SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1205
Encryption and Authentication of Image by Using Data Hiding
Komal Gaikwad1, Kshitija Kurnawal2, Dhanashri Padase3, Deokate S.T.4, Salve B.S.5
1Komal Gaikwad & Indapur
2Kshitija Kurnawal & Indapur
3Dhanashri Padase & Indapur
4Deokate S.T. & Indapur
5Salve B.S. & Indapur
Student, Computer Engineering, SBPCOE Indapur, Maharashtra, India
Assistant professor, Computer Engineering , SBPCOE Indapur, Maharashtra, India
----------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Day by day, data broadcasting over
internetworking is accelerating tremendously. As weseelotof
data is abducted over network, so it necessitates providing
data security. The RDH (Reversible Data Hiding) approach is
intended for gray scales images previously and it cannot be
directly applied to the palette image. Here, at the sender side
the palette image is used as input and the encryption of image
is done by using the encrypted key. In the image, alterations
are done by using the color partitioning withRGBmodel. After
performing the encryption of the intended image, some datais
hidden by utilizing data hiding key. At receiver side the
received image is decrypted and the result is identified. The
original contents can be reconstructed after data extraction
and the contents of owners privacy remains protected.
Key Words: Encryption, palette image, color
partitioning.
1. INTRODUCTION
Now a day’s, it is very crucial to transfer message from
sender to receiver with security. In this proposed system
RDH (Reversible Data Hiding Technique) allows theoriginal
contents to be properly recovered. This technique is more
desirable and useful in some sensitive applications such as
remote sensing, multimedia archive management and
military communication. In this proposed system the image
is transmitted from sender to receiver side by using the
data hiding technique. The image contentareonlyaccessible
to the authorized recipient and user must needtoknownthe
encryption key, data hiding key and decryption key. The
sender encrypted the input palette image by using the
encryption key and the color partitioning is also usedforthe
image encryption. The data hiding side the image is hidden
with data hiding key. At the last step data receiver side the
decryption of image is done and the output is the original
image. The data extraction is free from any and maintain the
very good quality of decrypted.
1.1. PROPOSED SYSTEM
This proposed system is used to transfer message from
sender to receiver with security .To secure this data from
unauthorized users,we are developing a system using the
Encryption,decryption and Data Hiding key. In this system
colorful image(palette) is considered.The palette image
means colorful image which is used as input at the sender
side.Palette swill be encrypted and after that the image data
will be hidden into the image using data hidingtechnique.At
receiver side data is getting extracted by giving keysthatare
the data hiding and image will be decrypted by using
decryption key.At the last stage we will try to gain original
image with high accuracy.
Fig. 1 Proposed System Architecture
2. LITERATURE SURVEY
The two new invertible watermarking methods for
authentication of digital images in the JPEG format. The first
technique is based on damage free brevity of biased bit-
streams derived from the quantized JPEG coefficients. The
second technique modifies the quantizationmatrixto enable
damage free embedding of one bit per DCT coefficient. This
two techniques are fast and can be used for general
distortion-free (invertible) data embedding. The further
focus on extending the methods to the MPEG-2 format [1].
Reversible data embedding hasdrawnlotsoffondnessscope
recently. The original digital content can be completely
restored. In proposed system [2] a novel reversible data
embedding method for digital images. The system explores
the redundancy in digital images to achieve very high
embedding capacity, and keep the distortion low. The only
Gray scale image distortions is low and achievetheveryhigh
embedding capacity. The further work is for difference
expansions for a colorful image.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1206
Reversible data hiding algorithm, which can recover the
original image without any distortion from the marked
image after the secret data have been extracted. This lower
bound of PSNR is greater than that of Entire reversible data
hiding techniques reported. Thecomputational complexityis
low and the execution time is short. This technique [3]
frequently used images, medical images, Texture images,
Aerial images and theyrepresentsthehistogramofanimage.
The reversible or lossless watermarking algorithm for
images without using a location map in most cases. This
algorithm employs forecast errors to embed data into an
image. The performance of the proposed reversible
watermarking scheme is evaluated using different images
and compared with methods of Kamstra and Heijmans et al.
these result clearly indicate that the embed more data with
less distortion [4].
The integer transform based reversible watermarking is
proposed. The system 1st show that Tian’s difference
expansion (DE) technique can be reformulated as an integer
transform and other is establishing the payload dependent
location map which occupies a small payload.Thesystem[5]
Tian’s DE technique uses to aspects of reversible
watermarking. Furthermore, selected the block with better
expandable based on distortion estimation function.
A new blind authentication method based on the secret
sharing technique with a data repair capability for grayscale
