SlideShare a Scribd company logo
International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 3, Issue 3 (May-June 2015), PP. 52-54
52 | P a g e
REVERSIBLE DATA HIDING IN ENCRYPTED
IMAGES BY RESERVING ROOM BEFORE
ENCRYPTION TECHNIQUE AND LSB
MATCHING ALGORITHM
Harshali Sanglikar1, Neha Jadhav2, Pawankumar Thorat3, Rubeena Khan4
Department of Computer engineering
Modern Education Society’s college of engineering
Savitribai Phule Pune University, Pune
harshali101@gmail.com, neha.jadhav@gmail.com, thoratpawankumar@gmail.com
Rubeena.khan@mescoepune.org
Abstract:- In recent years the topic of steganography has become
very popular and a lot of research is being done in this field.
Reversible data hiding is a method in which the image in which
the encrypted data is hidden is losslessly recovered. In this paper
we have proposed such a method that the previous work done
limitations can be overcome. In this paper, we embed the
encrypted data in the image by using LSB matching technique for
reserving room, so that fast, optimal and lossless steganography
is achieved. The proposed method provides total reversibility,
that is, data extraction and image recovery.
Index terms- reversible data hiding, encryption, data hiding and
extraction.
I. INTRODUCTION
The basic concept of steganography is to hide the very
presence of communication by embedding message into
innocuous-looking cover objects.
Reversible data hiding is a method to hide (embed)
additional message into some distortion free unacceptable
cover media. It is needed in the fields such as military or
medical images, with a reversible manner are use so that the
original cover content can be perfectly recovered after
extraction of the hidden message[1].
In[1][3][5], separable reversible data hiding technique a
user or content owner encrypts the original carrier image then
a data hider compress the image to create space to for
accommodation of some additional data. However, in[4] some
circumstances if the user (content owner) does not trust the
service provider then he may encrypt it (secret data) when it is
to be transmitted ted, channel provider without any knowledge
of the cryptographic key may compress the encrypted data due
to the limited channel resource[2].
Data hiding is referred to as a process to hide data or embed
data, i.e, the data embedding process links two sets, a set of
the embedded data and another set of the carrier media or
cover media data. In most cases of data hiding, the cover
media or carrier image becomes distorted due to data hiding
and cannot be inverted back to the original image as it was
before. That is, media has permanent distortion even after the
embedded data have been removed. In some applications, such
as medical diagnosis and law enforcement it is desired that the
original cover media can be recovered efficiently with no
loss.[7][8][9] The marking techniques satisfying this
requirement are referred to as reversible, lossless, distortion
free or invertible data hiding techniques. The separable means
which is able to separate, in other words, we can separate the
some things, activities using suitable criteria is as said.
Separable reversible data hiding concept is the separation of
activities i.e. extraction of original cover image and extraction
of payload. Separable data hiding key is the separation that
exists according to keys. Here at the receiver side, there are
three different cases are encountered ie image recover, data
extraction and data decryption.
There are several methods for data hiding in images
available now, but most of them are not reversible in nature. In
[1] paper method to achieve pure recovery of image and data
is proposed. Thus here gives same importance for both image
and data. In the Existing System, Reserving Room before
Encryption technique is following. As losslessly reserving
room in the encrypted images is relatively difficult and
sometimes inefficient, but still we are so obsessed to find
novel RDH techniques working directly for Encrypted Images.
The method is of compressing the encrypted LSBs to reserve
room for additional data by finding syndromes of a parity
check matrix, and the side information used at the receiver
side is also the spatial correlation of decrypted images. All the
three methods try to vacate room from the encrypted images
directly.
II. PROPOSED SYSTEM
In proposed method can achieve real reversibility, that
is, data extraction and image recovery are free of any error. If
we reverse the order of encryption and vacating room, i.e.,
reserving room prior to image encryption at content owner
side, the RDH tasks in encrypted images would be more
natural and much easier which leads us to the novel
framework, “reserving room before encryption (RRBE)”. Not
only does the proposed method separate data extraction from
image decryption but also achieves excellent performance in
two different prospects. Real reversibility is realized, that is,
data extraction and image recovery are free of any error. For
given embedding rates, the PSNRs of decrypted image
containing the embedded data are significantly improved; and
for the acceptable PSNR, the range of embedding rates is
greatly enlarged. The proposed method allows us to use any
format of the image in which we want to store data i.e jpeg,
png, bmp etc. The method allows us to use any format of data
file i.e pdf,docx, etc.
A. Encrypted Image Generation
In this module, to construct the encrypted image, the first
stage can be divided into two steps. Image Partition and Self
Reversible Embedding followed by image encryption. At the
beginning, image partition step divides original image into two
parts and then, the LSBs of the least dominant channels in the
image are reversibly embedded into the dominant colour
channel with a standard RDH algorithm so that LSBs of can be
International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 3, Issue 3 (May-June 2015), PP. 52-54
53 | P a g e
used for accommodating messages; at last, encrypt the
rearranged image to generate its final version.
B. Data hiding in encrypted image
In this module, a content owner encrypts the original
image using a standard cipher with an encryption key. After
producing the encrypted image, the content owner hands over
it to a data hider (e.g., a database manager) and the data hider
can embed some auxiliary data into the encrypted image by
lossless vacating some room according to a data hiding key.
Then a receiver, maybe the content owner himself or an
authorized third party can extract the embedded data with the
data hiding key and further recover the original image from
the encrypted version according to the encryption key.
C. Data extraction and image recovery
In this module, Extracting Data from Encrypted Images to
manage and update personal information of images which are
encrypted for protecting clients’ privacy, an inferior database
manager may only get access to the data hiding key and have
to manipulate data in encrypted domain. When the database
manager gets the data hiding key, he can decrypt and extract
the additional data by directly reading the decrypted version.
When requesting for updating information of encrypted
images, the database manager, then, updates information
through LSB replacement and encrypts up dated information
according to the data hiding key all over again. As the whole
process is entirely operated on encrypted domain, it avoids the
leakage of original content.
D. Data extraction and image restoration
In this module, after generating the marked decrypted
image, the content owner can further extract the data and
recover original image. Reversible hiding allows extraction of
the original host signal and also the embedded message. There
are two important requirements for reversible data hiding
techniques: the embedding capacity should be large; and
distortion should be low. These two requirements conflict with
