SlideShare une entreprise Scribd logo
1  sur  23
Optimized Reversible Data Hiding Technique for
Secured Data Transmission
Guide:- Submitted by:
Himanshu bal
Department of Information Technology
2015-2016
TE(IT)seminar 14/3/2016 pgno.1 slideno. 1
PROBLEM DEFINITION
Discussing a solution for reversible data hiding by optimizing the
techniques presently available for secured data transmission.
TE(IT)seminar 14/3/2016 pgno.1 slideno. 2
Optimized Reversible Data Hiding Technique for Secured Data Transmission
OBJECTIVE:
1. Generate an optimized reversible data hiding technique to overcome the issues in
current RHD trends like:
1. Low embedding capacity
2. High distortion rate etc.
3. Low utilization of 2D histogram
TE(IT)seminar 14/3/2016 pgno. 1 slideno. 3
Optimized Reversible Data Hiding Technique for Secured Data Transmission
INTRODUCTION
1. Steganography is the art or practice of concealing a message, image, or file
within another message, image, or file.
2. The word steganography combines the Ancient Greek words steganos, meaning
"covered, concealed, or protected”.
3. One of its application is Reversible data hiding (RHD).
4. Reversible data hiding (RDH) is used to embed secret message into a cover image
by slightly modifying its pixel values.
TE(IT)seminar 14/3/2016 pgno. 1 slideno.4
Optimized Reversible Data Hiding Technique for Secured Data Transmission
WHY STEGANOGRAPHY
OVER
CRYPTOGRAPHY????
TE(IT)seminar 14/3/2016 pgno.2 slideno.5
Optimized Reversible Data Hiding Technique for Secured Data Transmission
LITERATURE SURVEY
DIFFERENT RDH METHODS:
1. Tian's method of LSB (2003). J. Tian, Reversible data embedding using a difference
expansion, IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–
896,Aug.2003
2. Ni et al’s method of histogram shifting (2006). Reversible image watermarking on
prediction errors by efficient histogram modification, Signal Process., vol. 92,no. 12,
pp. 3000–3009, Dec. 2006.
3. Thodi and Rodriguez hybrid method (2012). , “A Novel Reversible Data Hiding
Scheme Based on Two-Dimensional Difference-Histogram Modification”, IEEE
Transactions on Information Forensics and Security, July 2012.
TE(IT)seminar 14/3/2016 pgno.2 slideno.6
Optimized Reversible Data Hiding Technique for Secured Data Transmission
RELATED WORKS
TE(IT)seminar 14/3/2016 pgno.2 slideno. 7
Optimized Reversible Data Hiding Technique for Secured Data Transmission
NE ET AL’S METHOD OF HISTOGRAM
SHIFTING
1. The method modifies the pixel-pairs with differences 1 or -1 to carry data.
2. For data embedding, the difference image is first computed for a gray-scale cover
image using formula :
D(i,j) = I(i, 2j + 1) – I(i, 2j)
3. Then marked image is obtained as
TE(IT)seminar 14/3/2016 pgno.3 slideno.8
Optimized Reversible Data Hiding Technique for Secured Data Transmission
NE ET AL’S METHOD OF HISTOGRAM
SHIFTING contd.
1.Then the information bits can be extracted as
2.And finally the original picture can be recovered
3.Here the difference Dm(i,j) = Im(i,2j+1) – Im(i, 2j) is the difference value
computed from the marked image.
TE(IT)seminar 14/3/2016 pgno. 3 slideno. 9
Optimized Reversible Data Hiding Technique for Secured Data Transmission
b=
0, if Dm(i,j)=-1
1, if Dm(i,j)=+1
