Revesable Data Hiding:Steganography

SKU: PAN_IPM_073 Categories: ,

Description

Revesable Data Hiding:Steganography

ABSTRACT:

The main part of the project is to give security to the images by hiding the data. For this security analysis, we are using cryptography for giving security keys.this application will be given at the time of film application, social media applications, and multimedia applications. Information Security has always been a very substantial facet when it comes to hindering unauthorized access, destruction, or inspection of confidential data. Today every field in the world makes use of multimedia information. There is a need to secure the confidential information used in these areas. There are multiple approaches to secure information. One of them is Steganography, which is nothing but hiding the information inside other data such that there is no detectable change in cover information. The auxiliary technique of securing information is cryptography, an encryption technique that scrambles the information into a scribbled form which is generally referred to as a cipher. Both Steganography and Cryptography have their own advantages and limitations. Even though both methods provide security, to add multiple layers of security it is always a good practice to use Cryptography and Steganography together. So when cryptography and steganography are used together, it results in a multi-layer security model. The main objective of the proposed work is to provide an extra layer of security by introducing cryptography along with steganography to encrypt and embed the confidential information


Revesable Data Hiding:Steganography

 INTRODUCTION:

Cryptography is an encryption technique that disarranges the information into some particular form so that only the intended user can read and process it. Steganography is an act of hiding messages in such a way that the only recipient can make out the existence of the message [1]. Cryptography and Steganography received little attention in computing. Many ciphers are shown vulnerable to cryptanalytic attacks and many stage techniques are easily detectable. Hence the need arises to provide better security by combining these two techniques. Here, in the case of failing the steganography system, secret messages remain safe because of the encoding technique. Steganography is not a replacement for cryptography but rather a to supplementation it. 

 Cryptography is an encryption technique that disarranges the information into some particular form so that only the intended user can read and process it. Steganography is an act of hiding messages in such a way that the only recipient can make out the existence of the message [1]. Cryptography and Steganography received little attention in computing. Many ciphers are shown vulnerable to cryptanalytic attacks and many stage techniques are easily detectable. Hence the need arises to provide better security by combining these two techniques. Here, in the case of failing the steganography system, secret messages remain safe because of the encoding technique. Steganography is not a replacement for cryptography but rather to supplementation of it. Both cryptography and steganography provide security, in order to provide multiple layers of security. The secret messages can be hidden in various multimedia files such as text, audio, images, animations, video, and so on. The main aim of both cryptography and steganography is to provide integrity, confidentiality, and availability. The proposed model provides a dual layer of security in which cryptography and steganography form the inner and outer layers of security respectively. It mainly consists of four stages namely encryption, embedding, extracting, and decryption. Encryption and Embedding are done by the sender where the secret data is first encrypted using a cryptographic algorithm to convert the plain text into a cipher, after which the cipher is embedded into the cover file to hide its presence. This paper is on the comparison of steganography algorithms-LSB and RDH with the implementation of cryptography as an outer layer.


EXISTING METHOD 

Integer transform-based reversible data hiding 

Pixel substitution and Difference expansion 

Bit modification method 


Revesable Data Hiding:Steganography

DRAWBACKS 

Low hiding capacity 

High distortion due to loss of edge details 

Data hiding embeds messages into digital multimedia such as images, audio, and video in an imperceptible way, which is mainly used for copyright protection, integrity authentication, and covert communication. Some special signals such as medical imagery, military imagery, and law forensics are so precious that cannot be damaged. To protect these signals, reversible data hiding (RDH)  is developed. Taking image as an example, by RDH after embedding messages into the host image the generated marked image is visually invariant, and at the same time, we can losslessly restore the host image after extracting the embedded messages. RDH is mainly used for media annotation and integrity authentication, but its application is now extended by scholars. With RDH we can restore both embedded messages and the host image, this makes the host image like a storage disk that can be erasable. However, the marked image generated from RDH is hard to resist detection. If we endow RDH with undetectability, then such RDH algorithms called reversible steganography can be applied for convert storage. Besides converting storage, we can also regard RDH as one tool to do many reversible image operations. To be detailed, after operating the image to the desired target, we can explore the auxiliary parameters for restoring the original image from the target image, and then reversibly embed the parameters into the target image to get the reversible operated image. At the receiver’s side, we extract these auxiliary parameters and the target image from the reversible operated image, and further, restore the original image from the target image with the extracted parameters.


PROPOSED METHOD 

Reversible data hiding for protection of medical images with additional information based on histogram shifting and encoding technique.

Histogram analysis 

Image Coding 

Embedding 

Extraction 

Performance analysis 


ADVANTAGES 

Lossless recovery of the original image 

High hiding capacity 

Low distortion 


diagram 

Revesable Data Hiding Steganography
Revesable Data Hiding Steganography

Revesable Data Hiding:Steganography

REFERENCES:

[1] P. Joseph and S. Vishnukumar, “A study on steganographic techniques,” 2015 Global IEEE Conference on Communication Technologies (GCCT), Thuckalay, 2015, pp. 206-210. DOI: 10.1109/GCCT.2015.7342653

[2] F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn, “Information hiding-a survey,” in Proceedings of the IEEE, vol. 87, no. 7, pp. 1062-1078, Jul 1999. DOI: 10.1109/5.771065 

[3] S. Chandra, S. Paira, S. S. Alam and G. Sanyal, “A comparative survey of Symmetric and Asymmetric Key Cryptography,” 2014 IEEE International Conference on Electronics, Communication and Computational Engineering (ICECCE), Hosur, 2014, pp. 83- 93.doi:10.1109/ICECCE.2014.7086640 

[4] N. Kumar and S. Agrawal, “An efficient and effective lossless symmetric key cryptography algorithm for an image,” 2014 IEEE International Conference on Advances in Engineering & Technology Research (ICAETR – 2014), Unnao, 2014, pp. 1-5. DOI: 10.1109/ICAETR.2014.7012788 

[5] Mehdi Hussain and Mureed Hussain – “A Survey of Image Steganography Techniques” International Journal of Advanced Science and Technology Vol. 54, May 2013

Customer Reviews

There are no reviews yet.

Be the first to review “Revesable Data Hiding:Steganography”

This site uses Akismet to reduce spam. Learn how your comment data is processed.