SlideShare une entreprise Scribd logo
1  sur  6
Reversible Image Data Hiding with Contrast Enhancement
ABSTRACT:
In this letter, a novel reversible data hiding (RDH) algorithm is proposed for digital
images. Instead of trying to keep the PSNR value high, the proposed algorithm
enhances the contrast of a host image to improve its visual quality. The highest two
bins in the histogram are selected for data embedding so that histogram
equalization can be performed by repeating the process. The side information is
embedded along with the message bits into the host image so that the original
image is completely recoverable. The proposed algorithm was implemented on two
sets of images to demonstrate its efficiency. To our best knowledge, it is the first
algorithm that achieves image contrast enhancement by RDH. Furthermore, the
evaluation results show that the visual quality can be preserved after a considerable
amount of message bits have been embedded into the contrast-enhanced images,
even better than three specific MATLAB functions used for image contrast
enhancement.
EXISTING SYSTEM:
 Reversible Data Hiding (RDH) has been intensively studied in the
community of signal processing. Also referred as invertible or lossless data
hiding, RDH is to embed a piece of information into a host signal to generate
the marked one, from which the original signal can be exactly recovered
after extracting the embedded data.
 The technique of RDH is useful in some sensitive applications where no
permanent change is allowed on the host signal.
 In the literature, most of the proposed algorithms are for digital images to
embed invisible data or visible watermark. To evaluate the performance of a
RDH algorithm, the hiding rate and the marked image quality are important
metrics.
DISADVANTAGES OF EXISTING SYSTEM:
 There exists a trade-off between them because increasing the hiding
rate often causes more distortion in image content.
 To our best knowledge, there is no existing RDH algorithm that performs the
task of contrast enhancement so as to improve the visual quality of host
images.
 To measure the distortion, the peak signal-to-noise ratio (PSNR) value of the
marked image is often calculated. Generally speaking, direct modification of
image histogram provides less embedding capacity.
PROPOSED SYSTEM:
 In this project, we aim at inventing a new RDH algorithm to achieve the
property of contrast enhancement instead of just keeping the PSNR value
high. In principle, image contrast enhancement can be achieved by
histogram equalization.
 To perform data embedding and contrast enhancement at the same time, the
proposed algorithm is performed by modifying the histogram of pixel
values. Firstly, the two peaks (i.e. the highest two bins) in the histogram are
found out. The bins between the peaks are unchanged while the outer bins
are shifted outward so that each of the two peaks can be split into two
adjacent bins.
 To increase the embedding capacity, the highest two bins in the modified
histogram can be further chosen to be split, and so on until satisfactory
contrast enhancement effect is achieved. To avoid the overflows and under-
flows due to histogram modification, the bounding pixel values are pre-
processed and a location map is generated to memorize their locations. For
the recovery of the original image, the location map is embedded into the
host image, together with the message bits and other side information. So
blind data extraction and complete recovery of the original image are both
enabled.
ADVANTAGES OF PROPOSED SYSTEM:
 Distortion is less.
 To increase the embedding capacity.
 Increase visual quality.
 The proposed algorithm was applied to two set of images to demonstrate its
efficiency. To our best knowledge, it is the first algorithm that achieves
image contrast enhancement by RDH.
 Furthermore, the evaluation results show that the visual quality can be
preserved after a considerable amount of message bits have been embedded
into the contrast-enhanced images, even better than three specific MATLAB
functions used for image contrast enhancement.
SYSTEM ARCHITECTURE:
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb.
 Monitor : 15 VGA Colour.
 Mouse : Logitech.
 Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
 Operating system : Windows XP/7.
 Coding Language : MATLAB
 Tool : MATLAB R2013A
REFERENCE:
Hao-Tian Wu, Member, IEEE, Jean-Luc Dugelay, Fellow, IEEE, and Yun-Qing
Shi, Fellow, IEEE , “Reversible Image Data Hiding with Contrast Enhancement”,
IEEE SIGNAL PROCESSING LETTERS, VOL. 22, NO. 1, JANUARY 2015.