document images via the use of the Portable Network
Graphics (PNG) image is proposed. In the process of image
authentication an image blocked is marked as tampered.
Data repairing is then applied to each tampered block by a
reverse Shamir scheme after combining two shares from
unmarked blocks. Measures forprotectingthesecurityofthe
data hidden in the alpha channel are proposed. For more
studies may be directed to choices of other block sizes just
like a prime number, coefficient latent sharing etc. to
improve the data repair effects [6].
The two-dimensional difference histogram modification is
based on a novel reversible data hiding (RDH) scheme is
proposed by using difference-pair-mapping (DPM). By
considering each pixel-pair and its context, a sequence
consisting of pairs of variance values is computedanda two-
dimensional variance-histogram is generated by counting
the frequency of the resulting difference-pairs [7]. In
addition of this system a pixel pair selection strategy is used
to further enhancement of embedding performance.
The novel method by using reserving room before
encryption with a traditional RDH algorithm, and thus it is
easy for the data hider to reversibly embed data in the
encrypted image. The proposed method can achieve real
reversibility, that is, data extraction and image recovery are
free of any error [8]. The further improvementonthequality
of marked decrypted image.
In proposed system [9] technique for authentication of
images with self-repair capability for fixing tampered image
data is explained. Alpha channel is collect in the greyscale
image. Authentication signal is calculated by using binary
image and embedded in the alpha channel to create an
authentic image. After embedding the authentication signal,
image is encrypted and the stego-image is detected. Then
data is repaired at the pixel level by using reverse secrete
sharing scheme and secret image can be recovered without
any loss.
Now a days many digital documents are transferred on the
internet regularly e.g. circuit diagrams, signed documents,
etc.
The authentic image is encrypted atsendersideandreceiver
side this image is decrypted. The embedded authentication
signal is extracted from the received authentic image. The
new authentication signal is calculated by the binary image
of the received authentic image. Newauthenticationsignal is
compared with the extracted signal then the integrity check
is provided. The tampering of data is detected successfully
without any original image backup [10]. The result is
provided only for the grayscale images and supposed to
expand for color images as well.
For better explore the correlation between neighbor pixels,
we propose to consider the patch-level sparse
representation when hiding the secret data.Thewidelyused
sparse coding technique has demonstrated that a patch can
be linearly represented by some atoms in an over-complete
dictionary. In this method HC-SRDHEI method which
inherits the merits of RRBE and the separability property of
RDH method in encrypted image [11].Further in the
powerful representation of sparse coding, a large vacting
room can achieved and this the data hidder can embedded
more secret message.
RDH into encrypted images is increasing and regarding to
researchers as the inherent content can be accurately
restored after the embedded data are extracted while the
content owner’s secrecy remains protected. The existing
RDH techniques are designed for grayscale images and
cannot be directly applied to palette images. In this system
we will use the encryption key and data hiding key at the
sender side for encryption of image and at the receiver side
the decryption is done and original imageisgain.Thesystem
can be extend for video marking [12].
3. CONCLUSION
This system introduces a reliable separable RDH methodfor
encrypted palette images. The data hider can benefit from
the data-embedding space reservedbythecolorpartitioning
procedure, and apply the color replacement method to
embed the additional data. The data extraction and image
recovery are separable and free of any error. The proposed
method can provide a satisfactory embedding payload, as
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1207
well as maintain high PSNR values for the directlydecrypted
image.
REFERENCES
[1] J. Fridrich, M. Goljan and R. Du, “Invertible
authentication,” Proc. SPIE, San Jose, CA, vol. 3971, pp. 197-
208, 2001.
[2] Jun Tian, “Reversible data embedding using a difference
expansion,” IEEE Trans. Circuits Syst.VideoTechnol.,vol.13,
no. 8, pp. 890-896, 2003
[3] Z. Ni, N. Ansari and W. Su, “Reversible data hiding,” IEEE
Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354-
362, 2006.
[4] V. Sachnev, H. Joong Kim, J. Nam, S. Suresh and Y. Q. Shi,
“Reversible watermarking algorithm using sorting and
prediction,” IEEE Trans. Circuits Syst.VideoTechnol.,vol.19,
no. 7, 2009.
[5] X. Wang, X. Li and B. Yang, “Efficient generalized integer
transform forreversiblewatermarking,”IEEESignal Process.
Lett., vol. 17, no. 6, pp. 567-560, 2010.
[6] C. Li , “A secret-sharing-based method for authentication
of grayscale document images via the use of the PNG image
with a data repair capability,” IEEE Trans. Image Process.,
vol. 21, no. 1, pp. 207-218, 2012.
[7] X. Li, W. Zhang and X. Gui , “A novel reversible data hiding
scheme based on two-dimensional difference-histogram
modification,” IEEE Trans. Inf. Forensics Security, vol. 8, no.
7, pp. 1091-1100, 2013.
[8] K. Ma, W. Zhang, X. Zhao and N. Yu, “Reversible data
hiding in encrypted images by reserving room before
encryption,” IEEE Trans. Inf. Forensics Security, vol. 8, no. 3,
pp. 553-562, 2013.

