Reversible Datahiding Using Reserved Room Approach with Magic Rectangle Encryption

Similar documents
A New Approach to Compressed Image Steganography Using Wavelet Transform

Encrypting the Auto Detected Face Part of Human in a Image Using RC4 and Hiding the Data in Image

Digital Image Steganography Techniques: Case Study. Karnataka, India.

A Data Hiding Model for Image Steganography Using Primes: Towards Data Security

Reversible Data Hiding VIA Optimal Code for Image

Robust DWT Based Technique for Digital Watermarking

SECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method

Concealing Information in Images using Progressive Recovery

[2014] Steganography Using Prime Technique. Vinam Tomar. Kamal Saluja. Authors. Guided By-

A Framework to Reversible Data Hiding Using Histogram-Modification

Implementation of Random Byte Hiding algorithm in Video Steganography

GA Based Reversible Data Hiding in Encrypted Images by Reserving Room before Encryption

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature

Reversible Data Hiding in Encrypted Images with Private Key Cryptography

Random Traversing Based Reversible Data Hiding Technique Using PE and LSB

Vertex Magic Total Labeling of Complete Graphs and their application for Public-Key Cryptosystem

Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image

An Efficient Algorithm for Reversible Data Hiding in Encrypted Images by RRBE

Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography

A DWT Based Steganography Approach

A Novel Method for Compressing Encrypted Images using Auxiliary Information

Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program

Metamorphosis of High Capacity Steganography Schemes

Efficient Image Steganography Using Integer Wavelet Transform

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information

Implementation of Lifting-Based Two Dimensional Discrete Wavelet Transform on FPGA Using Pipeline Architecture

LSB Based Audio Steganography Using Pattern Matching

A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD BASED ON HISTOGRAM MODIFICATION AND VISUAL CRYPTOGRAPHY. Hang-Yu Fan and Zhe-Ming Lu

CHAPTER 6. LSB based data hiding with double Encryption. 6.1 Introduction

Secret Video Data Hiding with Images Embedding Using Media Data Chunking and Embedding Algorithms

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS

Secured Double Layer Data Hiding Using Encryption and Decryption Techniques

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

Region Based Even Odd Watermarking Method With Fuzzy Wavelet

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

Adaptive Pixel Pair Matching Technique for Data Embedding

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

A New hybrid method in watermarking using DCT and AES

Data Embedding Method Using Adaptive Pixel Pair Matching Algorithm

Efficient & Secure Data Hiding Using Secret Reference Matrix

Reversible Image Data Hiding Using Public Key Modulation over an Encrypted Domain

Improved Qualitative Color Image Steganography Based on DWT

Comparison of Digital Water Marking methods

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

International Journal of Computer Engineering and Applications,

Architectural Design of Multi Level Steganography System for Data Transmission

Fidelity Analysis of Additive and Multiplicative Watermarked Images in Integrated Domain

Random Image Embedded in Videos using LSB Insertion Algorithm

International Journal of Advance Research in Engineering, Science & Technology

Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography

SECURED TRANSMISSION OF BIOMETRIC CONTENT USING VISUAL CRYPTOGRAPHY

HYBRID TRANSFORMATION TECHNIQUE FOR IMAGE COMPRESSION

A Reversible Data Hiding Scheme for BTC- Compressed Images

Comparative Study between DCT and Wavelet Transform Based Image Compression Algorithm

LECTURE NOTES ON PUBLIC- KEY CRYPTOGRAPHY. (One-Way Functions and ElGamal System)

Research Article International Journals of Advanced Research in Computer Science and Software Engineering ISSN: X (Volume-7, Issue-6)

A Digital Video Watermarking Algorithm Based on LSB and DCT

Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique Using Hadamard Transform Domain