Contenu connexe

En vedette

Anna university-ug-pg-ppt-presentation-format
Anna university-ug-pg-ppt-presentation-formatAnna university-ug-pg-ppt-presentation-format
Anna university-ug-pg-ppt-presentation-format
Veera Victory
 
Report of design and development of multi purpose mechanical machine
Report of design and development of multi purpose mechanical machine Report of design and development of multi purpose mechanical machine
Report of design and development of multi purpose mechanical machine
Jitendra Jha
 
Final ppt of project
Final ppt of projectFinal ppt of project
Final ppt of project
Ruchi Gulati
 

En vedette (16)

MULTIPLE CROP CUTTING MACHINE
   MULTIPLE CROP CUTTING MACHINE   MULTIPLE CROP CUTTING MACHINE
MULTIPLE CROP CUTTING MACHINE
 
Microcontroller based digital code lock report 2
Microcontroller based digital code lock report 2Microcontroller based digital code lock report 2
Microcontroller based digital code lock report 2
 
Outsourcing And Cloud Computing
Outsourcing And Cloud ComputingOutsourcing And Cloud Computing
Outsourcing And Cloud Computing
 
Implementing agile iterative project delivery approach and achieving business...
Implementing agile iterative project delivery approach and achieving business...Implementing agile iterative project delivery approach and achieving business...
Implementing agile iterative project delivery approach and achieving business...
 
Password based door lock system using 8051 microcontroller final report
Password based door lock system using 8051 microcontroller final reportPassword based door lock system using 8051 microcontroller final report
Password based door lock system using 8051 microcontroller final report
 
Password Based Circuit Breaker
Password Based Circuit BreakerPassword Based Circuit Breaker
Password Based Circuit Breaker
 
Ppt 1
Ppt 1Ppt 1
Ppt 1
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
Anna university-ug-pg-ppt-presentation-format
Anna university-ug-pg-ppt-presentation-formatAnna university-ug-pg-ppt-presentation-format
Anna university-ug-pg-ppt-presentation-format
 
MECHANICAL PROJECT
MECHANICAL PROJECTMECHANICAL PROJECT
MECHANICAL PROJECT
 
Report of design and development of multi purpose mechanical machine
Report of design and development of multi purpose mechanical machine Report of design and development of multi purpose mechanical machine
Report of design and development of multi purpose mechanical machine
 
Lossless and reversible data hiding in encrypted images with public key crypt...
Lossless and reversible data hiding in encrypted images with public key crypt...Lossless and reversible data hiding in encrypted images with public key crypt...
Lossless and reversible data hiding in encrypted images with public key crypt...
 
Final ppt of project
Final ppt of projectFinal ppt of project
Final ppt of project
 
First Review(Ppt)
First Review(Ppt)First Review(Ppt)
First Review(Ppt)
 
Final Year Project Presentation
Final Year Project PresentationFinal Year Project Presentation
Final Year Project Presentation
 
REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE ENCRYPTIO...
REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE ENCRYPTIO...REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE ENCRYPTIO...
REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE ENCRYPTIO...
 

Plus de jpstudcorner

Plus de jpstudcorner (20)

Variable length signature for near-duplicate
Variable length signature for near-duplicateVariable length signature for near-duplicate
Variable length signature for near-duplicate
 
Robust representation and recognition of facial
Robust representation and recognition of facialRobust representation and recognition of facial
Robust representation and recognition of facial
 
Revealing the trace of high quality jpeg
Revealing the trace of high quality jpegRevealing the trace of high quality jpeg
Revealing the trace of high quality jpeg
 
Revealing the trace of high quality jpeg
Revealing the trace of high quality jpegRevealing the trace of high quality jpeg
Revealing the trace of high quality jpeg
 
Pareto depth for multiple-query image retrieval
Pareto depth for multiple-query image retrievalPareto depth for multiple-query image retrieval
Pareto depth for multiple-query image retrieval
 
Multifocus image fusion based on nsct
Multifocus image fusion based on nsctMultifocus image fusion based on nsct
Multifocus image fusion based on nsct
 
Image super resolution based on
Image super resolution based onImage super resolution based on
Image super resolution based on
 
Fractal analysis for reduced reference
Fractal analysis for reduced referenceFractal analysis for reduced reference
Fractal analysis for reduced reference
 
Face sketch synthesis via sparse representation based greedy search
Face sketch synthesis via sparse representation based greedy searchFace sketch synthesis via sparse representation based greedy search
Face sketch synthesis via sparse representation based greedy search
 
Face recognition across non uniform motion
Face recognition across non uniform motionFace recognition across non uniform motion
Face recognition across non uniform motion
 
Combining left and right palmprint images for
Combining left and right palmprint images forCombining left and right palmprint images for
Combining left and right palmprint images for
 
A probabilistic approach for color correction
A probabilistic approach for color correctionA probabilistic approach for color correction
A probabilistic approach for color correction
 
A no reference texture regularity metric
A no reference texture regularity metricA no reference texture regularity metric
A no reference texture regularity metric
 
A feature enriched completely blind image
A feature enriched completely blind imageA feature enriched completely blind image
A feature enriched completely blind image
 
Sel csp a framework to facilitate
Sel csp a framework to facilitateSel csp a framework to facilitate
Sel csp a framework to facilitate
 
