the data compression is necessary. The protection of this multimedia data can be done with encryption or data hiding algorithms. Since few years, a problem is to try to combine compression, encryption and data hiding in a single step. For example, some solutions was proposed in3 to combine image encryption and compression. Two main groups of technologies have been developed for this purpose. The first one is based on content protection through encryption. There are several methods to encrypt binary images or gray level images. In this group proper decryption of data requires a key. The second group bases the protection on digital watermarking or data hiding, aimed at secretly embedding a message into the data. Encryption and watermarking algorithms rely on the Kirchhoff’s principle: all the details of the algorithm are known, and only the key to encrypt and decrypt the data should be secret. EXISTING SYSTEM: In the existing system reversible data hiding technique the image is compressed and encrypted by using the encryption key and the data to hide is embedded in to the image by using the same encryption key. The user who knows the secret encryption key used can access the image and decrypt it after extracting or removing the data hidden in the image. After extracting the data hidden in the image then only can be the original image is retrieved. Z Technologies www.ztech.in info@ztech.in call : 91760 91765
  • 3. DISADVANTAGES:  The secret key used for encryption of compressed image and the data hiding is same. So, the user who knows the secret key used for encryption can access the data embedded and the original data.  The original Image can be retrieved from the encrypted image after extracting or removing the data hidden in the image.  The content owner and the data hider share the same encryption key for the encryption of the Image and data hiding. PROPOSED SYSTEM: In proposed method the image is encrypted by content owner by using the encryption key. The data hider can hide the data in the encrypted image compressing the least significant bits of the encrypted image to obtain the space to hide the data by using data hiding key. At the receiver side the data can be retrieved using the data hiding key by decrypting the image. But, the encrypted image unchanged still it is decrypted using the encryption key. The receiver who has the both the encryption and data hiding keys can access the data embedded as well as the original image. ADVANTAGES:  The data hiding and image encryption are done by using two different keys. That is encryption key and the data hiding key.  The receiver who has the data hiding key can retrieve the data embedded. Z Technologies www.ztech.in info@ztech.in call : 91760 91765
  • 4.  The receiver who has the encryption key can retrieve the original image without removing or extracting the data embedded in the encrypted image.  The receiver who has the both the keys can retrieve the data hidden and the original image from the encrypted image. ALGORITHM USED: 1. LSB (Least Significant Bit) 2. DES (Data Encryption Standard) ARCHITECTURE DIAGRAM: SYSTEM REQUIREMENTS: Z Technologies www.ztech.in info@ztech.in call : 91760 91765
  • 5. Hardware Requirements: • Intel Pentium IV • 256/512 MB RAM • 1 GB Free disk space or greater • 1 GB on Boot Drive • 1 Network Interface Card (NIC) • GSM Software Requirements: • MS Windows XP/2000 • MS IE Browser 6.0/later • MS .Net Framework 2.0 • MS Visual Studio.Net 2005 • Internet Information Server (IIS) • MS SQL Server 2000 • Windows Installer 3.1 APPLICATIONS: 1. Deductive Agencies 2. Consultancies 3. Bank Information Sharing’s Z Technologies www.ztech.in info@ztech.in call : 91760 91765