More Related Content

What's hot (18)

PDF
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Dr. Amarjeet Singh
 
PDF
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
IRJET Journal
 
PDF
Iaetsd design of image steganography using haar dwt
Iaetsd Iaetsd
 
PDF
A Hybrid Approach for Ensuring Security in Data Communication
cscpconf
 
PDF
A comparative case study on the various techniques of reversible data hiding
IJLT EMAS
 
PDF
High capacity histogram shifting based reversible data hiding with data compr...
IAEME Publication
 
PDF
A Novel Technique for Image Steganography Based on DWT and Huffman Encoding
CSCJournals
 
PDF
7 rupali kasar_final paper--74-85
Alexander Decker
 
PDF
Secured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
CSCJournals
 
PDF
3 rupali kasar_final paper--23-34
Alexander Decker
 
PDF
Implementation of image steganography using lab view
IJARIIT
 
PDF
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...
ijceronline
 
PDF
Security and imperceptibility improving of image steganography using pixel al...
IJECEIAES
 
PPTX
Reversible data hiding using histogram shifting method
Himanshu Bal
 
PDF
Lossless Image Compression Techniques Comparative Study
IRJET Journal
 
PDF
REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE ENCRYPTIO...
International Journal of Technical Research & Application
 
PDF
Q180304102109
IOSR Journals
 
PDF
Pso based optimized security scheme for image authentication and tamper proofing
csandit
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Dr. Amarjeet Singh
 
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
IRJET Journal
 
Iaetsd design of image steganography using haar dwt
Iaetsd Iaetsd
 
A Hybrid Approach for Ensuring Security in Data Communication
cscpconf
 
A comparative case study on the various techniques of reversible data hiding
IJLT EMAS
 
High capacity histogram shifting based reversible data hiding with data compr...
IAEME Publication
 
A Novel Technique for Image Steganography Based on DWT and Huffman Encoding
CSCJournals
 
7 rupali kasar_final paper--74-85
Alexander Decker
 
Secured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
CSCJournals
 
3 rupali kasar_final paper--23-34
Alexander Decker
 
Implementation of image steganography using lab view
IJARIIT
 
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...
ijceronline
 
Security and imperceptibility improving of image steganography using pixel al...
IJECEIAES
 
Reversible data hiding using histogram shifting method
Himanshu Bal
 
Lossless Image Compression Techniques Comparative Study
IRJET Journal
 
REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE ENCRYPTIO...
International Journal of Technical Research & Application
 
Q180304102109
IOSR Journals
 
Pso based optimized security scheme for image authentication and tamper proofing
csandit
 

Similar to IRJET- Encryption and Authentication of Image by using Data Hiding (20)

