IJRIT International Journal of Research in Information Technology, Volume 2, Issue 3, March 2014, Pg: 616- 620

International Journal of Research in Information Technology (IJRIT) www.ijrit.com

ISSN 2001-5569

Separable Reversible Data Hiding in Encrypted Image Punam Deshmukh1, Reema Patil2 1

Sem VIII B.E, Mumbai University Computer Engineering, B.V.C.O.E Navi Mumbai, Maharashtra, India [email protected]

2

Sem VIII B.E,Mumbai University Computer Engineering, B.V.C.O.E Navi Mumbai, Maharashtra, India [email protected]

Abstract It enhances a novel scheme for separable reversible data hiding in encrypted images. In the first phase, a content owner encrypts he/she original uncompressed image using an encryption key. Then, a data-hider may compress the least significant bits of the encrypted image using a data-hiding key to create a sparse space to accommodate some additional data. With an encrypted image containing additional data, if a receiver has the data-hiding key, he/she can extract the additional data though he/she does not know the image content. If the receiver has the encryption key, he/she can decrypt the received data to obtain an image similar to the original one, but cannot extract the additional data. If the receiver has both the data-hiding key and the encryption key, he/she can extract the additional data and recover the original content. The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. There are many transmission media to transfer the data to destination like emails; at the same time it is may be easier to modify and misuse the valuable information through hacking. So, in order to transfer the data securely to the destination without any modifications, there are many approaches like cryptography and steganography. This paper deals with the image steganography as well as with the different security issues, general overview of cryptography approaches and about the different steganographic algorithms like Least Significant Bit (LSB) algorithm. It also compares those algorithms in means of speed, accuracy and security.

Keywords: Data hiding, Data extraction, Image encryption, Image decryption, Reversible data hiding

1. Introduction In recent years, signal processing in the encrypted domain has attracted huge research interest. Xinpeng Zhang presented a unique reversible (lossless) data hiding (embedding) technique, which enables the exact recovery of the original host signal with the extraction of the embedded information. And this exact recovery with lossless data is nothing but the reversible data hiding. The well-known LSB (least significant bit) method is used as the data embedding method. Reversible data hiding is a technique that is mainly used for the authentication of data like images, videos, electronic documents etc. The chief application of reversible data hiding technique is in IPR protection, authentication, military, medical and law enforcement. Fig. 1. Sketch of non-separable reversible data hiding in encrypted image. gives the sketch. A content owner encrypts the original image using an encryption key, and a data-hider can embed additional data into the encrypted image using a data-hiding key though he does not know the original content. With Punam Deshmukh,

IJRIT

616

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 3, March 2014, Pg: 616- 620

an encrypted image containing additional data, a receiver may first decrypt it according to the encryption key, and then extract the embedded data and recover the original image according to the data-hiding key. In the scheme, the data extraction is not separable from the content decryption. In other words, the additional data must be extracted from the decrypted image, so that the principal content of original image is revealed before data extraction, and, if someone has the data-hiding key but not the encryption key, he cannot extract any information from the encrypted image containing additional data.

` Fig. 1. Sketch of non-separable reversible data hiding in encrypted image. The amount of digital images has increased rapidly on the internet. Image security becomes increasingly important for many applications, e.g., confidential transmission, video surveillance, military and medical applications. Nowadays, the transmission of images is a daily routine and it is necessary to find an efficient way to transmit them over networks. To decrease the transmission time, the data compression is necessary. The protection of this multimedia data can be done with encryption or data hiding algorithms. Since few years, a problem is to try to combine compression, encryption and data hiding in a single step. Two main groups of technologies have been developed for this purpose. The first one is based on content protection through encryption. There are several methods to encrypt binary images or gray level images. In this group, proper decryption of data requires a key. The second group bases the protection data hiding, aimed at secretly embedding a message into the data. Reversible data hiding in images is a technique that hides data in digital images for secret communication. It is a technique to hide additional message into cover media with a reversible manner so that the original cover content can be perfectly restored after extraction of the hidden message. Traditionally, data hiding is used for secret communication. In some applications, the embedded carriers are further encrypted to prevent the carrier from being analyzed to reveal the presence of the embedment. Other applications could be for when the owner of the carrier might not want the other person, including data hider, to know the content of the carrier before data hiding is actually performed, such as military images or confidential medical images. In this case, the content owner has to encrypt the content before passing to the data hider for data embedment. The receiver side can extract the embedded message and recover the original image. Many reversible data hiding methods have been proposed recently [1]–[5]. As is well known, encryption is an effective and popular means of privacy protection. In order to securely share a secret image with other person, a content owner may encrypt the image before transmission. In some application scenarios, an inferior assistant or a channel administrator hopes to append some additional message, such as the origin information, image notation or authentication data, within the encrypted image though he does not know the original image content. For example, when medical images have been encrypted for protecting the patient privacy, a database administrator may aim to embed the personal information into the corresponding encrypted images. It may be also hopeful that the original content can be recovered without any error after decryption and retrieve of additional message at receiver side. Traditionally, data hiding is used for secret communication. Other applications could be for when the owner of the carrier might not want the other person, including data hider, to know the content of the carrier before data hiding is actually performed, such as military images or confidential medical images. In this case, the content owner has to encrypt the content before passing to the data hider for data embedment. The receiver side can extract the embedded message and recover the original image. A major recent trend is to minimize the computational requirements for secure multimedia distribution by “selective encryption” where only parts of the data are Punam Deshmukh,