NOW LETS’S COME TO OUR NEW
ENHANCED METHOD
TE(IT)seminar 14/3/2016 pgno.4 slideno.10
Optimized Reversible Data Hiding Technique for Secured Data Transmission
ARCHITECTURE FOR EMBEDDING
AND EXTRACTION
ARCHITECTURE FOR EMBEDDING ARCHITECTURE FOR EXTRACTION
TE(IT)seminar 14/3/2016 pgno. 4 slideno.11
Optimized Reversible Data Hiding Technique for Secured Data Transmission
WORKING OF HISTOGRAM SHIFTING
BASED RDH METHOD
THE HISTOGRAM SHIFTING BASED RHD METHOD REQUIRE FOUR
STEPS TO COMPLETE THE PROCESS:
1. Histogram shifting
2. Encoding process
3. Embedding process
4. Extraction process
TE(IT)seminar 14/3/2016 pgno. 5 slideno. 12
Optimized Reversible Data Hiding Technique for Secured Data Transmission
HISTOGRAM SHIFTING CONSISTS OF
FOLLOWING STEPS
1. Computing difference image for gray scale
2. Using histogram bins for expansion embedding
3. Modification of pixels
TE(IT)seminar 14/3/2016 pgno.5 slideno. 13
Optimized Reversible Data Hiding Technique for Secured Data Transmission
ENCODING PROCESS
1. Data compression.
2. Using run length encoding.
3. Counting the runs.
TE(IT)seminar 14/3/2016 pgno.5 slideno.14
Optimized Reversible Data Hiding Technique for Secured Data Transmission
EMBEDDING PROCESS
1. Dividing the host image into non overlapping blocks.
2. Using LSB replacement to embed the location mapping.
3. embed the LSB sequence Into using shifting and embedding functions
Illustration of the data embedding
TE(IT)seminar 14/3/2016 pgno.6 slideno. 15
Optimized Reversible Data Hiding Technique for Secured Data Transmission
WORKING PRINCIPLE FOR
EMBEDDING ANY TYPE OF MESSAGE
INFO HIDDEN
INFO
HIDDEN
INFO
STEGO
KEY
COVER
MEDIUM
STEGO
OUTPUT
TE(IT)seminar 14/3/2016 pgno.6 slideno. 16
Optimized Reversible Data Hiding Technique for Secured Data Transmission
EXTRACTION PROCESS
1. Dividing the marked image blocks.
2. determining the location map.
3. Extraction the embedded data.
TE(IT)seminar 14/3/2016 pgno.7 slideno.17
Optimized Reversible Data Hiding Technique for Secured Data Transmission
RESULTS OF HISTOGRAM METHOD
ORIGINAL IMAGE IMAGE AFTER EMBEDDING
HISTOGRAM BASED ON ORIGINAL IMAGE
SHIFTED AND EMBEDDED HISTOGRAM
TE(IT)seminar 14/3/2016 pgno.7 slideno. 18
Optimized Reversible Data Hiding Technique for Secured Data Transmission
PSNR VS EMBEDDING RATE
TE(IT)seminar 14/3/2016 pgno. 8 slideno.19
PERFORMANCE ANALYSIS
Optimized Reversible Data Hiding Technique for Secured Data Transmission
MOTIVATION
TE(IT)seminar 14/3/2016 pgno.8 slideno. 20
Optimized Reversible Data Hiding Technique for Secured Data Transmission
ADVANTAGES
1. The embedding capacity has been enhanced.
2. The distortion ration is reduced.
3. Better utilization of 2D histogram.
4. Better recovery of image.
TE(IT)seminar 14/3/2016 pgno. 9 slideno. 21
Optimized Reversible Data Hiding Technique for Secured Data Transmission
CONCLUSION
This algorithm can achieve a better performance compared with the
state-of-the-art works. So the proposed framework has a potential to
provide excellent RDH algorithms.
TE(IT)seminar 14/3/2016 pgno.11 slideno.22
Optimized Reversible Data Hiding Technique for Secured Data Transmission
TE(IT)seminar 14/3/2016 pgno. slideno. 23
Optimized Reversible Data Hiding Technique for Secured Data Transmission