IMAGE DIGITIZATION BY WAVELET COEFFICIENT WITH HISTOGRAM SHAPING AND SPECIFICATION

MODIFIED RECURSIVE MODULO 2 N AND KEY ROTATION TECHNIQUE (MRMKRT) Rajdeep Chakraborty* 1, Avishek Datta 2, J.K. Mandal 3

A Combined Encryption Compression Scheme Using Chaotic Maps

ROBUST VIDEO DATA HIDING USING FORBIDDEN ZONE DATA HIDING AND SELECTIVE EMBEDDING

Secret Key Cryptography

Comparative Analysis of Different Spatial and Transform Domain based Image Watermarking Techniques

Digital Watermarking Using 2-DCT

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach

[Singh*, 5(3): March, 2016] ISSN: (I2OR), Publication Impact Factor: 3.785

A Novel Information Security Scheme using Cryptic Steganography

VLSI Implementation of Daubechies Wavelet Filter for Image Compression

Digital Watermarking Algorithm for Embedding Color Image using Two Level DWT

Steganography using MATLAB

Feature Based Watermarking Algorithm by Adopting Arnold Transform

Image Error Concealment Based on Watermarking

Image Enhancement in Digital Image Watermarking Using Hybrid Image Transformation Techniques

RGB Digital Image Forgery Detection Using Singular Value Decomposition and One Dimensional Cellular Automata

Extended Adaptive Pixel Pair Matching

Improved Reversible Data Hiding in Encrypted Images Based on Reserving Room After Encryption and Pixel Prediction

Appendix A. Definition of Terms

Reversible Steganographic Technique Based on IWT for Enhanced Security

Knowledge Exploration in Image Text Data using Data Hiding Scheme

[Patil* et al., 5(7): July, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

IMAGE COMPRESSION USING HYBRID TRANSFORM TECHNIQUE

Watermarking Moble Phone Color Images With Error Correction Codes

Vol. 1, Issue VIII, Sep ISSN

Review On Secrete Sharing Scheme for Color Image Steganography

Comparative Analysis of Different Transformation Techniques in Image Steganography

Topics. Number Theory Review. Public Key Cryptography

An Efficient Compression of Strongly Encrypted Images using Error Prediction, AES and Run Length Coding

CHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING. domain. In spatial domain the watermark bits directly added to the pixels of the cover

Keywords Stegnography, stego-image, Diamond Encoding, DCT,stego-frame and stego video. BLOCK DIAGRAM

International Journal of Advanced Research in Computer Science and Software Engineering

A New Technique to Digital Image Watermarking Using DWT for Real Time Applications

Digital Watermarking: Combining DCT and DWT Techniques

Image Watermarking with Biorthogonal and Coiflet Wavelets at Different Levels

INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN ENGINEERING AND TECHNOLOGY WINGS TO YOUR THOUGHTS.. Design of a Cryptosystem Using Two-Level Hill Cipher

International Journal of Innovative Research in Computer and Communication Engineering

Survey paper - Audio-Video Steganography Using Anti Forensics Technique

Transcription:

IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 19, Issue 3, Ver. I (May.-June. 2017), PP 01-05 www.iosrjournals.org Reversible Datahiding Using Reserved Room Approach with Magic Rectangle Encryption P.Subashini 1, Jaspal Singh 2, Adipta Biswas 3 1. Assistant Professor Department Of Computer Science and Engineering, SRM University, Chennai, India, 2.UG Scholar Department Of Computer Science and Engineering, SRM University, Chennai, India, 3. UG Scholar Department Of Computer Science and Engineering SRM University, Chennai. India, Abstract: In this project, we are trying to promote security to the data using developed encryption techniques. The image is encrypted using Magic Rectangle (MR) encryption technique, and text using the RSA algorithm with LSB as data concealment technique. The data hiding technique uses LSB replacement algorithm for hiding the secret message bits into encrypted image. By choosing the decryption keys, both the image and encrypted text will be extracted. Keywords: Reversible data hiding, MR encryption, LSB replacement, RSA key encryption. I. Existing Method It is widely used in medical and military purpose for secret data communication. In this system vacating room after encryption(vrae) is used for allocating the space to hide the data and the pixel difference expansion methods are used. The pixel difference expansion based RDH is the spatial domain process to hide secret text messages within an image. The process involves the adjacent pixel to get subtracted to determine the difference in values. The message bits are affected by the difference produced. This technique produces spatial distortion which reduces the quality of the image produced and it is less compatible. It distorts the image quality wherever the secret message bits are hidden. This will eradicate by the method of least significant bits(lsb). II. Proposed System In this system, the Chaos Encryption is being replaced with Magic Rectangle for image encryption, and RSA algorithm is used for text encryption and decryption with LSB as data concealment. MR is used to check the existing problems of public key cryptosystem. MR is helpful in enhancing the security as in terms of its complexity of the encryption process, and it does not change the quality of the image. It also introduces an additional feature of security in the public key algorithm. III. Methodology Lifting Wavelet Transform The lifting wavelet transform is widely used in signal processing in general and in image compression research. In application, such as still image compression, discrete wavelets transform(dwt) based schemes have outperformed other coding schemes like the ones based on DCT. Since there is no need to divide the input image into nonoverlapping 2-D blocks and its basis functions have variable length, wavelet-coding schemes at higher compression ratios avoid blocking articles. Because of their inherent multi-resolution. Forward transform Step 1: Column wise processing to get H and L H= (Co-Ce); L=(Ce+H/2) Where Co and Ce is the odd column and even column wise pixel values. Step 2: Row wise processing to get LL, LH, HL and HH, Separate odd and even rows of H and L, Namely, Hodd-odd row of H, Lodd-odd row of L, Heven-even row of H Leven-even row of L LH=Lodd-Leven; LL=Leven+(LH/2) HH=Hodd-Heven; HL=Hodd-Heven; HL=Heven + (HH/2) DOI: 10.9790/0661-1903010105 www.iosrjournals.org 1 Page

Reverse lifting Scheme Inverse Integer wavelet transform is formed by the reserve lifting scheme. Procedure is like the forward lifting scheme. Recently the JPEG committee has released its new image coding standard. Image Encryption The plan image is converted into blocks of single bytes and then the block is replaced as the valve of MR. Further, the control parameter of the magic rectangle (MR) selected by the user. The images used will have three bytes extracted, the byte values are transposed as MR values and further encrypted to obtain the cypher text. The numerical process of the MR is displaced from their respective position and encrypted to obtain the cypher text. Therefore, the size of the image is negligible during encryption and decryption. Fig.1 Cover Image Fig.2 Encrypted Image Magic Square The magic square is same as like a magic rectangle. A magic square is defined as an arrangement of integers of the order nxn matrix. The important feature of a magic square is that the sum of all the elements in every column, row and along the two main diagonals are equal. The magic constant of a magic square depends only on n and has the value: M (n) =n (n 2 +1) / 2 Magic square can be classified into three types: odd, doubly even (n divisible by four), singly even (n is even and not divisible by four). Magic Rectangle A magic rectangle of order (mxn) is an arrangement of integers such that the sums of all the elements in every row as well as every column are equal.the magic rectangle is in the category of singly even.ie, the order of the matrix is even but not divisible by the numeral 4 such as 4x6, 8x12, 16x24, 32x48 and so on. Any order with even number can be used in this work. It can be followed only the order 4x6, 8x12, 16x24, 32x48 etc. The size of the rectangle is purely based on the rules of perfect rectangle or golden rectangle and the singly even magic rectangle. It also follows the methodology of divide and conquer strategy. In magic rectangle, column sum is fixed as 32x48. The existing column sum is divided by two and then apply in 16x24, again further the column sum is divided by two and apply in 8x12 matrix etc. This approach is adopted from divide and conquer strategy. The column sum is taken as even value, then it matches exactly in magic rectangle. In case if the column sum is taken as odd value, then the column sum is reduced by one because of fractional values. This paper focuses only a singly even magic rectangle implementation and their usefulness for public key cryptosystem for image encryption and decryption process i.e. the order of magic rectangle must be even. Creation of singly even magic rectangle In this work, the singly even magic rectangle is generated by using any seed number, starting number and magic sum. The numbers are generated in consecutive order. DOI: 10.9790/0661-1903010105 www.iosrjournals.org 2 Page

