Top Banner
Optimized Reversible Data Hiding Technique for Secured Data Transmission Guide:- Submitted by: Himanshu bal Department of Information Technolog 2015-2016 TE(IT)seminar 14/3/2016 pgno.1 slideno. 1
23

Reversible data hiding using histogram shifting method

Apr 12, 2017

Download

Software

Himanshu Bal
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Reversible data hiding using histogram shifting method

Optimized Reversible Data Hiding Technique for Secured Data Transmission

Guide:-Submitted by:

Himanshu bal

Department of Information Technology2015-2016

TE(IT)seminar 14/3/2016 pgno.1 slideno. 1

Page 2: Reversible data hiding using histogram shifting method

PROBLEM DEFINITION

Discussing a solution for reversible data hiding by optimizing the techniques presently available for secured data transmission.

TE(IT)seminar 14/3/2016 pgno.1 slideno. 2

Optimized Reversible Data Hiding Technique for Secured Data Transmission

Page 3: Reversible data hiding using histogram shifting method

OBJECTIVE:

1. Generate an optimized reversible data hiding technique to overcome the issues in current RHD trends like:

1. Low embedding capacity

2. High distortion rate etc.

3. Low utilization of 2D histogram

TE(IT)seminar 14/3/2016 pgno. 1 slideno. 3

Optimized Reversible Data Hiding Technique for Secured Data Transmission

Page 4: Reversible data hiding using histogram shifting method

INTRODUCTION1. Steganography is the art or practice of concealing a message, image, or file

within another message, image, or file.

2. The word steganography combines the Ancient Greek words steganos, meaning "covered, concealed, or protected”.

3. One of its application is Reversible data hiding (RHD).

4. Reversible data hiding (RDH) is used to embed secret message into a cover image by slightly modifying its pixel values.

TE(IT)seminar 14/3/2016 pgno. 1 slideno.4

Optimized Reversible Data Hiding Technique for Secured Data Transmission

Page 5: Reversible data hiding using histogram shifting method

WHY STEGANOGRAPHY OVER CRYPTOGRAPHY????

TE(IT)seminar 14/3/2016 pgno.2 slideno.5

Optimized Reversible Data Hiding Technique for Secured Data Transmission

Page 6: Reversible data hiding using histogram shifting method

LITERATURE SURVEY

DIFFERENT RDH METHODS:

1. Tian's method of LSB (2003). J. Tian, Reversible data embedding using a difference expansion, IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896,Aug.2003

2. Ni et al’s method of histogram shifting (2006). Reversible image watermarking on prediction errors by efficient histogram modification, Signal Process., vol. 92,no. 12, pp. 3000–3009, Dec. 2006.

3. Thodi and Rodriguez hybrid method (2012). , “A Novel Reversible Data Hiding Scheme Based on Two-Dimensional Difference-Histogram Modification”, IEEE Transactions on Information Forensics and Security, July 2012.

TE(IT)seminar 14/3/2016 pgno.2 slideno.6

Optimized Reversible Data Hiding Technique for Secured Data Transmission

Page 7: Reversible data hiding using histogram shifting method

RELATED WORKS

TE(IT)seminar 14/3/2016 pgno.2 slideno. 7

Optimized Reversible Data Hiding Technique for Secured Data Transmission

Page 8: Reversible data hiding using histogram shifting method

NE ET AL’S METHOD OF HISTOGRAM SHIFTING1. The method modifies the pixel-pairs with differences 1 or -1 to carry data.

2. For data embedding, the difference image is first computed for a gray-scale cover image using formula :

D(i,j) = I(i, 2j + 1) – I(i, 2j)

3. Then marked image is obtained as

TE(IT)seminar 14/3/2016 pgno.3 slideno.8

Optimized Reversible Data Hiding Technique for Secured Data Transmission

Page 9: Reversible data hiding using histogram shifting method

NE ET AL’S METHOD OF HISTOGRAM SHIFTING contd.

1.Then the information bits can be extracted as

2.And finally the original picture can be recovered

3.Here the difference Dm(i,j) = Im(i,2j+1) – Im(i, 2j) is the difference value computed from the marked image.