each other. In general, a higher embedding capacity results in
a higher degree of distortion. An improved technique embeds
the same capacity with lower distortion or vice versa. For the
image restoration we have to follow the specified steps by
which we can easily recover the original image. After the
image encryption the image must be considered as an
individual unit of work so we can fully concentrate on the
watermarking technique and proceed further
III. AES ALGORITHM
The Advanced Encryption Standard (AES) specifies a
FIPS-approved cryptographic algorithm that can be used to
protect electronic data. The AES algorithm is a symmetric
block cipher that can encrypt (encipher) and decrypt
(decipher) information. Encryption converts data to an
unintelligible form called ciphertext; decrypting the ciphertext
converts the data back into its original form, called plaintext.
The AES algorithm is capable of using cryptographic keys of
128, 192, and 256 bits to encrypt and decrypt data in blocks of
128 bits. The AES algorithm is based on permutations and
substitutions. Permutations are rearrangements of data, and
substitutions replace one unit of data with another. AES
performs permutations and substitutions using several
different techniques.
In our system we are using 128 bit key and in AES this is
represented by Nb = 4, which reflects the number of 32-bit
words (number of columns) in the State. The length of the
Cipher Key, K, is 128. The key length is represented by Nk =
4, 6, or 8, which reflects the number of 32-bit words (number
of columns) in the Cipher Key. The number of rounds to be
performed during the execution of the algorithm is dependent
on the key size. The number of rounds is represented by Nr,
where Nr = 10 when
Nk = 4, Nr = 12 when Nk = 6, and Nr = 14 when Nk = 8. For
both its Cipher and Inverse Cipher, the AES
Algorithm uses a round function that is composed of four
different byte-oriented transformations:
1) Substitution using a substitution table (S-box).
2) Shifting rows of the State array by different offsets
3) Mixing the data within each column of the State
Array
4) Adding a Round Key to the State.
IV. LSB MATCHING ALGORITHM
Least Significant Bit Embedding’s (LSB) are a general
stenographic technique that may be employed to embed data
into a variety of digital media, but one of the most studied
applications is using LSB embedding to hide one image inside
another. In our system we are using LSB matching algorithm
for embedding data in the image. For embedding data in the
image we first find the dominant channel in the image. The
dominant channel is basically the colour which is most present
in the image. The other two channels that are present in the
image are used for storing the data in the image. Before
storing the data in the image we reserve room that is we store
the values of the least dominant channels LSB’s in the
dominant channel by EXORing them. The space for storing
the data in the image is now reserved. The data that is to be
stored in the image is first compared with the LSBs of the
image’s least dominant channel, if the values are same then the
bits are kept as it is and if there is a mismatch then the values
are replaced. Thus the algorithm saves a lot of computation
time and also is overcoming the abruptly replacing the LSB
bits of the image.
V. FEATURES OF SYSTEM
A. Three Keys for more Data Security
Encrypted data is hidden in Encrypted Image with separate
keys for Data Encryption, Image Encryption and Data Hiding.
For decrypting of data receiver should have both Data
Encryption and Data hiding key.
B. Protection for auto generated keys
To perform any operation the user has only 3 attempts. If user
is fail to perform any of operation means user enter wrong 3
times then the system is goes to not responding state and one
mail with receiver computer IP address is send to the admin.
C. Allows any type of data or image file
The system can work on any format of data file like .pdf,
.docx, .rtf etc and any format of image file like .jpeg, .bmp,
.png etc.
D. Allows large data files to be encrypted
The system allows very large size of data file to be encrypted
easily as we are storing the image in the image file. If we want
to store large size data in the image we would have to take a
bigger image to store that much amount of data in it.
E. Faster computation time
The use of multithreading allows faster computation both
while image encryption and decryption.
International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 3, Issue 3 (May-June 2015), PP. 52-54
54 | P a g e
AES flow chart
Illustration of image partitioning and embedding process
VI. CONCLUSION
Reversible data hiding in encrypted images is a new topic
drawing attention because of the privacy-preserving
requirements from cloud data management. Previous methods
implement RDH in encrypted images by vacating room after
encryption, as opposed to which we proposed by reserving
room before encryption. Thus the data hider can benefit from
the extra space emptied out in previous stage to make data
hiding process effortless. The proposed method can take
advantage of all traditional RDH techniques for plain images
and achieve excellent performance without loss of perfect
secrecy. Furthermore, by this novel method can achieve
reversibility as well as separate data extraction and greatly
improvement on the quality of marked decrypted images
REFERENCES
[1] Reversible Data Hiding in Encrypted Images by Reserving
Room Before Encryption Kede Ma, Weiming Zhang,
Xianfeng Zhao, Member, IEEE, Nenghai Yu, and Fenghua
Li MARCH 2013
[2] W. Zhang, B. Chen, and N. Yu, “Capacity-approaching
codes for reversible data hiding,” in Proc 13th Information
Hiding (IH’2011), LNCS 6958, 2011, pp. 255–269,
Springer-Verlag.
[3] W. Zhang, B. Chen, and N. Yu, “Improving various
reversible data hiding schemes via optimal codes for binary
covers,” IEEE Trans. Image Process., vol. 21, no. 6, pp.
2991–3003, Jun. 2012.
[4] J. Fridrich and M. Goljan, “Lossless data embedding for all
image formats,” in Proc. SPIE Proc. Photonics West,
Electronic Imaging, Security and Watermarking of
Multimedia Contents, San Jose, CA, USA, Jan. 2002, vol.
4675, pp. 572–583.
[5] J. Tian, “Reversible data embedding using a difference
expansion,” IEEE Trans. Circuits Syst. Video Technol.,
vol. 13, no. 8, pp. 890–896, Aug. 2003.
[6] Z. Ni, Y. Shi, N. Ansari, and S. Wei, “Reversible data
hiding,” IEEE Trans. Circuits Syst. Video Technol., vol.
16, no. 3, pp. 354–362, Mar.2006.
[7] D.M. Thodi and J. J. Rodriguez, “Expansion embedding
techniques for reversible watermarking,” IEEE Trans.
Image Process., vol. 16, no. 3, pp. 721–730, Mar. 2007.
[8] X. L. Li, B. Yang, and T. Y. Zeng, “Efficient reversible
watermarking based on adaptive prediction-error expansion
and pixel selection,” IEEE Trans. Image Process., vol. 20,
no. 12, pp. 3524–3533, Dec. 2011.
[9] P. Tsai, Y. C. Hu, and H. L. Yeh, “Reversible image hiding
scheme using predictive coding and histogram shifting,”
Signal Process., vol. 89, pp. 1129–1143, 2009.
[10] L. Luo et al., “Reversible imagewatermarking using
interpolation technique,” IEEE Trans. Inf. Forensics
Security, vol. 5, no. 1, pp. 187–193, Mar. 2010.
[11] V. Sachnev, H. J. Kim, J. Nam, S. Suresh, and Y.-Q. Shi,
“Reversible watermarking algorithm using sorting and
prediction,” IEEE Trans. Circuits Syst. Video Technol.,
vol. 19, no. 7, pp. 989–999, Jul. 2009.
[12] A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone,
Handbook of Applied Cryptography. Boca Raton, FL,
USA: CRC, 1996.
[13] K. Hwang and D. Li, “Trusted cloud computing with secure
resources and data coloring,” IEEE Internet Comput., vol.
14, no. 5, pp. 14–22, Sep./Oct. 2010.
[14] M. Johnson, P. Ishwar, V. M. Prabhakaran, D. Schonberg,
and K. Ramchandran, “On compressing encrypted data,”
IEEE Trans. Signal Process., vol. 52, no. 10, pp. 2992–
3006, Oct. 2004.
Ad