The proposed work uses the notations as listed below: MR: Magic Rectangle Nxm: Order of MR where n=4a and m=6a where a=1, 2, 4, 8 etc. MR nxm : MR of order nxm MRB 4x6 :Base MR of order 4x6 MRnxm rsum :Row sum of MR of order nxm MRnxm csum :Column sum of MR of order nxm The values in the MRB 4x6 are filled as shown in Table 1. The function is called MR4x6 fill order (Min start, Max start ). Table : Magic Rectangle Filling Order Max start *(+2) *(+4) -6-16 *(+16) *(+8) -10-12 *(+14) *(+24) -24-14 *(+12) *(+10) -8-30 *(+30) *(+6) -4-2 *Min start *(+22) -22 In above table, * represents the places in magic rectangle to be filled having its starting point from Min start and incremented by 2 each time to get the next number. The places without * in magic rectangle to be filled having its starting point from Max start and decremented by 2 to get the next number. //Encryption algorithm Input: Image file (gif/bmp/jpg) Output: Cipher text(numeric Value) Method: Step1: Read Image File Step2: Covert Image file into Sequence of bytes Array Step3: For i= 0 to Barray.length //Bytearray Flag=0; If Barray[i] <0 then pos=-barray[i]; Flag=1; end else pos= Barray[i]; Rarray[i]=MRarray[pos]; /*MagicRectagle array and Result Step 4: Encrypt using Algorithm If Flag=1 then Cipher[i]=-Cipher[i]; //Cipher array End Step 5: Produce Cipher Text array*/ ASSYMETRIC KEY CRYPTOGRAPHY Cryptography allows secure transmission of data over insecure passage. Cryptography also allows safe storage of sensitive data on any computer. RSA- Public Key Cryptography Public key (E) and modulus N are known to all user s private key(d) (Secret key) provides Authentication / Encryption signing / Decryption operation Verifying/ Encryption operation will be done by: Where, C-each character of input text message. N=p*q where, Cyphertext = C^E mod N N-modulus-parameter p & q- two largest prime number obtained from user given 8-bit key. DOI: 10.9790/0661-1903010105 www.iosrjournals.org 3 Page

DATA CONCEALMENT Steganography is a method of embedding addition information into the digital content that is undetectable to listeners. The idea behind the LSB algorithm is to insert the bits of text into the least significant bits of pixels. The most frequently used steganography method is the technique of the LSB substitution. Altering the LSB will only cause minor change in colour, and this is usually not noticeable to the human eye. This technique works well for 24-bit colour image file. Advantage-The advantage of LSB is its simplicity to embed the bits of the message directly into the LSB plane of the cover image. Modulating the LSB does not result in human perceptible difference because the amplitude of change is small. Therefore, to the human eye the resulting stego image will look identical to the cover image. Least Significant Bit(LSB) In LSB, the RGB values of color image are taken and the color image is converted into grey image. The 256 * 256 intensities values are obtained. Then, the next step is to embed a message into an image. The message is embedded in the intensity values of image obtained during image to matrix conversion. The intensity values are converted to image back. Both the images are identical. DECRYPTION PROCESS Decryption of Image: //Decryption Algorithm: Input: Cipher Text (Numeric Value) Output: Image file (gif/bmp/jpg ) Method: Step1: Read Cipher text Step2: For i= 0 to Cipher.length //cipher array Flag=0; If Cipher[i] <0 then Cipher[i]=-Cipher[i]; Flag=1; End Step 3: Decrypt using Algorithm Pos =Marray[i]; //MagicRectaglearray If Flag=1 then Barray[i]=-Pos Step 4: Convert Byte Array into Image Step 5: Produce Original Image Decryption of text: Data decryption will be done by: Plaintext= Cypher^ D mod N. Extracting the message: (i) Declare the message byte. (ii) Here, the size of the message is 8-bits. (iii) Read each pixel, starting address=0. (iv) Extract LSB & replace ith bit in the message byte where i=1 to 8, when i=8 a byte is extracted. DOI: 10.9790/0661-1903010105 www.iosrjournals.org 4 Page