PDF
Reversible Image Data Hiding with Contrast Enhancement
IRJET Journal
 
PDF
K041068072
ijceronline
 
PDF
Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...
IRJET Journal
 
PDF
Hf2513081311
IJERA Editor
 
PDF
Hf2513081311
IJERA Editor
 
PDF
Data Hiding Using Reversibly Designed Difference-Pair Method
IJERA Editor
 
PDF
A Review on Reversible Data Hiding Scheme by Image Contrast Enhancement
IJERA Editor
 
PDF
Survey on Different Image Encryption Techniques with Tabular Form
ijsrd.com
 
PDF
A Survey on Different Data Hiding Techniques in Encrypted Images
ijsrd.com
 
PDF
A new partial image encryption method for document images using variance base...
IJECEIAES
 
PDF
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
IRJET Journal
 
PDF
A secured data transmission system by reversible data hiding with scalable co...
IAEME Publication
 
PDF
F1803063236
IOSR Journals
 
PDF
Reversible Encrypytion and Information Concealment
IJERA Editor
 
PDF
Efficient Reversible Data Hiding Algorithms Based on Dual Prediction
sipij
 
PDF
Encryption-Decryption RGB Color Image Using Matrix Multiplication
ijcsit
 
PDF
Implementation for Data Hiding using Visual Cryptography
IRJET Journal
 
PDF
Ensuring Distributed Accountability for Data Sharing Using Reversible Data Hi...
IOSR Journals
 
PDF
IRJET- Encryption based Approach to Find Fake Uploaders in Social Media
IRJET Journal
 
PDF
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
IRJET Journal
 
Reversible Image Data Hiding with Contrast Enhancement
IRJET Journal
 
K041068072
ijceronline
 
Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...
IRJET Journal
 
Hf2513081311
IJERA Editor
 
Hf2513081311
IJERA Editor
 
Data Hiding Using Reversibly Designed Difference-Pair Method
IJERA Editor
 
A Review on Reversible Data Hiding Scheme by Image Contrast Enhancement
IJERA Editor
 
Survey on Different Image Encryption Techniques with Tabular Form
ijsrd.com
 
A Survey on Different Data Hiding Techniques in Encrypted Images
ijsrd.com
 
A new partial image encryption method for document images using variance base...
IJECEIAES
 
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
IRJET Journal
 
A secured data transmission system by reversible data hiding with scalable co...
IAEME Publication
 
F1803063236
IOSR Journals
 
Reversible Encrypytion and Information Concealment
IJERA Editor
 
Efficient Reversible Data Hiding Algorithms Based on Dual Prediction
sipij
 
Encryption-Decryption RGB Color Image Using Matrix Multiplication
ijcsit
 
Implementation for Data Hiding using Visual Cryptography
IRJET Journal
 
Ensuring Distributed Accountability for Data Sharing Using Reversible Data Hi...
IOSR Journals
 
IRJET- Encryption based Approach to Find Fake Uploaders in Social Media
IRJET Journal
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
IRJET Journal
 
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
IRJET Journal
 
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
PDF
Kiona – A Smart Society Automation Project
IRJET Journal
 
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
PDF
Breast Cancer Detection using Computer Vision
IRJET Journal
 
PDF
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
PDF
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
PDF
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
PDF
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
Kiona – A Smart Society Automation Project
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Ad

Recently uploaded (20)

PPT
FINAL plumbing code for board exam passer
MattKristopherDiaz
 
PDF
輪読会資料_Miipher and Miipher2 .
NABLAS株式会社
 
PDF
Python Mini Project: Command-Line Quiz Game for School/College Students
MPREETHI7
 
PPTX
Explore USA’s Best Structural And Non Structural Steel Detailing
Silicon Engineering Consultants LLC
 
PDF
Authentication Devices in Fog-mobile Edge Computing Environments through a Wi...
ijujournal
 