Contenu connexe

Similaire à Reversible data hiding using histogram shifting method

IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET Journal
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganographysipij
 
Optimized Reversible Data Hiding Technique for Secured Data Transmission
Optimized Reversible Data Hiding Technique for Secured Data TransmissionOptimized Reversible Data Hiding Technique for Secured Data Transmission
Optimized Reversible Data Hiding Technique for Secured Data TransmissionEditor IJMTER
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Dr. Amarjeet Singh
 
An improved robust and secured image steganographic scheme
An improved robust and secured image steganographic schemeAn improved robust and secured image steganographic scheme
An improved robust and secured image steganographic schemeiaemedu
 
IJREAMV03I022640.pdf
IJREAMV03I022640.pdfIJREAMV03I022640.pdf
IJREAMV03I022640.pdfssusere02009
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYIRJET Journal
 
Using SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageUsing SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageCSCJournals
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesRick Vogel
 
FPGA implementation of data hiding in images
FPGA implementation of data hiding in imagesFPGA implementation of data hiding in images
FPGA implementation of data hiding in imagesPune University
 
B03208016
B03208016B03208016
B03208016inventy
 
Survey Paper on Steganography
Survey Paper on Steganography Survey Paper on Steganography
Survey Paper on Steganography IRJESJOURNAL
 
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET Journal
 
An image steganography using improved hyper-chaotic Henon map and fractal Tro...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...An image steganography using improved hyper-chaotic Henon map and fractal Tro...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...IJECEIAES
 
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET Journal
 
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Editor IJMTER
 

Similaire à Reversible data hiding using histogram shifting method (20)

IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
 
Ijariie1132
Ijariie1132Ijariie1132
Ijariie1132
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
 
Optimized Reversible Data Hiding Technique for Secured Data Transmission
Optimized Reversible Data Hiding Technique for Secured Data TransmissionOptimized Reversible Data Hiding Technique for Secured Data Transmission
Optimized Reversible Data Hiding Technique for Secured Data Transmission
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
 
An improved robust and secured image steganographic scheme
An improved robust and secured image steganographic schemeAn improved robust and secured image steganographic scheme
An improved robust and secured image steganographic scheme
 
IJREAMV03I022640.pdf
IJREAMV03I022640.pdfIJREAMV03I022640.pdf
IJREAMV03I022640.pdf
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
 
Ijetcas14 527
Ijetcas14 527Ijetcas14 527
Ijetcas14 527
 
Using SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageUsing SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG Image
 
Bp34412415
Bp34412415Bp34412415
Bp34412415
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
 
FPGA implementation of data hiding in images
FPGA implementation of data hiding in imagesFPGA implementation of data hiding in images
FPGA implementation of data hiding in images
 
Steganography
Steganography Steganography
Steganography
 
B03208016
B03208016B03208016
B03208016
 
Survey Paper on Steganography
Survey Paper on Steganography Survey Paper on Steganography
Survey Paper on Steganography
 
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
 
An image steganography using improved hyper-chaotic Henon map and fractal Tro...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...An image steganography using improved hyper-chaotic Henon map and fractal Tro...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...
 
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
 
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
 

Dernier

Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendArshad QA
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 

Dernier (20)

Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and Backend
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 

