New Reversible Data Hiding - Journal - ASPNET22 123
New Reversible Data Hiding - Journal - ASPNET22 123
.Abstract: RDH is used to hide secret information within inability to input large amounts of data or the need for the
some multimedia files.This data hiding is used for medical original image to be available for data extraction. Using
or military instruction. In this project, we create a web- multiple secret sharing and lightweight encryption algorithms,
based application for military network. In that application, the proposed approach provides a secure and efficient solution
commander will add soldier details. if any messages are
to hide the reversible information of encrypted images.
transfered into soldier means, commander will send the
request to image provider. Because they need image to hide Overall, the study fully presents the proposed approach and its
the content into that image. Image provider will send the implementation using ASP.NET. The proposed approach can
image with encrypted format and secret key(shared one be a valuable tool for developers and researchers involved in
key) using cryptographic algorithm. Then commander will information security and image processing.
send the messages as encrypted format inside that II. LITERATURE REVIEW
encrypted image. If the soldier will login to the site, they
give private key and secret key. If the keys are matched Reversible data hiding in encrypted images using private
then image and hidden messages are decrypted and they sharing Signal data Processing, vol. 143, pp. 269–281, 2021.
get original messages.So this project is used to secure X. Wu, J. Weng, and W. Yan. In this study, we encrypted
information in military network. pictures is substituted for secret sharing. First, a fundamental
Keywords: paradigm for reversible data hiding in encrypted images
Least Significant Bit (LSB), Reversible Data Hiding using secret sharing is presented. A suggested image
(RDH), Payload, Data Bit Embedding, Steganography
encryption algorithm then makes use of Shamir's secret
sharing. The suitability of the shares produced by the
I. INTRODUCTION
suggested encryption method for data embedding is
"New Reversible Information Hidden in Encrypted Image supported by theoretical analysis. Finally, two fundamental
Based on Multiple Secret Sharing and Lightweight Encryption approaches utilising difference histogram shifting and
Algorithms" is a research paper that proposes a new approach difference expansion are presented along with some
to reverse information hidden in encrypted images. The extensions. Experimental findings are used to show the
proposed method combines multi-secret sharing and benefits of the suggested approaches, including their high
lightweight encryption algorithms to provide a secure and embedding and low computational complexity.
efficient solution for hiding recoverable information in
encrypted images. Mirroring the ciphertext group enables reversible data
The research paper provides a detailed overview of the concealment in a homomorphic restated sphere.X. Luo and S.
proposed approach and its implementation using ASP.NET, a Xiang pages. 3099–3110 in IEEE Deals on Circuits and
web app framework developed by Microsoft. ASP.NET Systems for Video Technology, vol. 28, no. 11, 2021 a novel
provides a robust and scalable platform for developing web RDH strategy was proposed by restated images which makes
applications and is widely used by developers around the use of the homomorphic and probabilistic Paillier
world. cryptosystem parcels. To create space for data impacted, the
The proposed approach is designed to address the limitations proposed system randomly names and reversibly beds groups
of existing reversible data hiding techniques, such as the of contiguous pixels into the rest of the image. A reference
element and a large number of host elements are present in colour Each pixel may use one of the 256(28) colours from a
each blockIn alike a way, the adjustment on MCGs for data palette or colour reference. argentine-scale 8-bit audio For any
coverlet will not beget any elements overfilled in plaintext particular image, any of the 256(28) argentine tones may be
sphere and the bedded information will be directly pulled used. It is feasible to alter the LSBs of an 8-bit picture or the
taken away the restated sphere. LSBs of 24-bit images with colour by inserting LSBs. Steps
For 24-bit filmland, the easiest LSB addition adds 3 bits per
A novel, adaptable framework for spherical data hiding frame. Since there are 24 bits per image, we can use 24 data
movement.Y.-Q. Shi, J. Huang, and F. Huang. IEEE Deals on bits and 3 hidden bits to conceal 1/8 of the hidden bits.