PPTX
Comparison of Flexible and Rigid Pavements in Bangladesh
Arifur Rahman
 
PDF
01-introduction to the ProcessDesign.pdf
StiveBrack
 
PDF
Clustering Algorithms - Kmeans,Min ALgorithm
Sharmila Chidaravalli
 
PPTX
Stability of IBR Dominated Grids - IEEE PEDG 2025 - short.pptx
ssuser307730
 
PPTX
Kel.3_A_Review_on_Internet_of_Things_for_Defense_v3.pptx
Endang Saefullah
 
PDF
Designing for Tomorrow – Architecture’s Role in the Sustainability Movement
BIM Services
 
DOCX
Engineering Geology Field Report to Malekhu .docx
justprashant567
 
PDF
FSE-Journal-First-Automated code editing with search-generate-modify.pdf
cl144
 
PDF
How to Buy Verified CashApp Accounts IN 2025
Buy Verified CashApp Accounts
 
PDF
June 2025 - Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
PDF
Generative AI & Scientific Research : Catalyst for Innovation, Ethics & Impact
AlqualsaDIResearchGr
 
PDF
Decision support system in machine learning models for a face recognition-bas...
TELKOMNIKA JOURNAL
 
PDF
Plant Control_EST_85520-01_en_AllChanges_20220127.pdf
DarshanaChathuranga4
 
PDF
Module - 4 Machine Learning -22ISE62.pdf
Dr. Shivashankar
 
PPTX
Artificial Intelligence jejeiejj3iriejrjifirirjdjeie
VikingsGaming2
 
FINAL plumbing code for board exam passer
MattKristopherDiaz
 
輪読会資料_Miipher and Miipher2 .
NABLAS株式会社
 
Python Mini Project: Command-Line Quiz Game for School/College Students
MPREETHI7
 
Explore USA’s Best Structural And Non Structural Steel Detailing
Silicon Engineering Consultants LLC
 
Authentication Devices in Fog-mobile Edge Computing Environments through a Wi...
ijujournal
 
Comparison of Flexible and Rigid Pavements in Bangladesh
Arifur Rahman
 
01-introduction to the ProcessDesign.pdf
StiveBrack
 
Clustering Algorithms - Kmeans,Min ALgorithm
Sharmila Chidaravalli
 
Stability of IBR Dominated Grids - IEEE PEDG 2025 - short.pptx
ssuser307730
 
Kel.3_A_Review_on_Internet_of_Things_for_Defense_v3.pptx
Endang Saefullah
 
Designing for Tomorrow – Architecture’s Role in the Sustainability Movement
BIM Services
 
Engineering Geology Field Report to Malekhu .docx
justprashant567
 
FSE-Journal-First-Automated code editing with search-generate-modify.pdf
cl144
 
How to Buy Verified CashApp Accounts IN 2025
Buy Verified CashApp Accounts
 
June 2025 - Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
Generative AI & Scientific Research : Catalyst for Innovation, Ethics & Impact
AlqualsaDIResearchGr
 
Decision support system in machine learning models for a face recognition-bas...
TELKOMNIKA JOURNAL
 