Reversible data hiding using histogram shifting method

  • 1. Optimized Reversible Data Hiding Technique for Secured Data Transmission Guide:- Submitted by: Himanshu bal Department of Information Technology 2015-2016 TE(IT)seminar 14/3/2016 pgno.1 slideno. 1
  • 2. PROBLEM DEFINITION Discussing a solution for reversible data hiding by optimizing the techniques presently available for secured data transmission. TE(IT)seminar 14/3/2016 pgno.1 slideno. 2 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  • 3. OBJECTIVE: 1. Generate an optimized reversible data hiding technique to overcome the issues in current RHD trends like: 1. Low embedding capacity 2. High distortion rate etc. 3. Low utilization of 2D histogram TE(IT)seminar 14/3/2016 pgno. 1 slideno. 3 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  • 4. INTRODUCTION 1. Steganography is the art or practice of concealing a message, image, or file within another message, image, or file. 2. The word steganography combines the Ancient Greek words steganos, meaning "covered, concealed, or protected”. 3. One of its application is Reversible data hiding (RHD). 4. Reversible data hiding (RDH) is used to embed secret message into a cover image by slightly modifying its pixel values. TE(IT)seminar 14/3/2016 pgno. 1 slideno.4 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  • 5. WHY STEGANOGRAPHY OVER CRYPTOGRAPHY???? TE(IT)seminar 14/3/2016 pgno.2 slideno.5 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  • 6. LITERATURE SURVEY DIFFERENT RDH METHODS: 1. Tian's method of LSB (2003). J. Tian, Reversible data embedding using a difference expansion, IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890– 896,Aug.2003 2. Ni et al’s method of histogram shifting (2006). Reversible image watermarking on prediction errors by efficient histogram modification, Signal Process., vol. 92,no. 12, pp. 3000–3009, Dec. 2006. 3. Thodi and Rodriguez hybrid method (2012). , “A Novel Reversible Data Hiding Scheme Based on Two-Dimensional Difference-Histogram Modification”, IEEE Transactions on Information Forensics and Security, July 2012. TE(IT)seminar 14/3/2016 pgno.2 slideno.6 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  • 7. RELATED WORKS TE(IT)seminar 14/3/2016 pgno.2 slideno. 7 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  • 8. NE ET AL’S METHOD OF HISTOGRAM SHIFTING 1. The method modifies the pixel-pairs with differences 1 or -1 to carry data. 2. For data embedding, the difference image is first computed for a gray-scale cover image using formula : D(i,j) = I(i, 2j + 1) – I(i, 2j) 3. Then marked image is obtained as TE(IT)seminar 14/3/2016 pgno.3 slideno.8 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  • 9. NE ET AL’S METHOD OF HISTOGRAM SHIFTING contd. 1.Then the information bits can be extracted as 2.And finally the original picture can be recovered 3.Here the difference Dm(i,j) = Im(i,2j+1) – Im(i, 2j) is the difference value computed from the marked image. TE(IT)seminar 14/3/2016 pgno. 3 slideno. 9 Optimized Reversible Data Hiding Technique for Secured Data Transmission b= 0, if Dm(i,j)=-1 1, if Dm(i,j)=+1
  • 10. NOW LETS’S COME TO OUR NEW ENHANCED METHOD TE(IT)seminar 14/3/2016 pgno.4 slideno.10 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  • 11. ARCHITECTURE FOR EMBEDDING AND EXTRACTION ARCHITECTURE FOR EMBEDDING ARCHITECTURE FOR EXTRACTION TE(IT)seminar 14/3/2016 pgno. 4 slideno.11 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  • 12. WORKING OF HISTOGRAM SHIFTING BASED RDH METHOD THE HISTOGRAM SHIFTING BASED RHD METHOD REQUIRE FOUR STEPS TO COMPLETE THE PROCESS: 1. Histogram shifting 2. Encoding process 3. Embedding process 4. Extraction process TE(IT)seminar 14/3/2016 pgno. 5 slideno. 12 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  • 13. HISTOGRAM SHIFTING CONSISTS OF FOLLOWING STEPS 1. Computing difference image for gray scale 2. Using histogram bins for expansion embedding 3. Modification of pixels TE(IT)seminar 14/3/2016 pgno.5 slideno. 13 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  • 14. ENCODING PROCESS 1. Data compression. 2. Using run length encoding. 3. Counting the runs. TE(IT)seminar 14/3/2016 pgno.5 slideno.14 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  • 15. EMBEDDING PROCESS 1. Dividing the host image into non overlapping blocks. 2. Using LSB replacement to embed the location mapping. 3. embed the LSB sequence Into using shifting and embedding functions Illustration of the data embedding TE(IT)seminar 14/3/2016 pgno.6 slideno. 15 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  • 16. WORKING PRINCIPLE FOR EMBEDDING ANY TYPE OF MESSAGE INFO HIDDEN INFO HIDDEN INFO STEGO KEY COVER MEDIUM STEGO OUTPUT TE(IT)seminar 14/3/2016 pgno.6 slideno. 16 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  • 17. EXTRACTION PROCESS 1. Dividing the marked image blocks. 2. determining the location map. 3. Extraction the embedded data. TE(IT)seminar 14/3/2016 pgno.7 slideno.17 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  • 18. RESULTS OF HISTOGRAM METHOD ORIGINAL IMAGE IMAGE AFTER EMBEDDING HISTOGRAM BASED ON ORIGINAL IMAGE SHIFTED AND EMBEDDED HISTOGRAM TE(IT)seminar 14/3/2016 pgno.7 slideno. 18 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  • 19. PSNR VS EMBEDDING RATE TE(IT)seminar 14/3/2016 pgno. 8 slideno.19 PERFORMANCE ANALYSIS Optimized Reversible Data Hiding Technique for Secured Data Transmission
  • 20. MOTIVATION TE(IT)seminar 14/3/2016 pgno.8 slideno. 20 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  • 21. ADVANTAGES 1. The embedding capacity has been enhanced. 2. The distortion ration is reduced. 3. Better utilization of 2D histogram. 4. Better recovery of image. TE(IT)seminar 14/3/2016 pgno. 9 slideno. 21 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  • 22. CONCLUSION This algorithm can achieve a better performance compared with the state-of-the-art works. So the proposed framework has a potential to provide excellent RDH algorithms. TE(IT)seminar 14/3/2016 pgno.11 slideno.22 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  • 23. TE(IT)seminar 14/3/2016 pgno. slideno. 23 Optimized Reversible Data Hiding Technique for Secured Data Transmission