More Related Content

What's hot (20)

Lossless and reversible data hiding in encrypted images with public key crypt...
Lossless and reversible data hiding in encrypted images with public key crypt...Lossless and reversible data hiding in encrypted images with public key crypt...
Lossless and reversible data hiding in encrypted images with public key crypt...
LeMeniz Infotech
 
High capacity histogram shifting based reversible data hiding with data compr...
High capacity histogram shifting based reversible data hiding with data compr...High capacity histogram shifting based reversible data hiding with data compr...
High capacity histogram shifting based reversible data hiding with data compr...
IAEME Publication
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
inventy
 
Data encryption using LSB matching algorithm and Reserving Room before Encryp...
Data encryption using LSB matching algorithm and Reserving Room before Encryp...Data encryption using LSB matching algorithm and Reserving Room before Encryp...
Data encryption using LSB matching algorithm and Reserving Room before Encryp...
IJERA Editor
 
Reversible Watermarking based on Histogram Shifting Modification:A Review
Reversible Watermarking based on Histogram Shifting Modification:A ReviewReversible Watermarking based on Histogram Shifting Modification:A Review
Reversible Watermarking based on Histogram Shifting Modification:A Review
iosrjce
 
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...
ijceronline
 
Az2419511954
Az2419511954Az2419511954
Az2419511954
IJMER
 
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
CSCJournals
 
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...
IJCSIS Research Publications
 
Learnable Image Encryption
Learnable Image EncryptionLearnable Image Encryption
Learnable Image Encryption
Masayuki Tanaka
 
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
IOSR Journals
 
A010520107
A010520107A010520107
A010520107
IOSR Journals
 
A secured data transmission system by reversible data hiding with scalable co...
A secured data transmission system by reversible data hiding with scalable co...A secured data transmission system by reversible data hiding with scalable co...
A secured data transmission system by reversible data hiding with scalable co...
IAEME Publication
 
Data Hiding Techniques
Data Hiding TechniquesData Hiding Techniques
Data Hiding Techniques
prashant3535
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
ijcisjournal
 
H43064650
H43064650H43064650
H43064650
IJERA Editor
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Dr. Amarjeet Singh
 
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...
IJECEIAES
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
IRJET Journal
 
Implementation of image steganography using lab view
Implementation of image steganography using lab viewImplementation of image steganography using lab view
Implementation of image steganography using lab view
IJARIIT
 
Lossless and reversible data hiding in encrypted images with public key crypt...
Lossless and reversible data hiding in encrypted images with public key crypt...Lossless and reversible data hiding in encrypted images with public key crypt...
Lossless and reversible data hiding in encrypted images with public key crypt...
LeMeniz Infotech
 
High capacity histogram shifting based reversible data hiding with data compr...
High capacity histogram shifting based reversible data hiding with data compr...High capacity histogram shifting based reversible data hiding with data compr...
High capacity histogram shifting based reversible data hiding with data compr...
IAEME Publication
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
inventy
 
Data encryption using LSB matching algorithm and Reserving Room before Encryp...
Data encryption using LSB matching algorithm and Reserving Room before Encryp...Data encryption using LSB matching algorithm and Reserving Room before Encryp...
Data encryption using LSB matching algorithm and Reserving Room before Encryp...
IJERA Editor
 
Reversible Watermarking based on Histogram Shifting Modification:A Review
Reversible Watermarking based on Histogram Shifting Modification:A ReviewReversible Watermarking based on Histogram Shifting Modification:A Review
Reversible Watermarking based on Histogram Shifting Modification:A Review
iosrjce
 
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...
ijceronline
 
Az2419511954
Az2419511954Az2419511954
Az2419511954
IJMER
 
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
CSCJournals
 
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...
IJCSIS Research Publications
 
Learnable Image Encryption
Learnable Image EncryptionLearnable Image Encryption
Learnable Image Encryption
Masayuki Tanaka
 
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
IOSR Journals
 
A secured data transmission system by reversible data hiding with scalable co...
A secured data transmission system by reversible data hiding with scalable co...A secured data transmission system by reversible data hiding with scalable co...
A secured data transmission system by reversible data hiding with scalable co...
IAEME Publication
 
Data Hiding Techniques
Data Hiding TechniquesData Hiding Techniques
Data Hiding Techniques
prashant3535
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
ijcisjournal
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Dr. Amarjeet Singh
 
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...
IJECEIAES
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
IRJET Journal
 
Implementation of image steganography using lab view
Implementation of image steganography using lab viewImplementation of image steganography using lab view
Implementation of image steganography using lab view
IJARIIT
 

Viewers also liked (20)

Firewallpresentation 100826052003-phpapp02(1)
Firewallpresentation 100826052003-phpapp02(1)Firewallpresentation 100826052003-phpapp02(1)
Firewallpresentation 100826052003-phpapp02(1)
Prabhdeep Kaur
 
пл 168 юстус дз 5
пл 168 юстус дз 5пл 168 юстус дз 5
пл 168 юстус дз 5
AnnJus
 
ASSESSMENT OF HEAVY METALS CONCENTRATION IN INDIAN AND PAKISTANI VEGETABLES
ASSESSMENT OF HEAVY METALS CONCENTRATION IN INDIAN AND PAKISTANI VEGETABLESASSESSMENT OF HEAVY METALS CONCENTRATION IN INDIAN AND PAKISTANI VEGETABLES
ASSESSMENT OF HEAVY METALS CONCENTRATION IN INDIAN AND PAKISTANI VEGETABLES
International Journal of Technical Research & Application
 
Keamanan Jaringan Komputer
Keamanan Jaringan KomputerKeamanan Jaringan Komputer
Keamanan Jaringan Komputer
Ari Yandi
 
Omnichannel cases
Omnichannel casesOmnichannel cases
Omnichannel cases
TESC-MBA
 
A SURVEY ON IRIS RECOGNITION FOR AUTHENTICATION
A SURVEY ON IRIS RECOGNITION FOR AUTHENTICATIONA SURVEY ON IRIS RECOGNITION FOR AUTHENTICATION
A SURVEY ON IRIS RECOGNITION FOR AUTHENTICATION
International Journal of Technical Research & Application
 
proposal kualitatif
proposal kualitatif proposal kualitatif
proposal kualitatif
Elly Ana
 
Symbols of rev book
Symbols of rev bookSymbols of rev book
Symbols of rev book
Ishak Tamang
 
COMPARISON OF THE EXPERIMENTAL PERFORMANCE OF A THERMOELECTRIC REFRIGERATOR W...
COMPARISON OF THE EXPERIMENTAL PERFORMANCE OF A THERMOELECTRIC REFRIGERATOR W...COMPARISON OF THE EXPERIMENTAL PERFORMANCE OF A THERMOELECTRIC REFRIGERATOR W...
COMPARISON OF THE EXPERIMENTAL PERFORMANCE OF A THERMOELECTRIC REFRIGERATOR W...
International Journal of Technical Research & Application
 
NEED OF THE HOUR: A CUSTOMER CENTRIC FORMAT FOR ORGANIZED RETAILING
NEED OF THE HOUR: A CUSTOMER CENTRIC FORMAT FOR ORGANIZED RETAILINGNEED OF THE HOUR: A CUSTOMER CENTRIC FORMAT FOR ORGANIZED RETAILING
NEED OF THE HOUR: A CUSTOMER CENTRIC FORMAT FOR ORGANIZED RETAILING
International Journal of Technical Research & Application
 
CHRONOLOGICAL RELATIONSHIPS BETWEEN ESTRUS ONSET, TIME OF LH SURGE AND OVULAT...
CHRONOLOGICAL RELATIONSHIPS BETWEEN ESTRUS ONSET, TIME OF LH SURGE AND OVULAT...CHRONOLOGICAL RELATIONSHIPS BETWEEN ESTRUS ONSET, TIME OF LH SURGE AND OVULAT...
CHRONOLOGICAL RELATIONSHIPS BETWEEN ESTRUS ONSET, TIME OF LH SURGE AND OVULAT...
International Journal of Technical Research & Application
 