Plant Control_EST_85520-01_en_AllChanges_20220127.pdf
DarshanaChathuranga4
 
Module - 4 Machine Learning -22ISE62.pdf
Dr. Shivashankar
 
Artificial Intelligence jejeiejj3iriejrjifirirjdjeie
VikingsGaming2
 

IRJET- Encryption and Authentication of Image by using Data Hiding

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1205 Encryption and Authentication of Image by Using Data Hiding Komal Gaikwad1, Kshitija Kurnawal2, Dhanashri Padase3, Deokate S.T.4, Salve B.S.5 1Komal Gaikwad & Indapur 2Kshitija Kurnawal & Indapur 3Dhanashri Padase & Indapur 4Deokate S.T. & Indapur 5Salve B.S. & Indapur Student, Computer Engineering, SBPCOE Indapur, Maharashtra, India Assistant professor, Computer Engineering , SBPCOE Indapur, Maharashtra, India ----------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Day by day, data broadcasting over internetworking is accelerating tremendously. As weseelotof data is abducted over network, so it necessitates providing data security. The RDH (Reversible Data Hiding) approach is intended for gray scales images previously and it cannot be directly applied to the palette image. Here, at the sender side the palette image is used as input and the encryption of image is done by using the encrypted key. In the image, alterations are done by using the color partitioning withRGBmodel. After performing the encryption of the intended image, some datais hidden by utilizing data hiding key. At receiver side the received image is decrypted and the result is identified. The original contents can be reconstructed after data extraction and the contents of owners privacy remains protected. Key Words: Encryption, palette image, color partitioning. 1. INTRODUCTION Now a day’s, it is very crucial to transfer message from sender to receiver with security. In this proposed system RDH (Reversible Data Hiding Technique) allows theoriginal contents to be properly recovered. This technique is more desirable and useful in some sensitive applications such as remote sensing, multimedia archive management and military communication. In this proposed system the image is transmitted from sender to receiver side by using the data hiding technique. The image contentareonlyaccessible to the authorized recipient and user must needtoknownthe encryption key, data hiding key and decryption key. The sender encrypted the input palette image by using the encryption key and the color partitioning is also usedforthe image encryption. The data hiding side the image is hidden with data hiding key. At the last step data receiver side the decryption of image is done and the output is the original image. The data extraction is free from any and maintain the very good quality of decrypted. 1.1. PROPOSED SYSTEM This proposed system is used to transfer message from sender to receiver with security .To secure this data from unauthorized users,we are developing a system using the Encryption,decryption and Data Hiding key. In this system colorful image(palette) is considered.The palette image means colorful image which is used as input at the sender side.Palette swill be encrypted and after that the image data will be hidden into the image using data hidingtechnique.At receiver side data is getting extracted by giving keysthatare the data hiding and image will be decrypted by using decryption key.At the last stage we will try to gain original image with high accuracy. Fig. 1 Proposed System Architecture 2. LITERATURE SURVEY The two new invertible watermarking methods for authentication of digital images in the JPEG format. The first technique is based on damage free brevity of biased bit- streams derived from the quantized JPEG coefficients. The second technique modifies the quantizationmatrixto enable damage free embedding of one bit per DCT coefficient. This two techniques are fast and can be used for general distortion-free (invertible) data embedding. The further focus on extending the methods to the MPEG-2 format [1]. Reversible data embedding hasdrawnlotsoffondnessscope recently. The original digital content can be completely restored. In proposed system [2] a novel reversible data embedding method for digital images. The system explores the redundancy in digital images to achieve very high embedding capacity, and keep the distortion low. The only Gray scale image distortions is low and achievetheveryhigh embedding capacity. The further work is for difference expansions for a colorful image.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1206 Reversible data hiding algorithm, which can recover the original image without any distortion from the marked image after the secret data have been extracted. This lower bound of PSNR is greater than that of Entire reversible data hiding techniques reported. Thecomputational complexityis low and the execution time is short. This technique [3] frequently used images, medical images, Texture images, Aerial images and theyrepresentsthehistogramofanimage. The reversible or lossless watermarking algorithm for images without using a location map in most cases. This algorithm employs forecast errors to embed data into an image. The performance of the proposed reversible watermarking scheme is evaluated using different images and compared with methods of Kamstra and Heijmans et al. these result clearly indicate that the embed more data with less distortion [4]. The integer transform based reversible watermarking is proposed. The system 1st show that Tian’s difference expansion (DE) technique can be reformulated as an integer transform and other is establishing the payload dependent location map which occupies a small payload.Thesystem[5] Tian’s DE technique uses to aspects of reversible watermarking. Furthermore, selected the block with better expandable based on