IJRIT

617

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 3, March 2014, Pg: 616- 620

encrypted. There are two levels of security for digital image encryption: low level and high-level security encryption. In low-level security encryption, the encrypted image has degraded visual quality compared to that of the original one, but the content of the image is still visible and understandable to the viewers. In the high-level security case, the content is completely scrambled and the image just looks like random noise. In this case, the image is not understandable to the viewers at all. Selective encryption aims at avoiding the encryption of all bits of a digital image and yet ensuring a secure encryption.

2. Literature Review 2.1 Cryptography Cryptography is a technique for keeping message secure and free from attacks. Cryptography provides encryption techniques for a secure communication. In cryptography secret message is scrambled [9]. Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication, and data origin authentication. Communication security of data can be accomplished by means of standard symmetric key cryptography. Such important data can be treated as binary sequence and the whole data can be encrypted using a cryptosystem. Secret keys are used to encrypt the data into cipher data. Symmetric or Asymmetric keys are used for apply cryptography in data.

2.2Steganography Steganography is the other technique for secured communication. Steganography involves hiding information so it appears that no information is hidden at all [7]. If a person or persons views the object that the information is hidden inside of he or she will have no idea that there is any hidden information, therefore the person will not attempt to decrypt the information. Steganography is the process of hiding a secret message within cover medium such as image, video, text, audio. Image steganography has many applications, especially in today’s modern, high-tech world. Privacy and secrecy is a concern for most people on the internet. Image steganography allows for two parties to communicate secretly and covertly.

3. PROPOSED SCHEME The proposed scheme is made up of image encryption, data embedding and data extraction/image recovery phases. The image is encrypted by content owner by using the encryption key, The data hider can hide the data in the encrypted image compressing the least significant bits of the encrypted image to obtain the space to hide the data using hiding key. At the receiver side using both of the encryption and data-hiding keys, the embedded additional data can be successfully extracted and the original image can be perfectly recovered by exploiting the spatial correlation in natural image. Fig -2 shows the three cases at the receiver side.

Fig 2. Three cases at receiver side of the proposed separable scheme.

3.1 Image Encryption

Punam Deshmukh,

IJRIT

618

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 3, March 2014, Pg: 616- 620

The reversible data hiding in encrypted image is investigated in. Most of the work on reversible data hiding focuses on the data embedding/extracting on the plain spatial domain. But, in some applications, an inferior assistant or a channel administrator hopes to append some additional message, such as the origin information, image notation or authentication data, within the encrypted image though he does not know the original image content. And it is also hopeful that the original content should be recovered without any error after image decryption and message extraction at receiver side. A content owner encrypts the original image using an encryption key, and a data-hider can embed additional data into the encrypted image using a data-hiding key though he does not know the original content.

3.2 Data Extraction We will consider the three cases that a receiver has only the data-hiding key, only the encryption key, and both the data-hiding and encryption keys, respectively. With an encrypted image containing embedded data, if the receiver has only the data-hiding key, he may first obtain the values of the parameters from the LSB of the selected encrypted pixels. Then, the receiver permutes and divides the other pixels into groups and extracts the embedded bits from the LSB planes of each group. When having the total extracted bits, the receiver can divide them into original LSB of selected encrypted pixels and additional bits. Note that because of the pseudo-random pixel selection and permutation, any attacker without the data-hiding key cannot obtain the parameter values and the pixel-groups, therefore cannot extract the embedded data. Furthermore, although the receiver having the data hiding key can successfully extract the embedded data, he cannot get any information about the original image content.