Final assignment
Final assignmentFinal assignment
Final assignment
cynjac
 
Social media mediasharing-monicamcginnis
Social media mediasharing-monicamcginnisSocial media mediasharing-monicamcginnis
Social media mediasharing-monicamcginnis
monicamcg0789
 
ϵ-DIFFERENTIAL PRIVACY MODEL FOR VERTICALLY PARTITIONED DATA TO SECURE THE PR...
ϵ-DIFFERENTIAL PRIVACY MODEL FOR VERTICALLY PARTITIONED DATA TO SECURE THE PR...ϵ-DIFFERENTIAL PRIVACY MODEL FOR VERTICALLY PARTITIONED DATA TO SECURE THE PR...
ϵ-DIFFERENTIAL PRIVACY MODEL FOR VERTICALLY PARTITIONED DATA TO SECURE THE PR...
International Journal of Technical Research & Application
 
INVESTMENT AND ECONOMIC GROWTH IN SUDAN: AN EMPIRICAL INVESTIGATION, 1999-2011
INVESTMENT AND ECONOMIC GROWTH IN SUDAN: AN EMPIRICAL INVESTIGATION, 1999-2011INVESTMENT AND ECONOMIC GROWTH IN SUDAN: AN EMPIRICAL INVESTIGATION, 1999-2011
INVESTMENT AND ECONOMIC GROWTH IN SUDAN: AN EMPIRICAL INVESTIGATION, 1999-2011
International Journal of Technical Research & Application
 
Ijtra130519
Ijtra130519Ijtra130519
Ijtra130519
International Journal of Technical Research & Application
 
ONE HIDDEN LAYER ANFIS MODEL FOR OOS DEVELOPMENT EFFORT ESTIMATION
ONE HIDDEN LAYER ANFIS MODEL FOR OOS DEVELOPMENT EFFORT ESTIMATIONONE HIDDEN LAYER ANFIS MODEL FOR OOS DEVELOPMENT EFFORT ESTIMATION
ONE HIDDEN LAYER ANFIS MODEL FOR OOS DEVELOPMENT EFFORT ESTIMATION
International Journal of Technical Research & Application
 
Swedish Fashion Council
Swedish Fashion CouncilSwedish Fashion Council
Swedish Fashion Council
ohadsan
 
Firewallpresentation 100826052003-phpapp02(1)
Firewallpresentation 100826052003-phpapp02(1)Firewallpresentation 100826052003-phpapp02(1)
Firewallpresentation 100826052003-phpapp02(1)
Prabhdeep Kaur
 
пл 168 юстус дз 5
пл 168 юстус дз 5пл 168 юстус дз 5
пл 168 юстус дз 5
AnnJus
 
Keamanan Jaringan Komputer
Keamanan Jaringan KomputerKeamanan Jaringan Komputer
Keamanan Jaringan Komputer
Ari Yandi
 
Omnichannel cases
Omnichannel casesOmnichannel cases
Omnichannel cases
TESC-MBA
 
proposal kualitatif
proposal kualitatif proposal kualitatif
proposal kualitatif
Elly Ana
 
Symbols of rev book
Symbols of rev bookSymbols of rev book
Symbols of rev book
Ishak Tamang
 
Final assignment
Final assignmentFinal assignment
Final assignment
cynjac
 
Social media mediasharing-monicamcginnis
Social media mediasharing-monicamcginnisSocial media mediasharing-monicamcginnis
Social media mediasharing-monicamcginnis
monicamcg0789
 
Swedish Fashion Council
Swedish Fashion CouncilSwedish Fashion Council
Swedish Fashion Council
ohadsan
 
Ad

Similar to REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE ENCRYPTION TECHNIQUE AND LSB MATCHING ALGORITHM (20)

K041068072
K041068072K041068072
K041068072
ijceronline
 
REAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUE
REAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUEREAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUE
REAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUE
International Journal of Technical Research & Application
 
F1803063236
F1803063236F1803063236
F1803063236
IOSR Journals
 
A Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted ImagesA Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted Images
ijsrd.com
 
A comparative case study on the various techniques of reversible data hiding
A comparative case study on the various techniques of reversible data hidingA comparative case study on the various techniques of reversible data hiding
A comparative case study on the various techniques of reversible data hiding
IJLT EMAS
 
Ensuring Distributed Accountability for Data Sharing Using Reversible Data Hi...
Ensuring Distributed Accountability for Data Sharing Using Reversible Data Hi...Ensuring Distributed Accountability for Data Sharing Using Reversible Data Hi...
Ensuring Distributed Accountability for Data Sharing Using Reversible Data Hi...
IOSR Journals
 
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET Journal
 
Secured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
Secured Reversible Data Hiding In Encrypted Images Using Hyper ChaosSecured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
Secured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
CSCJournals
 
Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...
Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...
Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...
IRJET Journal
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
ijsrd.com
 
IRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data HidingIRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data Hiding
IRJET Journal
 
P017329498
P017329498P017329498
P017329498
IOSR Journals
 
An Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile CommunicationAn Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile Communication
iosrjce
 
Paper id 212014145
Paper id 212014145Paper id 212014145
Paper id 212014145
IJRAT
 
It3116411644
It3116411644It3116411644
It3116411644
IJERA Editor
 
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams.pdf
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams.pdfNew Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams.pdf
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams.pdf
Xevol1
 
Dft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of imagesDft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of images
eSAT Journals
 
Dft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of imagesDft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of images
eSAT Publishing House
 
Scalable Image Encryption Based Lossless Image Compression
Scalable Image Encryption Based Lossless Image CompressionScalable Image Encryption Based Lossless Image Compression
Scalable Image Encryption Based Lossless Image Compression
IJERA Editor
 
A Review on Reversible Data Hiding Scheme by Image Contrast Enhancement
A Review on Reversible Data Hiding Scheme by Image Contrast EnhancementA Review on Reversible Data Hiding Scheme by Image Contrast Enhancement
A Review on Reversible Data Hiding Scheme by Image Contrast Enhancement
IJERA Editor
 
A Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted ImagesA Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted Images
ijsrd.com
 
A comparative case study on the various techniques of reversible data hiding
A comparative case study on the various techniques of reversible data hidingA comparative case study on the various techniques of reversible data hiding
A comparative case study on the various techniques of reversible data hiding
IJLT EMAS
 
Ensuring Distributed Accountability for Data Sharing Using Reversible Data Hi...
Ensuring Distributed Accountability for Data Sharing Using Reversible Data Hi...Ensuring Distributed Accountability for Data Sharing Using Reversible Data Hi...
Ensuring Distributed Accountability for Data Sharing Using Reversible Data Hi...
IOSR Journals
 
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET Journal
 
Secured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
Secured Reversible Data Hiding In Encrypted Images Using Hyper ChaosSecured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
Secured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
CSCJournals
 
Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...
Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...
Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...
IRJET Journal
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
ijsrd.com
 
IRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data HidingIRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data Hiding
IRJET Journal
 
An Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile CommunicationAn Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile Communication
iosrjce
 