distortion estimation function. A new blind authentication method based on the secret sharing technique with a data repair capability for grayscale document images via the use of the Portable Network Graphics (PNG) image is proposed. In the process of image authentication an image blocked is marked as tampered. Data repairing is then applied to each tampered block by a reverse Shamir scheme after combining two shares from unmarked blocks. Measures forprotectingthesecurityofthe data hidden in the alpha channel are proposed. For more studies may be directed to choices of other block sizes just like a prime number, coefficient latent sharing etc. to improve the data repair effects [6]. The two-dimensional difference histogram modification is based on a novel reversible data hiding (RDH) scheme is proposed by using difference-pair-mapping (DPM). By considering each pixel-pair and its context, a sequence consisting of pairs of variance values is computedanda two- dimensional variance-histogram is generated by counting the frequency of the resulting difference-pairs [7]. In addition of this system a pixel pair selection strategy is used to further enhancement of embedding performance. The novel method by using reserving room before encryption with a traditional RDH algorithm, and thus it is easy for the data hider to reversibly embed data in the encrypted image. The proposed method can achieve real reversibility, that is, data extraction and image recovery are free of any error [8]. The further improvementonthequality of marked decrypted image. In proposed system [9] technique for authentication of images with self-repair capability for fixing tampered image data is explained. Alpha channel is collect in the greyscale image. Authentication signal is calculated by using binary image and embedded in the alpha channel to create an authentic image. After embedding the authentication signal, image is encrypted and the stego-image is detected. Then data is repaired at the pixel level by using reverse secrete sharing scheme and secret image can be recovered without any loss. Now a days many digital documents are transferred on the internet regularly e.g. circuit diagrams, signed documents, etc. The authentic image is encrypted atsendersideandreceiver side this image is decrypted. The embedded authentication signal is extracted from the received authentic image. The new authentication signal is calculated by the binary image of the received authentic image. Newauthenticationsignal is compared with the extracted signal then the integrity check is provided. The tampering of data is detected successfully without any original image backup [10]. The result is provided only for the grayscale images and supposed to expand for color images as well. For better explore the correlation between neighbor pixels, we propose to consider the patch-level sparse representation when hiding the secret data.Thewidelyused sparse coding technique has demonstrated that a patch can be linearly represented by some atoms in an over-complete dictionary. In this method HC-SRDHEI method which inherits the merits of RRBE and the separability property of RDH method in encrypted image [11].Further in the powerful representation of sparse coding, a large vacting room can achieved and this the data hidder can embedded more secret message. RDH into encrypted images is increasing and regarding to researchers as the inherent content can be accurately restored after the embedded data are extracted while the content owner’s secrecy remains protected. The existing RDH techniques are designed for grayscale images and cannot be directly applied to palette images. In this system we will use the encryption key and data hiding key at the sender side for encryption of image and at the receiver side the decryption is done and original imageisgain.Thesystem can be extend for video marking [12]. 3. CONCLUSION This system introduces a reliable separable RDH methodfor encrypted palette images. The data hider can benefit from the data-embedding space reservedbythecolorpartitioning procedure, and apply the color replacement method to embed the additional data. The data extraction and image recovery are separable and free of any error. The proposed method can provide a satisfactory embedding payload, as
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1207 well as maintain high PSNR values for the directlydecrypted image. REFERENCES [1] J. Fridrich, M. Goljan and R. Du, “Invertible authentication,” Proc. SPIE, San Jose, CA, vol. 3971, pp. 197- 208, 2001. [2] Jun Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. Circuits Syst.VideoTechnol.,vol.13, no. 8, pp. 890-896, 2003 [3] Z. Ni, N. Ansari and W. Su, “Reversible data hiding,” IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354- 362, 2006. [4] V. Sachnev, H. Joong Kim, J. Nam, S. Suresh and Y. Q. Shi, “Reversible watermarking algorithm using sorting and prediction,” IEEE Trans. Circuits Syst.VideoTechnol.,vol.19, no. 7, 2009. [5] X. Wang, X. Li and B. Yang, “Efficient generalized integer transform forreversiblewatermarking,”IEEESignal Process. Lett., vol. 17, no. 6, pp. 567-560, 2010. [6] C. Li , “A secret-sharing-based method for authentication of grayscale document images via the use of the PNG image with a data repair capability,” IEEE Trans. Image Process., vol. 21, no. 1, pp. 207-218, 2012. [7] X. Li, W. Zhang and X. Gui , “A novel reversible data hiding scheme based on two-dimensional difference-histogram modification,” IEEE Trans. Inf. Forensics Security, vol. 8, no. 7, pp. 1091-1100, 2013. [8] K. Ma, W. Zhang, X. Zhao and N. Yu, “Reversible data hiding in encrypted images by reserving room before encryption,” IEEE Trans. Inf. Forensics Security, vol. 8, no. 3, pp. 553-562, 2013.