3.3 Image Recovery In this phase, we will consider the three cases that a receiver has only the data-hiding key, only the encryption key, and both the data-hiding and encryption keys, respectively. Note that because of the pseudo-random pixel selection and permutation, any attacker without the data-hiding key cannot obtain the parameter values and the pixel-groups, therefore cannot extract the embedded data. Furthermore, although the receiver having the data-hiding key can successfully extract the embedded data, he cannot get any information about the original image content.

4. Conclusions Reversible data hiding scheme for encrypted image with a low computation complexity is proposed, which consists of image encryption, data embedding and data extraction/recovery phases. The data of original are entirely encrypted by a stream cipher. Although a data hider does not know the original content, he can embed additional data into the encrypted image by modifying a part of encrypted data. With an encrypted image containing embedded data, a receiver may firstly decrypt it using the encryption key, and the decrypted version is similar to the original image. According to the data hiding key, with the aid of spatial correlation in natural image, the embedded data can be correctly extracted while the original image can be perfectly recovered. The image produced by the reversible data hiding using two key has distortion. In order to remove distortion and to produce the image in a high quality using three key.

Acknowledgments Sincere appreciation and warmest thanks are extended to the many individuals who in their own ways have inspired us in the completion of this project. Firstly we are thankful to our principal Dr. M. Z. Shaikh for his help. We are extremely grateful for his friendly support and professionalism. We express our heartfelt gratitude to our Head of Department Prof. D. R. Ingle and our project coordinator Prof. B. W. Balkhande for their help and support. This task would not have been possible without the help and guidance of our project supervisor Prof. Vaishali Bodade. We are also convening special thanks to all staff of Computer Engineering Department for their support and help. Last but not least, we are very much thankful to our friends who directly or indirectly helped us in completion of the project report

Punam Deshmukh,

IJRIT

619

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 3, March 2014, Pg: 616- 620

References [1] Xinpeng Zhang, “Separable Reversible Data Hiding in Encrypted IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 2, APRIL 2012 [2] J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896, 2003. [3] M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, “Lossless generalized- LSB data embedding,” IEEE Trans. Image Process., vol. 14, no. 2, pp. 253–266, 2005. [4] Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 8, pp. 354–362, 2006. [5] D.M. Thodi and J. J. Rodriguez, “Expansion embedding techniques for reversible watermarking,” IEEE Trans. Image Process., vol. 16, no. 3, pp. 721–730, 2007. [6] W. Hong and T. S. Chen, “Reversible data embedding for high quality images using interpolation and reference pixel distribution mechanism,” J. Vis. Commun. Image Represent,vol. 22, no. 2, pp. 131–140, 2011 [7] Harshitha K M, “Secure Data Hiding Algorithm Using Encrypted Secret message”, International Journal of Scientific and Research Publications, Volume 2, Issue 6, pp.1-4, June 2012. [8] Vinay pandey , Angad Singh, Manish Shrivastava “Medical Image Protection by Using Cryptography Data-Hiding and Steganography”, International Journal of Emerging Technology and Advanced Engineering, Volume 2, Issue 1, pp. 106-109, January 2012

Punam Deshmukh,

IJRIT

620

Separable Reversible Data Hiding in Encrypted Image - International ...

issues, general overview of cryptography approaches and about the different steganographic algorithms like Least. Significant Bit (LSB) algorithm. It also compares those algorithms in means of speed, accuracy and security. Keywords: Data hiding, Data extraction, Image encryption, Image decryption, Reversible data hiding.

113KB Sizes 0 Downloads 251 Views

Recommend Documents

Separable Reversible Data Hiding in Encrypted Image - International ...
It also compares those algorithms in means of speed, accuracy and security. Keywords: ... reversible data hiding technique is in IPR protection, authentication, military, medical and law .... Engineering Department for their support and help.

Reversible Data Hiding in Encrypted Images by Reserving Room ...
Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption..pdf. Reversible Data Hiding in Encrypted Images by Reserving Room ...

Reversible Information Hiding in Encrypted Images by ... - IJRIT
That is, the encrypted image should be decrypted first before facts extraction. .... to framework RRBE to get done better operation made a comparison with techniques from ..... Note that the cloud computer has no right to do any fixed damage.

Reversible Information Hiding in Encrypted Images by ... - IJRIT
computers getting fixed supporters the idea of making shorter encrypted images .... Illustration of image partition and embedding process. ..... Video Technol., vol.

