An Efficient Data Security System Using Reserve Room Approach On Digital Images For Secret Sharing
An Efficient Data Security System Using Reserve Room Approach On Digital Images For Secret Sharing
Volume: 2 Issue: 3
ISSN: 2321-8169
524 532
______________________________________________________________________________________________
Index TermsReversible data hiding, Lifting wavelet transform, chaos encryption, Adaptive LSB replacement
__________________________________________________*****________________________________________________
I. INTRODUCTION
Reversible data hiding is a process in which original cover
image can be losslessly recovered without any loss after the
embedded message is recovered. This technique is widely used
in secrete data communication in defense, research institute,
Medical information protection. Here data and the original
cover image will be recovered without any loss.
In [1] to overcome the drawbacks of Reversible Data
Hiding Kalker and willems introduced a recursive code
construction, which does not reach the expected bounds. In [2]
Zhang improved recursive code construction by designing a
data embedding for all zero-covers and a more efficient
compression algorithm, it reaches the average bound.
In [3] Tians difference expansion technique is a high
capacity, reversible method for data embedding. In this
method he improved the redundancy in digital images in order
to achieve very high embedding capacity, and keeps the
distortion low.
The above method suffers from undesirable distortion at
low embedding capacity. To overcome this problem Thodi [4]
introduced a technique called Prediction- error expansion. His
new technique better exploits the correlation inherent in the
neighborhood of a pixel than the difference expansion scheme.
To avoid the drawbacks of PEE [5] Yang and Zeng further
investigated the PEE they proposed a two new strategies
named, adaptive embedding and pixel expansion. Unlike
conventional PEE which embeds data uniformly they proposed
to adaptively 1 or 2 bits into expandable pixel according to the
local complexity. This avoids expanding pixels with large
prediction-errors, and thus, it reduces embedding impact by
decreasing the maximum modification to pixel values.
______________________________________________________________________________________
ISSN: 2321-8169
524 532
______________________________________________________________________________________________
unchanged still it is decrypted using the encryption key. The
receiver who has both the encryption and data hiding keys can
access the data embedded as well as the original image. In
[10], Kede Ma and Zhang, in which they first empty out room
by embedding LSBs of some pixels into other pixels with a
traditional RDH method and then encrypt the image, so the
positions of these LSBs in the encrypted image can be used to
embed data.
This paper is organized in the following manner.
Section II briefly introduces previous methods proposed in
[8][9]. The novel method is elaborated in Section III followed
by Section IV. The paper is concluded in Section
II. PREVIOUS ARTS
The methods proposed in [8]-[9] can be summarized as
the framework.
Hong and Chen [8] Zhang's work did not fully exploit
the pixels in calculating the smoothness of each block and did
not consider the pixel correlations in the border of neighboring
blocks. These two issues could reduce the correctness of data
extraction, but this method adopts a better scheme for
measuring the smoothness of blocks, and uses the side-match
scheme to further decrease the error rate of extracted-bits. The
experimental results reveal that the proposed method offers
better performance over Zhang's work.
In the above two methods, the data extraction depends
on the image decryption but in [9], Zhang proposed a method,
in that the image is encrypted by the content owner by using
encryption key. The data hider can hide the data in the
encrypted image to obtain the space to hide the data by using
data hiding key. At the receiver side the data can be retrieved
using the data hiding key by decrypting an image.
The above two methods are used to vacate the room
after encryption. However, since the entropy of encrypted
images has been maximized, [8]-[9] or generate marked image
with poor quality for large payload But the encrypted image
unchanged still it is decrypted using the encryption key. The
receiver who has both the encryption and data hiding keys can
access the data embedded as well as the original image. In
[10], Kede Ma and Zhang, in which they first empty out room
by embedding LSBs of some pixels into other pixels with a
traditional RDH method and then encrypt the image, so the
positions of these LSBs in the encrypted image can be used to
embed data.
III.PROPOSED METHOD
The project proposes the enhancement of protection
system for secret data communication through encrypted data
concealment in encrypted images with reserve room approach.
To preserve an image quality during image recovery, reserving
room approach is used to reserve space for embedding a
privacy text messages. Here, chaos encryption is used to
scramble an image except reserved space to make protection of
] 2 dt
525
IJRITCC | March 2014, Available @ http://www.ijritcc.org
______________________________________________________________________________________
ISSN: 2321-8169
524 532
______________________________________________________________________________________________
BLOCK DIAGRAM:
FIGURE A: Encryption and Embedding:
RGB Input
Image
Plane
Separatio
n
MSD
Secret
Data
Chaotic
Encryption
Detailed
Coeff.
Extraction
Data
Concealment
Chaotic
Encryption
Reconstructed
Image
Quality
Measurement
FIGURE B: Decryption and Data Extraction:
Encrypted
Stego Image
Plane
Separation
Data
Extraction
Decryption
Chaos
Decryption
Plane
Concatenation
Recovered text
Data
Recovered
Original Image
Figure (A).Framework: Reserving the room for embedding and the image is encrypted.
Figure (B).Framework: Decryption for recovering the original image and data extraction.
