Documente Academic
Documente Profesional
Documente Cultură
Presented by,
Sruthi Suresh
MTECH CSE S3
TOC18CSDS03
CONTENTS
11/17/2019
INTRODUCTION
EXISTING SYSTEM
PROPOSED SYSTEM
MODULES
SYSTEM DESIGN
EXPECTED OUTPUT
CONCLUSION
REFERENCES
2
INTRODUCTION
11/17/2019
Reversible data hiding(RDH) embed the additional and secret
message into cover media.
It perform a reversible procedure that extracts the hidden secret
message.
Perfectly reconstructs the original data.
3
JPEG FORMATION
11/17/2019
4
JPEG COMPRESSION
11/17/2019
5
11/17/2019
6
11/17/2019
7
11/17/2019
8
LITERATURE SURVEY
11/17/2019
9
11/17/2019
10
11/17/2019
11
REVERSIBLE DATA HIDING IN
JPEG IMAGES[2015]
11/17/2019
histogram shifting-based RDH scheme for JPEG images is proposed
non-zero AC coefficients in DCT are represented by N = (N 1 , N 2 , ... , N m ),
where M represents the
number of all nonzero AC coefficients in the JPEG image. They concluded
that most of the peak points of the
AC coefficient histograms are located at points 1 and -1. The embedding
algorithm of their method is
described as:
N i ' = Ni + sign(Ni)*s if|Ni|=1
N i' = Ni + sign (N i ) if |Ni|>1
s indicates the secret information bit to be embedded and N i ' denotes the
corresponding 12
hidden AC coefficients in the marked JPEG image.
11/17/2019
Disadvantages
zero coefficients remain unchanged and only coefficients with
values 1 and −1 are expanded to carry message bits.
method has low hiding capacity because it only embeds message
bits in AC coefficients with values of 1 and -1.
13
IMPROVED JOINT REVERSIBLE DATA
HIDING IN ENCRYPTED IMAGE[2016]
11/17/2019
an image owner encrypts the original image using a stream cipher
algorithm and uploads the ciphertext to a remote server.
On server side, The combination of cyclic-shifting and data-
swapping is used to embed additional messages into the ciphered
image.
After downloading the marked encrypted image from the server
and implementing the decryption, a recipient can extract the
hidden messages and losslessly recover the original image.
14
11/17/2019
Disadvantages
data extraction must be done after image decryption.
15
HIDING SCHEME FOR ENCRYPTED JPEG
BITSTREAMS[2017]
11/17/2019
The proposed system uses “reserving-room-before-encryption
(RRBE)” framework.
Before encrypting the JPEG bitstream, the content owner first
reserves space on the original JPEG bitstream and encrypts the
modified JPEG bitstream.
The data hider embeds the secret data into the spare space which
is previously reserved by the content owner.
Receiver can extract the secret data by the data-hiding key and can
recover the original JPEG bitstream by the encryption key.
16
11/17/2019
Advantages
Data extraction and image recovery are seperable.
disadvantages
17
PROBLEM DEFINITION
11/17/2019
18
PROPOSED SYSTEM
Focuses on labeling encrypted JPEG images on
11/17/2019
cloud storage.
Three parties:
image owner
cloud server
authorized user
11/17/2019
bitstream.
Hidden messages are extracted from marked
encrypted bitstream.
Server recovers original encrypted
bitstream,when user required.
After decryption, the user obtains the original 20
JPEG image.
11/17/2019
21
MODULES
11/17/2019
IMAGE OWNER
CLOUD SERVER
AUTHORIZED USER
22
11/17/2019
23
11/17/2019
24
11/17/2019
25
SYSTEM DESIGN
11/17/2019
26
11/17/2019
Kenc
Kenc
27
11/17/2019
28
EXPECTED OUTPUT
11/17/2019
29
CONCLUSION
11/17/2019
30
REFERENCES
11/17/2019
31
11/17/2019
THANK YOU
32