International Journal of Engineering Trends and Technology (IJETT) – Volume 7 Number 1- Jan 2014
A Pragmatic Approach in Lossless Data Hiding for JPEG Images T. S.Sandeep 1#
#1
, J. Shankar babu *2, Dr.N. Sudhakar Reddy@3
Assistant Professor, Dept of CSE,SVEW, TIRUPATI, AP, India Associate Professor, Dept of CSE,SVEW,TIRUPATI, AP, India 3@ PRINCIPAL, SVCE, TIRUPATI, AP, India
2*
Abstract— In this paper Reversible Data hiding restores
the carrier once the removing hidden secret information. Many reversible data hiding techniques were proposed within the past few years, but on analysis, almost all does not have in providing the security and authentication. This paper proposes a novel reversible data hiding technique which effort is separable, the receiver can extract the initial image or additional embedded information or both based on the keys hold from the receiver. Alternatively the receiver can verify the information hided through the data hider, so that the work proposes both security and authentication. Digital steganography and watermarking are both types of information hiding. Digital watermarking usually mentioned as hiding for comforting the data. Information hiding in image process could occur the long term frame distortions and then the initial cover medium is probably not prepared to be turned around precisely, once the hidden knowledge are extracted out. This work proposes a novel scheme for separable reversible data hiding in encrypted images. Within the first phase, a content owner encrypts the initial uncompressed image having an encryption key. Then, a data-hider may compress minimal significant bits of the encrypted image by using a data-hiding step to produce a sparse space to allow for some additional data. Through an encrypted image containing additional data, if the receiver gets the data-hiding key, he is able to extract the additional data though he doesn't be aware of image content. When the receiver contains the encryption key, they can decrypt the received data to acquire an image just like the original one, but cannot extract the additional data. Keywords: Reversible Data Hiding, Histogram, Stenography, Performance, Watermarking. I. INTRODUCTION In an interactive buyer–seller protocol for invisible watermarking, the seller does not know the exact watermarked copy that the buyer receives. So the seller cannot create copies of the original content containing the buyer’s watermark. If
ISSN: 2231-5381
the seller finds an unauthorized copy, the seller can identify the buyer from the watermark using the unauthorized copy, and hence the seller can prove this fact to a third party using a dispute resolution protocol. In it is desired to transmit redundant data over an insecure and bandwidth-constrained channel, it is desired to first compress the data and then encrypts it. Traditional techniques used to compress the data first and then encrypt the data. But we are reversing the order of these steps, thereby first encrypting and then compressing the data. A significant compression ratio can be achieved if compression is Performed after encryption. Compression is performed by standard source code and decryption by decompression. Data hiding is referred to as a process to hide data into cover media. This implies that the data hiding process links two sets of data, a set of embedded data and another set of cover media data. These two sets of data have different applications. In covert communications, the hidden data may often be irrelevant to the cover media. In authentication, the embedded data is closely related to the cover media. In these two types of applications, the invisibility of hidden data is an important factor. In some cases of data hiding, the cover media will experience some distortion due to data hiding and cannot be inverted back to original media. That is, some permanent distortion has occurred to the cover media even after the hidden data have been extracted out. In other applications, such as remote sensing and high-energy particle physical experimental analysis, it is also desired that the original cover media can be recovered because of the required high-precision. In addition, information sharing was proposed to protect the security of concerned data by transforming a secret message into several shares which are then distributed to a number of participants to keep. Such a secret sharing scheme is useful for reducing the risk of incidental data loss and advantageous for keeping a balance among the participants: only when all the shares or a sufficient number of them are collected from the participants can the secret message be recovered correctly. This concept of secret sharing. Conventionally, data hiding and information sharing are two irrelevant issues in the domain of information security. In this study, a new data hiding method based on the technique of
http://www.ijettjournal.org
Page 26