Query aware determinization of uncertain
Query aware determinization of uncertainQuery aware determinization of uncertain
Query aware determinization of uncertain
 
Psmpa patient self controllable
Psmpa patient self controllablePsmpa patient self controllable
Psmpa patient self controllable
 
Privacy preserving and truthful detection
Privacy preserving and truthful detectionPrivacy preserving and truthful detection
Privacy preserving and truthful detection
 
Privacy policy inference of user uploaded
Privacy policy inference of user uploadedPrivacy policy inference of user uploaded
Privacy policy inference of user uploaded
 
Page a partition aware engine
Page a partition aware enginePage a partition aware engine
Page a partition aware engine
 

Dernier

"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 

Dernier (20)

A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Air Compressor reciprocating single stage
Air Compressor reciprocating single stageAir Compressor reciprocating single stage
Air Compressor reciprocating single stage
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 

Reversible image data hiding with

  • 1. Reversible Image Data Hiding with Contrast Enhancement ABSTRACT: In this letter, a novel reversible data hiding (RDH) algorithm is proposed for digital images. Instead of trying to keep the PSNR value high, the proposed algorithm enhances the contrast of a host image to improve its visual quality. The highest two bins in the histogram are selected for data embedding so that histogram equalization can be performed by repeating the process. The side information is embedded along with the message bits into the host image so that the original image is completely recoverable. The proposed algorithm was implemented on two sets of images to demonstrate its efficiency. To our best knowledge, it is the first algorithm that achieves image contrast enhancement by RDH. Furthermore, the evaluation results show that the visual quality can be preserved after a considerable amount of message bits have been embedded into the contrast-enhanced images, even better than three specific MATLAB functions used for image contrast enhancement. EXISTING SYSTEM:  Reversible Data Hiding (RDH) has been intensively studied in the community of signal processing. Also referred as invertible or lossless data
  • 2. hiding, RDH is to embed a piece of information into a host signal to generate the marked one, from which the original signal can be exactly recovered after extracting the embedded data.  The technique of RDH is useful in some sensitive applications where no permanent change is allowed on the host signal.  In the literature, most of the proposed algorithms are for digital images to embed invisible data or visible watermark. To evaluate the performance of a RDH algorithm, the hiding rate and the marked image quality are important metrics. DISADVANTAGES OF EXISTING SYSTEM:  There exists a trade-off between them because increasing the hiding rate often causes more distortion in image content.  To our best knowledge, there is no existing RDH algorithm that performs the task of contrast enhancement so as to improve the visual quality of host images.  To measure the distortion, the peak signal-to-noise ratio (PSNR) value of the marked image is often calculated. Generally speaking, direct modification of image histogram provides less embedding capacity.
  • 3. PROPOSED SYSTEM:  In this project, we aim at inventing a new RDH algorithm to achieve the property of contrast enhancement instead of just keeping the PSNR value high. In principle, image contrast enhancement can be achieved by histogram equalization.  To perform data embedding and contrast enhancement at the same time, the proposed algorithm is performed by modifying the histogram of pixel values. Firstly, the two peaks (i.e. the highest two bins) in the histogram are found out. The bins between the peaks are unchanged while the outer bins are shifted outward so that each of the two peaks can be split into two adjacent bins.  To increase the embedding capacity, the highest two bins in the modified histogram can be further chosen to be split, and so on until satisfactory contrast enhancement effect is achieved. To avoid the overflows and under- flows due to histogram modification, the bounding pixel values are pre- processed and a location map is generated to memorize their locations. For the recovery of the original image, the location map is embedded into the host image, together with the message bits and other side information. So
  • 4. blind data extraction and complete recovery of the original image are both enabled. ADVANTAGES OF PROPOSED SYSTEM:  Distortion is less.  To increase the embedding capacity.  Increase visual quality.  The proposed algorithm was applied to two set of images to demonstrate its efficiency. To our best knowledge, it is the first algorithm that achieves image contrast enhancement by RDH.  Furthermore, the evaluation results show that the visual quality can be preserved after a considerable amount of message bits have been embedded into the contrast-enhanced images, even better than three specific MATLAB functions used for image contrast enhancement.
  • 5. SYSTEM ARCHITECTURE: SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.
  • 6.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : MATLAB  Tool : MATLAB R2013A REFERENCE: Hao-Tian Wu, Member, IEEE, Jean-Luc Dugelay, Fellow, IEEE, and Yun-Qing Shi, Fellow, IEEE , “Reversible Image Data Hiding with Contrast Enhancement”, IEEE SIGNAL PROCESSING LETTERS, VOL. 22, NO. 1, JANUARY 2015.