Professional Documents
Culture Documents
Vinit Agham
Tareek Pattewar
Abstract- Internet is
medium
now
days
the
but
most
message
popular
communication
communication
over
the
is
progressing
on
the
field
like
internet
security,
data
over
an
insecure
and
compress
the
cover
data
and
then
embed
reversible
data
hiding
technique
is
based
on
II.
the
.II!!!!!!!II
!I ..l
Original
I.
OVERVIEW
Now a day the data security and data integrity are the two
challenging areas for research. There are so many research is
progressing on the field like internet security, steganography,
cryptography. Sometimes we found certain distortion in images
used in military, medical science which is un-acceptable.
Hence for data hiding we have a technique using which we can
extract data correctly and after that original cover content can
be perfectly recovered. This technique is known as reversible
data hiding. This technique is also called as lossless, distortion
free, or invertible data hiding technique [1]-[2]. Reference [3]
presented a unique reversible (Iossless) data hiding technique
which enables the exact recovery of the original signal with the
extraction of the embedded information. And this exact
recovery with lossless data is nothing but the reversible data
hiding. Usually the well-known LSB (least significant bits)
method is used as the data embedding method. Reversible data
hiding is a technique that is mainly used for the authentication
of data like images, videos, electronic documents etc. The chief
Rec.overed
image
..w;;;..
s-..
'+-
"IU
extracted
bits
Fig.
771
EKternal data/pay
the keys
Case 3
::]
::::::::
c.:a:s:e2-------------------1t-------17f:re :c a:-v:erh:as------------
'0'
cad
key o n l ..,
Decryption
...
data h id i n g
kevonlv
+
wi t h hidden dot ..
772
2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)
much text can be hiding into the image. For these reasons it is
important to take these issues into consideration.
As shown in Fig.l, in separable scheme, the content owner
encrypts the original uncompressed image using an encryption
key to produce an encrypted image. Then using a data-hiding
key the data-hider compresses the least significant bits (LSB)
of the encrypted image to create some space to accommodate
the additional data. At the receiver side the data embedded can
be easily retrieved from the encrypted image containing
additional data according to the data-hiding key. Because the
data embedding only affects the LSB of the cover image;
decryption may result in an image similar to the original
version. Here at the receiver side there exists three cases as
shown in Fig.2, case one is when the receiver has only the
data- hiding key, he is able to extract the additional data even
if he does not know the image content. Case two is if he has
only the encryption key, he can decrypt the received data i.e.
encrypted image to obtain an image similar to the original
cover media, but cannot extract the embedded additional data.
Case three is if the receiver has both the keys i.e. data-hiding
key and the encryption key, he can extract the additional data
and recovers the original image without any error. This new
approach of separable reversible data hiding method consists
of three main procedures,
A.
B.
C.
IV.
METHODOLOGY
lPi,j.kl2U JIIDd 2
PSNR
Sr.No.
Payload (In
Approximate text
PSNR
number
file size
recovered
words)
500
2
3
4
of
(in
KB)
of
image
45.8573
1000
6.41
42.9012
1500
9.61
41.1306
2000
13. 3
39.946
0 , 1 , 2. . . .... 7
(I)
(2)
11=0
(3)
after
decryption(in dB)
3.20
and
Bi,}, k,u
TABLE l.
20J4 Internationai Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)
773
(4)
B'i,j,k,l/ iCBri,j,k,l/
(5)
V.
EVALUATION METHODOLOGY
60
__ PSNR of decrypted image
50
<C
...
;;:
40
c:
:z
(I)
c..
30
20
10
0
0
0.05
0.1
0 .15
0.2
0.25
Embedded rate
(6)
1.005
0.995
(7)
Consider the third case in which the receiver has both the
data-hiding and the encryption keys, he may aim to extract the
embedded data i.e. text and recover the original image. Here
according to the data-hiding key the receiver first get the values
of the LSB of the encrypted image containing secure text since
the further procedure is same as in case one. Similar to the case
two if the receiver has encryption key he can easily get the
original cover image.
.Orange.jpg
..
0.99
.S:
Leaves. jpg
.....
-
a 0.985
"
..,..
-Lena.jpg
0.98
;; 0.975
..
a
0.97
0.965
0
0.02 0 .040.06 0.08 0.1 0.12 0.140.16 0.18 0.2 0.22 0.24
embedded rate
774
2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)
C.
REFERENCES
[I ]
Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, "Reversible data hiding," IEEE
Trans. Circuits Syst. Video Techno!., vo!' 16, no. 3, pp. 354-362,
Mar.2006.
way.
[2 ]
CONCLUSION
Aug. 2003.
[3 ]
[4 ]
[5 ]
[6 ]
[7]
20J4 Internationai Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)
775