526
IJRITCC | March 2014, Available @ http://www.ijritcc.org
______________________________________________________________________________________
ISSN: 2321-8169
524 532
______________________________________________________________________________________________
High-frequency sub band contains the edge information of
input image. These coefficients are selected as reserved space
foe hiding the text data. The secret text data is embedded
into the wavelet coefficients of high frequency subbands
because it is non sensitive to human visual system. The basis
set of wavelets is generated from the mother or basic wavelet
is defined as:
1
a,b(t) =
t b
B.2-D Transform:
The 1-D DWT can be extended to 2-D transform using
separable wavelet filters. With separable filters, applying a 1D transform to all the rows of the input and then repeating on
all of the columns can compute the 2-D transform. When onelevel 2-D DWT is applied to an image, four transform
coefficient sets are created. As depicted in Figure 3.2(c), the
four sets are LL, HL, LH, and HH, where the first letter
corresponds to applying either a low pass or high pass filter to
the rows, and the second letter refers to the filter applied to the
columns.
LL1
HL1
LH1
HH1
______________________________________________________________________________________
ISSN: 2321-8169
524 532
______________________________________________________________________________________________
Where Co and Ce is the odd column and even column wise
pixel values.
Step 1: Column wise processing to get H and L
Step 2: Row wise processing to get LL,LH,HL and HH,
Separate odd and even rows of H and L, Namely, Hodd odd
row of H, Lodd -odd row of L, Heven- even row of H, Leven
even row of L.
LH = Lodd-Leven; LL = Leven + (LH / 2)
HH = Hodd Heven; HL = Heven + (HH /2)
Reverse Lifting scheme:
Inverse Integer wavelet transform is formed by Reverse lifting
scheme. Procedure is similar to the forward lifting scheme.
D. Image Encryption:
This method is one of the advanced encryption standard to
encrypt the image for secure transmission .It encrypts the
original image pixel values with encryption key value
generated from chaotic sequence with threshold function by
bit XOR operation . Here logistic map is used for generation
of chaotic map sequence. It is very useful to transmit the secret
image through unsecure channel securely which prevents data
hacking. The chaotic systems are defined on a complex or real
number space called as boundary continuous space. Chaos
theory generally aims that to recognize the asymptotic
activities of the iterative progression.
Chaotic Encryption Scheme:
using
Difference
______________________________________________________________________________________
ISSN: 2321-8169
524 532
______________________________________________________________________________________________
Let us see how to encode and decode the hidden data:
1 pixel:
(00100111 11101001 11001000)
Insert 101: (00100111 11101000 11001001)
(Red -
Green
Blue)
10
11)
00
11
11)
{White-white-blue- blue}
Advantages of LSB Insertion:
1.
Take the transform of the modified image.
2. Find the coefficients below a certain threshold.
3. Extract bits of data from these coefficients
4. Combine the bits into an actual message
Least significant bit insertion:
In random LSB insertion methods, a pseudo-random
number generator is used to randomly distribute and hide the
bits of a secret message into the least significant bits (LSBs) of
the pixels within a carrier image, called the cover image. A
popular approach to achieve this is the random interval
______________________________________________________________________________________
ISSN: 2321-8169
524 532
______________________________________________________________________________________________
Cryptography:
1
N
( f [ j, k ] g[ j, k ])
j ,k
Where the sum over j, k denotes the sum over all pixels
in the image and N is the number of pixels in each image.
From that the peak signal-to-noise ratio is defined as the
ratio between signal variance and reconstruction error
variance. The PSNR between two images having 8 bits per
pixel in terms of decibels (dBs) is given by:
255 2
MSE
PSNR = 10 log10
Cryptography VS Steganography:
Cryptography is the science of encrypting data in such a way
that nobody can understand the encrypted message, whereas in
steganography the existence of data is conceived means its
presence cannot be noticed. The information to be hidden is
embedded into the cover object which can be text, image,
audio or video so that the appearance of cover object doesnt
530
______________________________________________________________________________________
ISSN: 2321-8169
524 532
______________________________________________________________________________________________
vary
even
after
the
information
is
hidden.
Information to be hidden + cover object = stego object. To add
more security the data to be hidden is encrypted with a key
before embedding. To extract the hidden information one
should have the key. A stego object is one, which looks
exactly same as cover object with an hidden information.
Simulated result:
a) Original Image and its B Plane:
VI. CONCLUSION
IV.REFERENCES
[1]. T. Kalker and F. M. Willems, Capacity bounds and
code constructions for reversible data-hiding, in Proc.
14th Int. Conf. Digital Signal Processing (DSP2002), 2002,
pp. 7176.
[2].W. Zhang, B. Chen, and N. Yu, Capacity-approaching
codes for reversible data hiding, in Proc 13th Information
c) Encrypted Image and its Recovery:
2010.
531
IJRITCC | March 2014, Available @ http://www.ijritcc.org
______________________________________________________________________________________
ISSN: 2321-8169
524 532
______________________________________________________________________________________________
encrypted image, IEEETrans. Inf. Forensics Security, vol.
[7].X. Zhang, Reversible data hiding in encrypted
images, IEEE Signal Process. Lett., vol. 18, no. 4, pp.
255258, Apr. 2011.
[8].W. Hong, T. Chen, and H. Wu, An improved
reversible data hiding in encrypted images using side
match, IEEE Signal Process. Lett., vol. 19, no. 4, pp. 199
202, Apr. 2012.
[9].X. Zhang, Separable reversible data hiding in
532
IJRITCC | March 2014, Available @ http://www.ijritcc.org
______________________________________________________________________________________