Paper id 212014145
Paper id 212014145Paper id 212014145
Paper id 212014145
IJRAT
 
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams.pdf
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams.pdfNew Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams.pdf
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams.pdf
Xevol1
 
Dft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of imagesDft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of images
eSAT Journals
 
Dft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of imagesDft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of images
eSAT Publishing House
 
Scalable Image Encryption Based Lossless Image Compression
Scalable Image Encryption Based Lossless Image CompressionScalable Image Encryption Based Lossless Image Compression
Scalable Image Encryption Based Lossless Image Compression
IJERA Editor
 
A Review on Reversible Data Hiding Scheme by Image Contrast Enhancement
A Review on Reversible Data Hiding Scheme by Image Contrast EnhancementA Review on Reversible Data Hiding Scheme by Image Contrast Enhancement
A Review on Reversible Data Hiding Scheme by Image Contrast Enhancement
IJERA Editor
 
Ad

More from International Journal of Technical Research & Application (20)

STUDY & PERFORMANCE OF METAL ON METAL HIP IMPLANTS: A REVIEW
STUDY & PERFORMANCE OF METAL ON METAL HIP IMPLANTS: A REVIEWSTUDY & PERFORMANCE OF METAL ON METAL HIP IMPLANTS: A REVIEW
STUDY & PERFORMANCE OF METAL ON METAL HIP IMPLANTS: A REVIEW
International Journal of Technical Research & Application
 
EXPONENTIAL SMOOTHING OF POSTPONEMENT RATES IN OPERATION THEATRES OF ADVANCED...
EXPONENTIAL SMOOTHING OF POSTPONEMENT RATES IN OPERATION THEATRES OF ADVANCED...EXPONENTIAL SMOOTHING OF POSTPONEMENT RATES IN OPERATION THEATRES OF ADVANCED...
EXPONENTIAL SMOOTHING OF POSTPONEMENT RATES IN OPERATION THEATRES OF ADVANCED...
International Journal of Technical Research & Application
 
POSTPONEMENT OF SCHEDULED GENERAL SURGERIES IN A TERTIARY CARE HOSPITAL - A T...
POSTPONEMENT OF SCHEDULED GENERAL SURGERIES IN A TERTIARY CARE HOSPITAL - A T...POSTPONEMENT OF SCHEDULED GENERAL SURGERIES IN A TERTIARY CARE HOSPITAL - A T...
POSTPONEMENT OF SCHEDULED GENERAL SURGERIES IN A TERTIARY CARE HOSPITAL - A T...
International Journal of Technical Research & Application
 
STUDY OF NANO-SYSTEMS FOR COMPUTER SIMULATIONS
STUDY OF NANO-SYSTEMS FOR COMPUTER SIMULATIONSSTUDY OF NANO-SYSTEMS FOR COMPUTER SIMULATIONS
STUDY OF NANO-SYSTEMS FOR COMPUTER SIMULATIONS
International Journal of Technical Research & Application
 
ENERGY GAP INVESTIGATION AND CHARACTERIZATION OF KESTERITE CU2ZNSNS4 THIN FIL...
ENERGY GAP INVESTIGATION AND CHARACTERIZATION OF KESTERITE CU2ZNSNS4 THIN FIL...ENERGY GAP INVESTIGATION AND CHARACTERIZATION OF KESTERITE CU2ZNSNS4 THIN FIL...
ENERGY GAP INVESTIGATION AND CHARACTERIZATION OF KESTERITE CU2ZNSNS4 THIN FIL...
International Journal of Technical Research & Application
 
POD-PWM BASED CAPACITOR CLAMPED MULTILEVEL INVERTER
POD-PWM BASED CAPACITOR CLAMPED MULTILEVEL INVERTERPOD-PWM BASED CAPACITOR CLAMPED MULTILEVEL INVERTER
POD-PWM BASED CAPACITOR CLAMPED MULTILEVEL INVERTER
International Journal of Technical Research & Application
 
DIGITAL COMPRESSING OF A BPCM SIGNAL ACCORDING TO BARKER CODE USING FPGA
DIGITAL COMPRESSING OF A BPCM SIGNAL ACCORDING TO BARKER CODE USING FPGADIGITAL COMPRESSING OF A BPCM SIGNAL ACCORDING TO BARKER CODE USING FPGA
DIGITAL COMPRESSING OF A BPCM SIGNAL ACCORDING TO BARKER CODE USING FPGA
International Journal of Technical Research & Application
 
MODELLING THE IMPACT OF FLOODING USING GEOGRAPHIC INFORMATION SYSTEM AND REMO...
MODELLING THE IMPACT OF FLOODING USING GEOGRAPHIC INFORMATION SYSTEM AND REMO...MODELLING THE IMPACT OF FLOODING USING GEOGRAPHIC INFORMATION SYSTEM AND REMO...
MODELLING THE IMPACT OF FLOODING USING GEOGRAPHIC INFORMATION SYSTEM AND REMO...
International Journal of Technical Research & Application
 
AN EXPERIMENTAL STUDY ON SEPARATION OF WATER FROM THE ATMOSPHERIC AIR
AN EXPERIMENTAL STUDY ON SEPARATION OF WATER FROM THE ATMOSPHERIC AIRAN EXPERIMENTAL STUDY ON SEPARATION OF WATER FROM THE ATMOSPHERIC AIR
AN EXPERIMENTAL STUDY ON SEPARATION OF WATER FROM THE ATMOSPHERIC AIR
International Journal of Technical Research & Application
 
LI-ION BATTERY TESTING FROM MANUFACTURING TO OPERATION PROCESS
LI-ION BATTERY TESTING FROM MANUFACTURING TO OPERATION PROCESSLI-ION BATTERY TESTING FROM MANUFACTURING TO OPERATION PROCESS
LI-ION BATTERY TESTING FROM MANUFACTURING TO OPERATION PROCESS
International Journal of Technical Research & Application
 
QUALITATIVE RISK ASSESSMENT AND MITIGATION MEASURES FOR REAL ESTATE PROJECTS ...
QUALITATIVE RISK ASSESSMENT AND MITIGATION MEASURES FOR REAL ESTATE PROJECTS ...QUALITATIVE RISK ASSESSMENT AND MITIGATION MEASURES FOR REAL ESTATE PROJECTS ...
QUALITATIVE RISK ASSESSMENT AND MITIGATION MEASURES FOR REAL ESTATE PROJECTS ...
International Journal of Technical Research & Application
 
SCOPE OF REPLACING FINE AGGREGATE WITH COPPER SLAG IN CONCRETE- A REVIEW
SCOPE OF REPLACING FINE AGGREGATE WITH COPPER SLAG IN CONCRETE- A REVIEWSCOPE OF REPLACING FINE AGGREGATE WITH COPPER SLAG IN CONCRETE- A REVIEW
SCOPE OF REPLACING FINE AGGREGATE WITH COPPER SLAG IN CONCRETE- A REVIEW
International Journal of Technical Research & Application
 
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKINGIMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
International Journal of Technical Research & Application
 
EFFECT OF TRANS-SEPTAL SUTURE TECHNIQUE VERSUS NASAL PACKING AFTER SEPTOPLASTY
EFFECT OF TRANS-SEPTAL SUTURE TECHNIQUE VERSUS NASAL PACKING AFTER SEPTOPLASTYEFFECT OF TRANS-SEPTAL SUTURE TECHNIQUE VERSUS NASAL PACKING AFTER SEPTOPLASTY
EFFECT OF TRANS-SEPTAL SUTURE TECHNIQUE VERSUS NASAL PACKING AFTER SEPTOPLASTY
International Journal of Technical Research & Application
 
