A SECRET IMAGE SHARING METHOD USING INTEGER TO INTEGER WAVELET TRANSFORM PHASE-I By GANESAMOORTHY.B A Thesis submitted to the FACULTY OF INFORMATION AND COMMUNICATION ENGINEERING in partial fulfillment of the requirements for the award of the degree of MASTER OF ENGINEERING in APPLIED ELECTRONICS 1
43
Embed
A Secret Image Sharing Method Using Integer to Integer Wavelet Transform
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
A SECRET IMAGE SHARING METHOD USING
INTEGER TO INTEGER WAVELET TRANSFORM
PHASE-I
By GANESAMOORTHY.B
A Thesis submitted to the
FACULTY OF INFORMATION AND COMMUNICATION ENGINEERING
in partial fulfillment of the requirements
for the award of the degree
of
MASTER OF ENGINEERING
in
APPLIED ELECTRONICS
COLLEGE OF ENGINEERING, GUINDY
ANNA UNIVERSITY: CHENNAI 600 025
OCTOBER 2007
1
ACKNOWLEDGEMENT
I have a great pleasure in expressing my sincere gratitude and heartily thanks
to our Prof. and H.O.D.Dr.N.Kumaravel for providing me an opportunity
to work on this project. I would like to sincerely thank our Prof.Dr.J.Raja
Paul Perinbam, for providing enough time and encouragement.
I express my sincere thanks to my guide Mr.M.Manikandan ,Lecturer,
Department of Electronics and Communication ,Anna University for his
discussions , helpful criticisms and kind encouragements in entire phase
of this project work. It had been indeed a great pleasure to work under their
guidance.
I also express my gratitude to all faculty members for their help and support
during entire phase of this project work.
Finally, I express my deep sense gratitude to my members, friends and all
others who directly or indirectly involved in this project, for their valuable
help and consideration towards me.
Place:
Date:
GANESAMOORTHY.B
2
BONAFIDE CERTIFICATE
Certified that this thesis report “A Secret image sharing method using
Integer to Integer wavelet transform” is the Bonafide work of
“Mr.B.GANESAMOORTHY, (200631625)” who carried out the project
work under my supervision. Certified further, that to the best of my
knowledge the work reported herein does not form part of any other thesis or
dissertation on the basis of which a degree or award was concerned on an
earlier occasion on this or any other candidate.
Dr.N.KUMARAVEL, Mr.M.MANIKANDAN
Professor& Head of the Department, Lecturer,Department of Electronics and Department of Electronics and Communication Engineering Communication EngineeringCollege of Engineering, College of Engineering,Anna University Anna UniversityChennai -600 025 Chennai -600 025.
3
TABLE OF CONTENTS
CHAPTER NO. TITLE PAGE NO.
ABSTRACT (TAMIL) iii
ABSTRACT (ENGLISH) xvi
LIST OF FIGURES xviii
LIST OF SYMBOLS xxvii
1. INTRODUCTION
1.1LITERATURE SURVEY
2 2.1 OBJECTIVE
. 2.2. OVERVIEW
2.2.1 BLOCK DIAGRAM
3. DESCRIPTION
3.1 WAVELETS
3.2 WAVELET VS FOURIER TRANSFORMS
3.2.1 Similarities
3.2.2 Dissimilarities
3.3 BIO-ORTHOGONAL WAVELETS:
3.4 WAVELET TYPES
3.4.1 Continuous wavelet transform
3.4.2 Discrete wavelet transform
3.5 INTEGER WAVELET TRANSFORMS
3.5.1Advantages:
3.5.2 Daubechies’ 5/3 Wavelet Transform
3.6 DOWNSAMPLING
3.7 SHAMIR’S THRESHOLD SCHEME:
4. MATLAB SIMULATION RESULTS.
4
ABSTRACT (TAMIL)
5
LIST OF FIGURES
FIGURE NO TITLE PAGE N0
Block diagram
6
LIST OF ABBREVIATIONS
ITI Integer to integer wavelet transforms
SPIHT Set hierarchial partitioning of trees
7
ABSTRACT
A new image sharing method, based on the reversible
integer-to-integer (ITI) wavelet transform and Shamir’s (r, m) threshold
scheme is presented, that provides highly compact shadows for real time
progressive transmission. This method, working in the wavelet domain,
processes the transform coefficients in each sub band, divides each of the
resulting combination coefficients into m shadows and allows recovery of
the complete secret image by using any r or more shadows (r≤m). By taking
advantages of properties of the wavelet transform multiresolution
representation, such as coefficient magnitude decay and excellent energy
compaction, to design combination procedures for the transform coefficients
and processing sequences in wavelet sub bands such that small shadows for
real time progressive transmission are obtained.