Information Forensics and Security, issue 11, number 12, Content Data Hider
Owner
2019, pages 2777–2789. To create the outline of the picture,
the basic pixels were first separated into sub-blocks of size m Encryption key Data Hiding
Key
n. The same crucial sluice byte is used to modify the pixels in
Image
the same sub-block after creating a crucial sluice using an Original image Encryption Data Hiding Secret
encryption key. Following gate encryption, a permutation key Information
Data
A data hiding method for high dynamic level of photos was Encryption
hiding
key
published by T. Li, N. C. Huang, and C. M. Wang in the key
Data Embedding
Fig. 2.Data encryption and embedding into the image Fig.4.Extract the data from image
Image Decryption
V. CONCLUSION
Decryption means decrypt the process with the help of keys,in shared-one-key is a novel class of reversible data that conceals
the process have to decrypt the image into message with the itself in encrypted pictures. (SOK). Only the image provider
help of similar keys.Decrypt the message from the error and the receiver in this class share a secret key, and anyone
image. who is aware of the embedding process can conceal in
particular. SOK is significantly less flexible than SNK. The
Data extraction
SNK schemes that are currently in use, however, depend on
The encryption key, the data-hiding key, or both keys could additive homomorphism encryption. To improve productivity
be in the possession of a recipient in this area. The values of and maintain the overall size, we build our Shared Only Key
the parameters can first be obtained from the MSB of the scheme using secret sharing as its fundamental component.
selected encrypted pixels if the recipient only has access to the Then, an Shared No Key plan with a few characteristics is
data-hiding secret and the encrypted picture with encoded transformed into a Shared Only Key version. We give a
data. The receiver rearranges and groups the leftover pixels thorough explanation of the Shared Only Key scheme derived
after which he extracts the embedded bits from the MSB plane from the Shared No Key schemes to show the efficacy.
of each group. It should be observed that the parameter values Finally, we suggest a general SOK is converted into SIK
or pixel-groups cannot be accessed by an attacker without the scheme because we want to perform a follow-up study.
data-hiding passcode, making it difficult to retrieve the
encoded data. The diversity and what appears to be haphazard REFERENCES
selection of pictures is what causes this.Furthermore, even
[1] T.Filler, J.Judas, J.Fridrich, Minimizing Additive
though the recipient has the data-hiding keyis able to
Distortion in Steganography Using Syndrome-Trellis Codes,
effectively extract the embedded data, he is unable to learn
Information Forensics and Security, IEEE Transactions on, 6,
anything about the original image's content.
920-935 (2021).
[2] IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8,
pp. 890-896, August 2020. J. Tian, "Reversible data
embedding using a difference expansion."
[3] Lossless generalised-LSB data embedding, IEEE Trans. [17] P. Tsai, Y.-C. Hu, and H.-L. Yeh, “Reversible image
Image Process., vol. 14, no. 2, pp. 253-266, Feb. 2021. M. U. hiding scheme using predictive coding and histogram
Celik, G. Sharma, A. M. Tekalp, and E. Saber. shifting,” Signal Processing, vol. 89, no. 6, pp. 1129–1143,
2019.
[4] Z. Ni, Y.-Q. Shi, N.Ansari, and W. Su, “Reversible
data hiding,” IEEE Trans. Circuits Syst., Video Technol., vol. [18] D. M. Thodi and J. J. Rodr´ ıguez, “Expansion
16, no. 3, pp. 354–362, 2019. embedding techniques for reversible watermarking,” IEEE
transactions on image processing, vol. 16, no. 3, pp. 721–730,
[5] L. Luo, Z. Chen, M. Chen, X. Zeng, and Z. Xiong, 2018.
“Reversible image watermarking using interpolation
technique,” IEEE Trans. Inf. Forensics Secur., vol. 5, no. 1, [19] Avudaiappan T., Balasubramanian R., Pandiyan S.S.,
pp. 187–193, 2019. Saravanan M., LakshmanaprabuS.K.,and Shankar K.,
“Medical Image Security Using Dual Encryption with
[6] X. Zhang, “Reversible data hiding in encrypted image,” Oppositional Based Optimization Algorithm”, Journal of
IEEE.Signal Process. Lett.,vol. 18, no. 4, pp. 255–258, Apr. Medical Systems, Vol. 58, no.3, pp. 777-780,2018.
2018.
[9] W. Hong, T.-S. Chen, J. Chen, Y.-H. Kao, H.-Y. Wu, and
M.C. Wu, “Reversible data embedment for encrypted
cartoon images using unbalanced bit flipping,” in Proc.
ICSI 2019, LNCS, vol. 7929, pp. 208–214, 2019.
[16] Y.-Y. Tsai, D.-S. Tsai, and C.-L. Liu, “Reversible data
hiding scheme based on neighboring pixel differences,”
Digital Signal Processing, vol. 23, no. 3, pp. 919–927, 2019.