EVALUATION OF DRAINAGE WATER QUALITY FOR IRRIGATION BY INTEGRATION BETWEEN IR...
EVALUATION OF DRAINAGE WATER QUALITY FOR IRRIGATION BY INTEGRATION BETWEEN IR...EVALUATION OF DRAINAGE WATER QUALITY FOR IRRIGATION BY INTEGRATION BETWEEN IR...
EVALUATION OF DRAINAGE WATER QUALITY FOR IRRIGATION BY INTEGRATION BETWEEN IR...
International Journal of Technical Research & Application
 
THE CONSTRUCTION PROCEDURE AND ADVANTAGE OF THE RAIL CABLE-LIFTING CONSTRUCTI...
THE CONSTRUCTION PROCEDURE AND ADVANTAGE OF THE RAIL CABLE-LIFTING CONSTRUCTI...THE CONSTRUCTION PROCEDURE AND ADVANTAGE OF THE RAIL CABLE-LIFTING CONSTRUCTI...
THE CONSTRUCTION PROCEDURE AND ADVANTAGE OF THE RAIL CABLE-LIFTING CONSTRUCTI...
International Journal of Technical Research & Application
 
TIME EFFICIENT BAYLIS-HILLMAN REACTION ON STEROIDAL NUCLEUS OF WITHAFERIN-A T...
TIME EFFICIENT BAYLIS-HILLMAN REACTION ON STEROIDAL NUCLEUS OF WITHAFERIN-A T...TIME EFFICIENT BAYLIS-HILLMAN REACTION ON STEROIDAL NUCLEUS OF WITHAFERIN-A T...
TIME EFFICIENT BAYLIS-HILLMAN REACTION ON STEROIDAL NUCLEUS OF WITHAFERIN-A T...
International Journal of Technical Research & Application
 
A STUDY ON THE FRESH PROPERTIES OF SCC WITH FLY ASH
A STUDY ON THE FRESH PROPERTIES OF SCC WITH FLY ASHA STUDY ON THE FRESH PROPERTIES OF SCC WITH FLY ASH
A STUDY ON THE FRESH PROPERTIES OF SCC WITH FLY ASH
International Journal of Technical Research & Application
 
AN INSIDE LOOK IN THE ELECTRICAL STRUCTURE OF THE BATTERY MANAGEMENT SYSTEM T...
AN INSIDE LOOK IN THE ELECTRICAL STRUCTURE OF THE BATTERY MANAGEMENT SYSTEM T...AN INSIDE LOOK IN THE ELECTRICAL STRUCTURE OF THE BATTERY MANAGEMENT SYSTEM T...
AN INSIDE LOOK IN THE ELECTRICAL STRUCTURE OF THE BATTERY MANAGEMENT SYSTEM T...
International Journal of Technical Research & Application
 
OPEN LOOP ANALYSIS OF CASCADED HBRIDGE MULTILEVEL INVERTER USING PDPWM FOR PH...
OPEN LOOP ANALYSIS OF CASCADED HBRIDGE MULTILEVEL INVERTER USING PDPWM FOR PH...OPEN LOOP ANALYSIS OF CASCADED HBRIDGE MULTILEVEL INVERTER USING PDPWM FOR PH...
OPEN LOOP ANALYSIS OF CASCADED HBRIDGE MULTILEVEL INVERTER USING PDPWM FOR PH...
International Journal of Technical Research & Application
 

Recently uploaded (20)

ML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdf
ML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdfML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdf
ML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdf
rameshwarchintamani
 
Lecture - 7 Canals of the topic of the civil engineering
Lecture - 7  Canals of the topic of the civil engineeringLecture - 7  Canals of the topic of the civil engineering
Lecture - 7 Canals of the topic of the civil engineering
MJawadkhan1
 
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
PawachMetharattanara
 
Using the Artificial Neural Network to Predict the Axial Strength and Strain ...
Using the Artificial Neural Network to Predict the Axial Strength and Strain ...Using the Artificial Neural Network to Predict the Axial Strength and Strain ...
Using the Artificial Neural Network to Predict the Axial Strength and Strain ...
Journal of Soft Computing in Civil Engineering
 
Artificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptxArtificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptx
rakshanatarajan005
 
Nanometer Metal-Organic-Framework Literature Comparison
Nanometer Metal-Organic-Framework  Literature ComparisonNanometer Metal-Organic-Framework  Literature Comparison
Nanometer Metal-Organic-Framework Literature Comparison
Chris Harding
 
Modelling of Concrete Compressive Strength Admixed with GGBFS Using Gene Expr...
Modelling of Concrete Compressive Strength Admixed with GGBFS Using Gene Expr...Modelling of Concrete Compressive Strength Admixed with GGBFS Using Gene Expr...
Modelling of Concrete Compressive Strength Admixed with GGBFS Using Gene Expr...
Journal of Soft Computing in Civil Engineering
 
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjjseninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
AjijahamadKhaji
 
Control Methods of Noise Pollutions.pptx
Control Methods of Noise Pollutions.pptxControl Methods of Noise Pollutions.pptx
Control Methods of Noise Pollutions.pptx
vvsasane
 
Water Industry Process Automation & Control Monthly May 2025
Water Industry Process Automation & Control Monthly May 2025Water Industry Process Automation & Control Monthly May 2025
Water Industry Process Automation & Control Monthly May 2025
Water Industry Process Automation & Control
 
SICPA: Fabien Keller - background introduction
SICPA: Fabien Keller - background introductionSICPA: Fabien Keller - background introduction
SICPA: Fabien Keller - background introduction
fabienklr
 
acid base ppt and their specific application in food
acid base ppt and their specific application in foodacid base ppt and their specific application in food
acid base ppt and their specific application in food
Fatehatun Noor
 
Personal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.pptPersonal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.ppt
ganjangbegu579
 
David Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry - Specializes In AWS, Microservices And Python.pdfDavid Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry
 
Design of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdfDesign of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdf
Kamel Farid
 
Automatic Quality Assessment for Speech and Beyond
Automatic Quality Assessment for Speech and BeyondAutomatic Quality Assessment for Speech and Beyond
Automatic Quality Assessment for Speech and Beyond
NU_I_TODALAB
 
Slide share PPT of NOx control technologies.pptx
Slide share PPT of  NOx control technologies.pptxSlide share PPT of  NOx control technologies.pptx
Slide share PPT of NOx control technologies.pptx
vvsasane
 
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
ijflsjournal087
 
Frontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend EngineersFrontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend Engineers
Michael Hertzberg
 
Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...
Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...
Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...
Journal of Soft Computing in Civil Engineering
 
ML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdf
ML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdfML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdf
ML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdf
rameshwarchintamani
 
Lecture - 7 Canals of the topic of the civil engineering
Lecture - 7  Canals of the topic of the civil engineeringLecture - 7  Canals of the topic of the civil engineering
Lecture - 7 Canals of the topic of the civil engineering
MJawadkhan1
 
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
PawachMetharattanara
 
Artificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptxArtificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptx
rakshanatarajan005
 