8
CHAPTER 1
INTRODUCTION
With the rapid development of computer and
communication networks, Internet has been established worldwide that
brings numerous applications such as commercial services, telemedicine and
military document transmissions. Due to the nature of the network, Internet
is an open system; to transmit secret application data securely is an issue of
great concern. Security could be introduced in many different ways, for
example, by image hiding and watermarking. However, the common weak
point of them is that a secret image is protected in a single information
carrier, and once the carrier is damaged or destroyed the secret is lost. If
many duplicates are used to overcome this deficiency, the danger of security
exposure will also increase. A secret image sharing method provides a viable
solution. To process the received data efficiently is another problem. As
transmission proceeds, the receiver may gradually access images with
increased visual quality. If the received data is of no interest, the
transmission can be terminated immediately to increase efficacy. Therefore,
the functionality of progressive reconstruction is very essential to be built in
the scheme. The goal is to develop an efficient secret image sharing method
with progressive transmission capability.
9
LITERATURE SURVEY
In 1979 Adi Shamir proposed “How to share a secret“.
In this paper he show how to divide data D into n pieces in such a way that
D is easily reconstruct able from any k pieces, but even complete knowledge
of k - 1 pieces reveals absolutely no information about D. This technique
enables the construction of robust key management schemes for
cryptographic systems that can function securely and reliably even when
misfortunes destroy half the pieces and security breaches expose all but one
of the remaining pieces.
In 2002 Chih-Ching Thien and Ja-Chen Lin proposed
“Secret image sharing” In this paper they suggested the concept of image
sharing for both lossy as well as lossless image .In this method such that
secret image can be shared by several shadow images. The size of each
shadow image is 1∕ r of the secret images in our method, and this small size
property gives our method certain benefits including easier process for
storage, transmission, and hiding.
In 2005 Shang-Kuan Chen and Ja-chen Lin proposed
“Fault tolerant and progressive transmission of images “.In this paper the
image is divided into n parts with equal importance to avoid worrying about
which part is lost or transmitted first and if the image is a secret image, then
the transmission can use n distinct channels and intercepting up to r1-1
channels by the enemy will not reveal any secret.
10
In 2006 Ran-Zan Wang and Chin-Hui Su proposed
“Secret image sharing with smaller shadow images”. In this paper Secret
image sharing is a technique for protecting images that involves the
dispersion of the secret image into many shadow images. This endows the
method with a higher tolerance against data corruption or loss than other
image-protection mechanisms, such as encryption or steganography. In the
method proposed in this study, the difference image of the secret image is
encoded using Huffman coding scheme, and the arithmetic calculations of
the sharing functions are evaluated in a power-of-two Galois Field GF (2t).
The shadow image in this method is about 40% smaller than that of the
method used in Secret image sharing which improves its efficiency in
storage, transmission, and data hiding.
In 1998 HyungJun Kim and C. C. Li proposed
“Lossless and Lossy Image Compression Using Biorthogonal Wavelet
Transforms with Multiplierless Operations”. In this paper they proposed
lossless and lossy image compression algorithms, based on biorthogonal
wavelets, which provide high computational speed and excellent
compression performance.
In 1995 Ahmad Zandi James, D. Allen Edward,
L. Schwartz and Martin Boliek proposed “CREW:
Compression with Reversible Embedded Wavelets”.
Compression with Reversible Embedded Wavelets (CREW) is a unified
lossless and lossy continuous-tone still image compression system. It is
wavelet-based using a “reversible” approximation of one of the best wavelet
filters. Reversible wavelets are linear filters with non-linear rounding which
11
implement exact-reconstruction systems with minimal precision integer
arithmetic.
In 1996 A. R. Calderbank, Ingrid daubechies, Wim
sweldens, and Boon-lock yeo proposed “Wavelet Transforms That Map
Integers to Integers”. Invertible wavelet transforms that map integers to
integers have important applications in lossless coding. In this paper we
present two approaches to build integer to integer wavelet transforms. The
first approach is to adapt the precoder of Laroia et al., which is used in
information transmission; combine it with expansion factors for the high and
low pass band in subband filtering. The second approach builds upon the
idea of factoring wavelet transforms into so-called lifting steps. This allows
the construction of an integer version of every wavelet transform.
In 2003 Chih-Ching Thien and Ja-Chen Lin proposed
“An Image-Sharing Method with User-Friendly Shadow Images”. This
study presents a user-friendly image-sharing method for easier management
of the shadow images. The sharing of images among several branches
(distributed disks) using this method has several characteristics: 1) fast
transmission among branches; 2) fault tolerance; 3) a secure storage system;
4) reduced chance of pirating of high-quality images and 5) most
importantly, the provision to each branch manager an easy-to-manage
environment This approach still has the small-size and channel-independent
properties of our the size of each shadow image is only 1/r of that of the
original image, and any shadow images can be used for restoration.