Sunteți pe pagina 1din 32

AN IMPROVED REVERSIBLE

DATA HIDING IN ENCRYPTED


JPEG BITSTREAMS

Presented by,
Sruthi Suresh
MTECH CSE S3
TOC18CSDS03
CONTENTS

11/17/2019
 INTRODUCTION
 EXISTING SYSTEM

 PROPOSED SYSTEM

 MODULES

 SYSTEM DESIGN

 EXPECTED OUTPUT

 CONCLUSION

 REFERENCES

2
INTRODUCTION

11/17/2019
 Reversible data hiding(RDH) embed the additional and secret
message into cover media.
 It perform a reversible procedure that extracts the hidden secret
message.
 Perfectly reconstructs the original data.

3
JPEG FORMATION

11/17/2019
4
JPEG COMPRESSION

11/17/2019
5
11/17/2019
6
11/17/2019
7
11/17/2019
8
LITERATURE SURVEY

11/17/2019
9
11/17/2019
10
11/17/2019
11
REVERSIBLE DATA HIDING IN
JPEG IMAGES[2015]

11/17/2019
 histogram shifting-based RDH scheme for JPEG images is proposed
 non-zero AC coefficients in DCT are represented by N = (N 1 , N 2 , ... , N m ),
where M represents the
 number of all nonzero AC coefficients in the JPEG image. They concluded
that most of the peak points of the
 AC coefficient histograms are located at points 1 and -1. The embedding
algorithm of their method is
 described as:
 N i ' = Ni + sign(Ni)*s if|Ni|=1
 N i' = Ni + sign (N i ) if |Ni|>1
 s indicates the secret information bit to be embedded and N i ' denotes the
corresponding 12
 hidden AC coefficients in the marked JPEG image.
11/17/2019
 Disadvantages
 zero coefficients remain unchanged and only coefficients with
values 1 and −1 are expanded to carry message bits.
 method has low hiding capacity because it only embeds message
bits in AC coefficients with values of 1 and -1.

13
IMPROVED JOINT REVERSIBLE DATA
HIDING IN ENCRYPTED IMAGE[2016]

11/17/2019
 an image owner encrypts the original image using a stream cipher
algorithm and uploads the ciphertext to a remote server.
 On server side, The combination of cyclic-shifting and data-
swapping is used to embed additional messages into the ciphered
image.
 After downloading the marked encrypted image from the server
and implementing the decryption, a recipient can extract the
hidden messages and losslessly recover the original image.

14
11/17/2019
 Disadvantages
 data extraction must be done after image decryption.

 This limitation makes the technique less useful in cloud storage.

15
HIDING SCHEME FOR ENCRYPTED JPEG
BITSTREAMS[2017]

11/17/2019
 The proposed system uses “reserving-room-before-encryption
(RRBE)” framework.
 Before encrypting the JPEG bitstream, the content owner first
reserves space on the original JPEG bitstream and encrypts the
modified JPEG bitstream.
 The data hider embeds the secret data into the spare space which
is previously reserved by the content owner.
 Receiver can extract the secret data by the data-hiding key and can
recover the original JPEG bitstream by the encryption key.

16
11/17/2019
 Advantages
 Data extraction and image recovery are seperable.

 disadvantages

 the owner is also required to do preprocessing, i.e., generating


spare rooms before encryption.
 the length of encrypted

 bitstream keeps unchanged after data hiding, which leads to a


limited embedding capacity.

17
PROBLEM DEFINITION

11/17/2019
18
PROPOSED SYSTEM
 Focuses on labeling encrypted JPEG images on

11/17/2019
cloud storage.
 Three parties:
 image owner

 cloud server

 authorized user

 Owner encrypts JPEG bitstream,uploads to cloud. 19


 Cloud server embeds messages into encrypted
bitstream to generate a marked encrypted

11/17/2019
bitstream.
 Hidden messages are extracted from marked
encrypted bitstream.
 Server recovers original encrypted
bitstream,when user required.
 After decryption, the user obtains the original 20

JPEG image.
11/17/2019
21
MODULES

11/17/2019
 IMAGE OWNER
 CLOUD SERVER

 AUTHORIZED USER

22
11/17/2019
23
11/17/2019
24
11/17/2019
25
SYSTEM DESIGN

11/17/2019
26
11/17/2019
Kenc

Kenc
27
11/17/2019
28
EXPECTED OUTPUT

11/17/2019
29
CONCLUSION

11/17/2019
30
REFERENCES

11/17/2019
31
11/17/2019
THANK YOU
32

S-ar putea să vă placă și