Nanometer Metal-Organic-Framework Literature Comparison
Nanometer Metal-Organic-Framework  Literature ComparisonNanometer Metal-Organic-Framework  Literature Comparison
Nanometer Metal-Organic-Framework Literature Comparison
Chris Harding
 
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjjseninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
AjijahamadKhaji
 
Control Methods of Noise Pollutions.pptx
Control Methods of Noise Pollutions.pptxControl Methods of Noise Pollutions.pptx
Control Methods of Noise Pollutions.pptx
vvsasane
 
SICPA: Fabien Keller - background introduction
SICPA: Fabien Keller - background introductionSICPA: Fabien Keller - background introduction
SICPA: Fabien Keller - background introduction
fabienklr
 
acid base ppt and their specific application in food
acid base ppt and their specific application in foodacid base ppt and their specific application in food
acid base ppt and their specific application in food
Fatehatun Noor
 
Personal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.pptPersonal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.ppt
ganjangbegu579
 
David Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry - Specializes In AWS, Microservices And Python.pdfDavid Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry
 
Design of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdfDesign of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdf
Kamel Farid
 
Automatic Quality Assessment for Speech and Beyond
Automatic Quality Assessment for Speech and BeyondAutomatic Quality Assessment for Speech and Beyond
Automatic Quality Assessment for Speech and Beyond
NU_I_TODALAB
 
Slide share PPT of NOx control technologies.pptx
Slide share PPT of  NOx control technologies.pptxSlide share PPT of  NOx control technologies.pptx
Slide share PPT of NOx control technologies.pptx
vvsasane
 
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
ijflsjournal087
 
Frontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend EngineersFrontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend Engineers
Michael Hertzberg
 

REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE ENCRYPTION TECHNIQUE AND LSB MATCHING ALGORITHM

  • 1. International Journal of Technical Research and Applications e-ISSN: 2320-8163, www.ijtra.com Volume 3, Issue 3 (May-June 2015), PP. 52-54 52 | P a g e REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE ENCRYPTION TECHNIQUE AND LSB MATCHING ALGORITHM Harshali Sanglikar1, Neha Jadhav2, Pawankumar Thorat3, Rubeena Khan4 Department of Computer engineering Modern Education Society’s college of engineering Savitribai Phule Pune University, Pune [email protected], [email protected], [email protected] [email protected] Abstract:- In recent years the topic of steganography has become very popular and a lot of research is being done in this field. Reversible data hiding is a method in which the image in which the encrypted data is hidden is losslessly recovered. In this paper we have proposed such a method that the previous work done limitations can be overcome. In this paper, we embed the encrypted data in the image by using LSB matching technique for reserving room, so that fast, optimal and lossless steganography is achieved. The proposed method provides total reversibility, that is, data extraction and image recovery. Index terms- reversible data hiding, encryption, data hiding and extraction. I. INTRODUCTION The basic concept of steganography is to hide the very presence of communication by embedding message into innocuous-looking cover objects. Reversible data hiding is a method to hide (embed) additional message into some distortion free unacceptable cover media. It is needed in the fields such as military or medical images, with a reversible manner are use so that the original cover content can be perfectly recovered after extraction of the hidden message[1]. In[1][3][5], separable reversible data hiding technique a user or content owner encrypts the original carrier image then a data hider compress the image to create space to for accommodation of some additional data. However, in[4] some circumstances if the user (content owner) does not trust the service provider then he may encrypt it (secret data) when it is to be transmitted ted, channel provider without any knowledge of the cryptographic key may compress the encrypted data due to the limited channel resource[2]. Data hiding is referred to as a process to hide data or embed data, i.e, the data embedding process links two sets, a set of the embedded data and another set of the carrier media or cover media data. In most cases of data hiding, the cover media or carrier image becomes distorted due to data hiding and cannot be inverted back to the original image as it was before. That is, media has permanent distortion even after the embedded data have been removed. In some applications, such as medical diagnosis and law enforcement it is desired that the original cover media can be recovered efficiently with no loss.[7][8][9] The marking techniques satisfying this requirement are referred to as reversible, lossless, distortion free or invertible data hiding techniques. The separable means which is able to separate, in other words, we can separate the some things, activities using suitable criteria is as said. Separable reversible data hiding concept is the separation of activities i.e. extraction of original cover image and extraction of payload. Separable data hiding key is the separation that exists according to keys. Here at the receiver side, there are three different cases are encountered ie image recover, data extraction and data decryption. There are several methods for data hiding in images available now, but most of them are not reversible in nature. In [1] paper method to achieve pure recovery of image and data is proposed. Thus here gives same importance for both image and data. In the Existing System, Reserving Room before Encryption technique is following. As losslessly reserving room in the encrypted images is relatively difficult and sometimes inefficient, but still we are so obsessed to find novel RDH techniques working directly for Encrypted Images. The method is of compressing the encrypted LSBs to reserve room for additional data by finding syndromes of a parity check matrix, and the side information used at the receiver side is also the spatial correlation of decrypted images. All the three methods try to vacate room from the encrypted images directly. II. PROPOSED SYSTEM In proposed method can achieve real reversibility, that is, data extraction and image recovery are free of any error. If we reverse the order of encryption and vacating room, i.e., reserving room prior to image encryption at content owner side, the RDH tasks in encrypted images would be more natural and much easier which leads us to the novel framework, “reserving room before encryption (RRBE)”. Not only does the proposed method separate data extraction from image decryption but also achieves excellent performance in two different prospects. Real reversibility is realized, that is, data extraction and image recovery are free of any error. For given embedding rates, the PSNRs of decrypted image containing the embedded data are significantly improved; and for the acceptable PSNR, the range of embedding rates is greatly enlarged. The proposed method allows us to use any format of the image in which we want to store data i.e jpeg, png, bmp etc. The method allows us to use any format of data file i.e pdf,docx, etc. A. Encrypted Image Generation In this module, to construct the encrypted image, the first stage can be divided into two steps. Image Partition and Self Reversible Embedding followed by image encryption. At the beginning, image partition step divides original image into two parts and then, the LSBs of the least dominant channels in the image are reversibly embedded into the dominant colour channel with a standard RDH algorithm so that LSBs of can be
  • 2. International Journal of Technical Research and Applications e-ISSN: 2320-8163, www.ijtra.com Volume 3, Issue 3 (May-June 2015), PP. 52-54 53 | P a g e used for accommodating messages; at last, encrypt the rearranged image to generate its final version. B. Data hiding in encrypted image In this module, a content owner encrypts the original image using a standard cipher with an encryption key. After producing the encrypted image, the content owner hands over it to a data hider (e.g., a database manager) and the data hider can embed some auxiliary data into the encrypted image by lossless vacating some room according to a data hiding key. Then a receiver, maybe the content owner himself or an authorized third party can extract the embedded data with the data hiding key and further recover the original image from the encrypted version according to the encryption key. C. Data extraction and image recovery In this module, Extracting Data from Encrypted Images to manage and update personal information of images which are encrypted for protecting clients’ privacy, an inferior database manager may only get access to the data hiding key and have to manipulate data in encrypted domain. When the database manager gets the data hiding key, he can decrypt and extract the additional data by directly reading the decrypted version. When requesting for updating information of encrypted images, the database manager, then, updates information through LSB replacement and encrypts up dated information according to the data hiding key all over again. As the whole process is entirely operated on encrypted domain, it avoids the leakage of original content. D. Data extraction and image restoration In this module, after generating the marked decrypted image, the content owner can further extract the data and recover original image. Reversible hiding allows extraction of the original host signal and also the embedded message. There are two important requirements for reversible data hiding techniques: the embedding capacity should be large; and distortion should be low. These two requirements conflict with each other. In general, a higher embedding capacity results in a higher degree of distortion. An improved technique embeds the same capacity with lower distortion or vice versa. For the image restoration we have to follow the specified steps by which we can easily recover the original image. After the image encryption the image must be considered as an individual unit of work so we can fully concentrate on the watermarking technique and proceed further III. AES ALGORITHM The Advanced Encryption Standard (AES) specifies a FIPS-approved cryptographic algorithm that can be used to protect electronic data. The AES algorithm is a symmetric block cipher that can encrypt (encipher) and decrypt (decipher) information. Encryption converts data to an unintelligible form called ciphertext; decrypting the ciphertext converts the data back into its original form, called plaintext. The AES algorithm is capable of using cryptographic keys of 128, 192, and 256 bits to encrypt and decrypt data in blocks of 128 bits. The AES algorithm is based on permutations and substitutions. Permutations are rearrangements of data, and substitutions replace one unit of data with another. AES performs permutations and substitutions using several different techniques. In our system we are using 128 bit key and in AES this is represented by Nb = 4, which reflects the number of 32-bit words (number of columns) in the State. The length of the Cipher Key, K, is 128. The key length is represented by Nk = 4, 6, or 8, which reflects the number of 32-bit words (number of columns) in the Cipher Key. The number of rounds to be performed during the execution of the algorithm is dependent on the key size. The number of rounds is represented by Nr, where Nr = 10 when Nk = 4, Nr = 12 when Nk = 6, and Nr = 14 when Nk = 8. For both its Cipher and Inverse Cipher, the AES Algorithm uses a round function that is composed of four different byte-oriented transformations: 1) Substitution using a substitution table (S-box). 2) Shifting rows of the State array by different offsets 3) Mixing the data within each column of the State Array 4) Adding a Round Key to the State. IV. LSB MATCHING ALGORITHM Least Significant Bit Embedding’s (LSB) are a general stenographic technique that may be employed to embed data into a variety of digital media, but one of the most studied applications is using LSB embedding to hide one image inside another. In our system we are using LSB matching algorithm for embedding data in the image. For embedding data in the image we first find the dominant channel in the image. The dominant channel is basically the colour which is most present in the image. The other two channels that are present in the image are used for storing the data in the image. Before storing the data in the image we reserve room that is we store the values of the least dominant channels LSB’s in the dominant channel by EXORing them. The space for storing the data in the image is now reserved. The data that is to be stored in the image is first compared with the LSBs of the image’s least dominant channel, if the values are same then the bits are kept as it is and if there is a mismatch then the values are replaced. Thus the algorithm saves a lot of computation time and also is overcoming the abruptly replacing the LSB bits of the image. V. FEATURES OF SYSTEM A. Three Keys for more Data Security Encrypted data is hidden in Encrypted Image with separate keys for Data Encryption, Image Encryption and Data Hiding. For decrypting of data receiver should have both Data Encryption and Data hiding key. B. Protection for auto generated keys To perform any operation the user has only 3 attempts. If user is fail to perform any of operation means user enter wrong 3 times then the system is goes to not responding state and one mail with receiver computer IP address is send to the admin. C. Allows any type of data or image file The system can work on any format of data file like .pdf, .docx, .rtf etc and any format of image file like .jpeg, .bmp, .png etc. D. Allows large data files to be encrypted The system allows very large size of data file to be encrypted easily as we are storing the image in the image file. If we want to store large size data in the image we would have to take a bigger image to store that much amount of data in it. E. Faster computation time The use of multithreading allows faster computation both while image encryption and decryption.
  • 3. International Journal of Technical Research and Applications e-ISSN: 2320-8163, www.ijtra.com Volume 3, Issue 3 (May-June 2015), PP. 52-54 54 | P a g e AES flow chart Illustration of image partitioning and embedding process VI. CONCLUSION Reversible data hiding in encrypted images is a new topic drawing attention because of the privacy-preserving requirements from cloud data management. Previous methods implement RDH in encrypted images by vacating room after encryption, as opposed to which we proposed by reserving room before encryption. Thus the data hider can benefit from the extra space emptied out in previous stage to make data hiding process effortless. The proposed method can take advantage of all traditional RDH techniques for plain images and achieve excellent performance without loss of perfect secrecy. Furthermore, by this novel method can achieve reversibility as well as separate data extraction and greatly improvement on the quality of marked decrypted images REFERENCES [1] Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption Kede Ma, Weiming Zhang, Xianfeng Zhao, Member, IEEE, Nenghai Yu, and Fenghua Li MARCH 2013 [2] W. Zhang, B. Chen, and N. Yu, “Capacity-approaching codes for reversible data hiding,” in Proc 13th Information Hiding (IH’2011), LNCS 6958, 2011, pp. 255–269, Springer-Verlag. [3] W. Zhang, B. Chen, and N. Yu, “Improving various reversible data hiding schemes via optimal codes for binary covers,” IEEE Trans. Image Process., vol. 21, no. 6, pp. 2991–3003, Jun. 2012. [4] J. Fridrich and M. Goljan, “Lossless data embedding for all image formats,” in Proc. SPIE Proc. Photonics West, Electronic Imaging, Security and Watermarking of Multimedia Contents, San Jose, CA, USA, Jan. 2002, vol. 4675, pp. 572–583. [5] J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896, Aug. 2003. [6] Z. Ni, Y. Shi, N. Ansari, and S. Wei, “Reversible data hiding,” IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354–362, Mar.2006. [7] D.M. Thodi and J. J. Rodriguez, “Expansion embedding techniques for reversible watermarking,” IEEE Trans. Image Process., vol. 16, no. 3, pp. 721–730, Mar. 2007. [8] X. L. Li, B. Yang, and T. Y. Zeng, “Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection,” IEEE Trans. Image Process., vol. 20, no. 12, pp. 3524–3533, Dec. 2011. [9] P. Tsai, Y. C. Hu, and H. L. Yeh, “Reversible image hiding scheme using predictive coding and histogram shifting,” Signal Process., vol. 89, pp. 1129–1143, 2009. [10] L. Luo et al., “Reversible imagewatermarking using interpolation technique,” IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 187–193, Mar. 2010. [11] V. Sachnev, H. J. Kim, J. Nam, S. Suresh, and Y.-Q. Shi, “Reversible watermarking algorithm using sorting and prediction,” IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 7, pp. 989–999, Jul. 2009. [12] A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography. Boca Raton, FL, USA: CRC, 1996. [13] K. Hwang and D. Li, “Trusted cloud computing with secure resources and data coloring,” IEEE Internet Comput., vol. 14, no. 5, pp. 14–22, Sep./Oct. 2010. [14] M. Johnson, P. Ishwar, V. M. Prabhakaran, D. Schonberg, and K. Ramchandran, “On compressing encrypted data,” IEEE Trans. Signal Process., vol. 52, no. 10, pp. 2992– 3006, Oct. 2004.