Reversible Data Hiding
technique, which enables the exact recovery of the original host signal upon extraction of the ... ues in the digital representation of the host signal, e.g. overflows.

Reversible Image Data Hiding With Contrast Enhancement ieee.pdf ...
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Reversible ...

Reversible Data Hiding in Distributed source coding ...
www.ijrit.com. ISSN 2001-5569. Reversible Data Hiding in Distributed source coding using ... compression of encrypted sources can be achieved through Sepia Wolf coding. For encrypted real-world sources ..... [5] J. Huang, Y. Q. Shi, and Y. Shi, “Em

data hiding using watermarking - International Journal of Research in ...
Asst.Professor, Dr. Babasaheb Ambedkar College of Engg. and research, ECE department,. R.T.M. Nagpur University, Nagpur,. Maharashtra, India. Samruddhi Pande1, Aishwarya Iyer2, Parvati Atalkar3 ,Chetna Sorte4 ,Bhagyashree Gardalwar 5,. Student, Dr. B

Reversible Watermarking for 3D Cameras: Hiding ...
DCT is applied on a small window around a pixel and the focus val- ue is calculated by accumulating ... versible data hiding technique using adaptive threshold for depth map hiding in its cover image, in section 6 we ..... by controlling the lens pos

Comparative Study of Reversible Image ...
Hiren R. Soni , IJRIT. 161. IJRIT International Journal of Research in Information Technology, Volume 1, Issue 4, April 2013, Pg. 31-37. International Journal of ...

Comparative Study of Reversible Image Watermarking: Fragile ...
Status and Key Issues", International Journal of Network Security, Vol.2, No.3, PP.161–171, May 2006. [9] Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom, ...

Comparative Study of Reversible Image Watermarking: Fragile ...
1 PG Student, Department of Electronics and Communication, Gujarat ... this paper is to define the purpose of reversible watermarking, reflecting recent progress ...

Comparative Study of Reversible Image ...
Reversible watermarking is a novel category of watermarking schemes. It not only can strengthen the ownership of the original media but also can completely recover the original media from the watermarked media. This feature is suitable for some impor

Steganography: Data Hiding in Images
cryptography. Cryptography concentrates more on the security or encryption of data whereas. Steganography aims to defeat the knowledge of encryption of the message. Watermarking is about protecting the content in images;. Steganography is all about c

Secure Comparison of Encrypted Data in Wireless ...
proposed by Agrawal, et al. for database encryption. This scheme is ... static and is represented by a graph G = (N, L) with |N | .... in F are uniformly distributed. 3.

Comparative Study of Reversible Image Watermarking
1 PG Student, Department of Electronics and Communication, Gujarat Technological University. Chandkheda, Gujarat, India. 1 [email protected]. Abstract.

Detection of Data Hiding in Binary Text Images
image are identical. This property eases the detection of the existence of secret message hidden by pixel flipping technique as the flipping of many pixels will destroy the property [11] or increase the compressed data rate [2]. The other type of ima

Estimation of Separable Representations in ...
cities Turin, Venice, Rome, Naples and Palermo. The range of the stimuli goes from 124 to 885 km and the range of the real distance ratios from 2 to 7.137. Estimation and Inference. Log-log Transformation. The main problem with representation (1) is

data hiding using watermarking
Digital watermarking is not a new name in the tech- nology world but there are different techniques in data hiding which are similar ... It may also be a form or type of steganography and is used for widespread use. ... does is take the content, use

Rich Queries on Encrypted Data - Cryptology ePrint Archive
In the OSPIR setting, we show how D can authorize range queries based on the total size of ... other than what can be derived solely from the defined leakage profile. ..... provide the required search tokens to C as specified by the OXT protocol for

Evaluating Branching Programs on Encrypted Data
protocol for evaluating a length-bounded branching program P held by a server on an input x .... the best previous solutions in this setting [18]. 2 We note that ... The basic version of our protocol uses a simple generalization of the tech- nique of

Hiding Depth Map of an Object in its 2D Image ...
Web-conferencing, 3D gaming, objects tracking, face detection & tracking, automotive safety, mobile phones, robotics and medical devices are potential areas.

Rich Queries on Encrypted Data - Cryptology ePrint Archive
We present our solution for range queries in Section 3, showing how to reduce ... that limit the size of a range as a way of preventing a client from obtaining a ...... call representation of a substring q as a set of k-grams with relative distances

encrypted data recovery software free download
encrypted data recovery software free download. encrypted data recovery software free download. Open. Extract. Open with. Sign In. Main menu.