TE(IT)seminar 14/3/2016 pgno. 3 slideno. 9

Optimized Reversible Data Hiding Technique for Secured Data Transmission

b= 0, if Dm(i,j)=-11, if Dm(i,j)=+1

Page 10: Reversible data hiding using histogram shifting method

NOW LETS’S COME TO OUR NEW ENHANCED METHOD

TE(IT)seminar 14/3/2016 pgno.4 slideno.10

Optimized Reversible Data Hiding Technique for Secured Data Transmission

Page 11: Reversible data hiding using histogram shifting method

ARCHITECTURE FOR EMBEDDING AND EXTRACTION

ARCHITECTURE FOR EMBEDDING ARCHITECTURE FOR EXTRACTION

TE(IT)seminar 14/3/2016 pgno. 4 slideno.11

Optimized Reversible Data Hiding Technique for Secured Data Transmission

Page 12: Reversible data hiding using histogram shifting method

WORKING OF HISTOGRAM SHIFTING BASED RDH METHODTHE HISTOGRAM SHIFTING BASED RHD METHOD REQUIRE FOUR STEPS TO COMPLETE THE PROCESS:

1. Histogram shifting

2. Encoding process

3. Embedding process

4. Extraction process

TE(IT)seminar 14/3/2016 pgno. 5 slideno. 12

Optimized Reversible Data Hiding Technique for Secured Data Transmission

Page 13: Reversible data hiding using histogram shifting method

HISTOGRAM SHIFTING CONSISTS OF FOLLOWING STEPS1. Computing difference image for gray scale

2. Using histogram bins for expansion embedding

3. Modification of pixels

TE(IT)seminar 14/3/2016 pgno.5 slideno. 13

Optimized Reversible Data Hiding Technique for Secured Data Transmission

Page 14: Reversible data hiding using histogram shifting method

ENCODING PROCESS

1. Data compression.

2. Using run length encoding.

3. Counting the runs.

TE(IT)seminar 14/3/2016 pgno.5 slideno.14

Optimized Reversible Data Hiding Technique for Secured Data Transmission

Page 15: Reversible data hiding using histogram shifting method

EMBEDDING PROCESS1. Dividing the host image into non overlapping blocks.

2. Using LSB replacement to embed the location mapping.

3. embed the LSB sequence Into using shifting and embedding functions

Illustration of the data embedding

TE(IT)seminar 14/3/2016 pgno.6 slideno. 15

Optimized Reversible Data Hiding Technique for Secured Data Transmission

Page 16: Reversible data hiding using histogram shifting method

WORKING PRINCIPLE FOR EMBEDDING ANY TYPE OF MESSAGE

INFO HIDDENINFO

HIDDEN INFO

STEGO KEY

COVER MEDIUM

STEGO OUTPUT

TE(IT)seminar 14/3/2016 pgno.6 slideno. 16

Optimized Reversible Data Hiding Technique for Secured Data Transmission

Page 17: Reversible data hiding using histogram shifting method

EXTRACTION PROCESS

1. Dividing the marked image blocks.

2. determining the location map.

3. Extraction the embedded data.

TE(IT)seminar 14/3/2016 pgno.7 slideno.17

Optimized Reversible Data Hiding Technique for Secured Data Transmission

Page 18: Reversible data hiding using histogram shifting method

RESULTS OF HISTOGRAM METHOD

ORIGINAL IMAGE IMAGE AFTER EMBEDDING

HISTOGRAM BASED ON ORIGINAL IMAGE

SHIFTED AND EMBEDDED HISTOGRAMTE(IT)seminar 14/3/2016 pgno.7 slideno. 18

Optimized Reversible Data Hiding Technique for Secured Data Transmission

Page 19: Reversible data hiding using histogram shifting method

PSNR VS EMBEDDING RATE

TE(IT)seminar 14/3/2016 pgno. 8 slideno.19

PERFORMANCE ANALYSIS Optimized Reversible Data Hiding Technique for Secured Data Transmission

Page 20: Reversible data hiding using histogram shifting method

MOTIVATION

TE(IT)seminar 14/3/2016 pgno.8 slideno. 20

Optimized Reversible Data Hiding Technique for Secured Data Transmission

Page 21: Reversible data hiding using histogram shifting method

ADVANTAGES

1. The embedding capacity has been enhanced.

2. The distortion ration is reduced.

3. Better utilization of 2D histogram.

4. Better recovery of image.

TE(IT)seminar 14/3/2016 pgno. 9 slideno. 21

Optimized Reversible Data Hiding Technique for Secured Data Transmission

Page 22: Reversible data hiding using histogram shifting method

CONCLUSION

This algorithm can achieve a better performance compared with the state-of-the-art works. So the proposed framework has a potential to provide excellent RDH algorithms.

TE(IT)seminar 14/3/2016 pgno.11 slideno.22

Optimized Reversible Data Hiding Technique for Secured Data Transmission

Page 23: Reversible data hiding using histogram shifting method

TE(IT)seminar 14/3/2016 pgno. slideno. 23

Optimized Reversible Data Hiding Technique for Secured Data Transmission