i=8 a byte is extracted. IV. Conclusion The project presented that protection of image quality and hidden data during transmission, based on the approach of reserve room technique and MR encryption with LSB based data concealment. References [1]. Champakamala B.S Padmini.K, Radhika D.K Asst Professor Least Significant Bit algorithm for Image Steganography,International Journal of Advance Computer Technology,volume 3,Number 4. [2]. KedaMa,Weiming Zhang, Xianfeng Reserving room before Encryption.IEEETrans.Information Forensics and Security, vol 8 No.3 March 2013. [3]. M. Johnson, P. Ishwar, +V.M.Prabhakaran,D.Schonberg, and K.Ramchandran, On compressing encrypted data, IEEE Trans. Signal Process.,vol.52,no. 10,pp.2992-3006,Oct. 2004. [4]. W. Liu, W.Zeng, L.Dong, and Q.yao, Efficient compression of encrypted grayscale images, IEEE Trans. Image Process., vol 19,no.4,pp.107-1102, Apr.2010 [5]. X. Zhang, Lossy compression and iterave reconstruction for encrypted image, IEEE Trans. Inform. Forensics Sceurity, vol.6,no. 1,pp. 53-58,Feb.2011. [6]. T.Bianchi, A.Piva, and M.Barni, On the implementation of discrete Fourier transform in tge encrypted domain, IEEE Trans. Inform. Forensics Security, vol.4, no.1,pp.86-97,feb.2009. [7]. KedaMa,Weiming Zhang, Xianfeng Zhao Reversible Data Hiding in Encrypted images by Reserving Roomm Before Encryption,IEEETrans.Information Forensics and Security.,vol 8 No.3 March 2013. [8]. M. Johnson, P. Ishwar, V. M. Prabhakaran, D. Schonberg, and K. Ramchandran, On compressing encrypted data, IEEE Trans. Signal Process., vol. 52, no. 10, pp. 2992 3006, Oct. 2004. [9]. W. Liu, W. Zeng, L. Dong, and Q. Yao, Efficient compression of encrypted grayscale images, IEEE Trans. Image Process., vol. 19, no. 4, pp. 1097 1102, Apr. 2010 [10]. X. Zhang, Lossy compression and iterative reconstruction for encrypted image, IEEE Trans. Inform. Forensics Security,vol. 6, no. 1, pp. 53 58, Feb. 2011. [11]. T. Bianchi, A. Piva, and M. Barni, On the implementation of the discrete Fourier transform in the encrypted domain, IEEE Trans. Inform. Forensics Security, vol. 4, no. 1, pp. 86 97, Feb. 2009. [12]. A.J.Menezes,P.C.Van Oorschot, and S.Vanstone, Handbook of Applied cryptography, CRC Press, Boca Ration,Florida, USA,1997. [13]. Gopinath Ganapathy, and K.Mani, Add-On Security Model for publickey Cryptosystem Based on Magic Square Implementation, ISBN 978-988-17012-6-8, Proceedings of the world congress on Engineering and Computer Science 2009 Vol I, San Fransisco, USA. DOI: 10.9790/0661-1903010105 www.iosrjournals.org 5 Page