Description
Revesable Data Hiding:Steganography
ABSTRACT:
The main part of the project is to give security to the images by hiding the data. For this security analysis, we are using cryptography for giving security keys.this application will be given at the time of film application, social media applications, and multimedia applications. Information Security has always been a very substantial facet when it comes to hindering unauthorized access, destruction, or inspection of confidential data. Today every field in the world makes use of multimedia information. There is a need to secure the confidential information used in these areas. There are multiple approaches to secure information. One of them is Steganography, which is nothing but hiding the information inside other data such that there is no detectable change in cover information. The auxiliary technique of securing information is cryptography, an encryption technique that scrambles the information into a scribbled form which is generally referred to as a cipher. Both Steganography and Cryptography have their own advantages and limitations. Even though both methods provide security, to add multiple layers of security it is always a good practice to use Cryptography and Steganography together. So when cryptography and steganography are used together, it results in a multi-layer security model. The main objective of the proposed work is to provide an extra layer of security by introducing cryptography along with steganography to encrypt and embed the confidential information
Revesable Data Hiding:Steganography
INTRODUCTION:
Cryptography is an encryption technique that disarranges the information into some particular form so that only the intended user can read and process it. Steganography is an act of hiding messages in such a way that the only recipient can make out the existence of the message [1]. Cryptography and Steganography received little attention in computing. Many ciphers are shown vulnerable to cryptanalytic attacks and many stage techniques are easily detectable. Hence the need arises to provide better security by combining these two techniques. Here, in the case of failing the steganography system, secret messages remain safe because of the encoding technique. Steganography is not a replacement for cryptography but rather a to supplementation it.
Cryptography is an encryption technique that disarranges the information into some particular form so that only the intended user can read and process it. Steganography is an act of hiding messages in such a way that the only recipient can make out the existence of the message [1]. Cryptography and Steganography received little attention in computing. Many ciphers are shown vulnerable to cryptanalytic attacks and many stage techniques are easily detectable. Hence the need arises to provide better security by combining these two techniques. Here, in the case of failing the steganography system, secret messages remain safe because of the encoding technique. Steganography is not a replacement for cryptography but rather to supplementation of it. Both cryptography and steganography provide security, in order to provide multiple layers of security. The secret messages can be hidden in various multimedia files such as text, audio, images, animations, video, and so on. The main aim of both cryptography and steganography is to provide integrity, confidentiality, and availability. The proposed model provides a dual layer of security in which cryptography and steganography form the inner and outer layers of security respectively. It mainly consists of four stages namely encryption, embedding, extracting, and decryption. Encryption and Embedding are done by the sender where the secret data is first encrypted using a cryptographic algorithm to convert the plain text into a cipher, after which the cipher is embedded into the cover file to hide its presence. This paper is on the comparison of steganography algorithms-LSB and RDH with the implementation of cryptography as an outer layer.
EXISTING METHOD
Integer transform-based reversible data hiding
Pixel substitution and Difference expansion
Bit modification method
Revesable Data Hiding:Steganography
DRAWBACKS
Low hiding capacity
High distortion due to loss of edge details
Data hiding embeds messages into digital multimedia such as images, audio, and video in an imperceptible way, which is mainly used for copyright protection, integrity authentication, and covert communication. Some special signals such as medical imagery, military imagery, and law forensics are so precious that cannot be damaged. To protect these signals, reversible data hiding (RDH) is developed. Taking image as an example, by RDH after embedding messages into the host image the generated marked image is visually invariant, and at the same time, we can losslessly restore the host image after extracting the embedded messages. RDH is mainly used for media annotation and integrity authentication, but its application is now extended by scholars. With RDH we can restore both embedded messages and the host image, this makes the host image like a storage disk that can be erasable. However, the marked image generated from RDH is hard to resist detection. If we endow RDH with undetectability, then such RDH algorithms called reversible steganography can be applied for convert storage. Besides converting storage, we can also regard RDH as one tool to do many reversible image operations. To be detailed, after operating the image to the desired target, we can explore the auxiliary parameters for restoring the original image from the target image, and then reversibly embed the parameters into the target image to get the reversible operated image. At the receiver’s side, we extract these auxiliary parameters and the target image from the reversible operated image, and further, restore the original image from the target image with the extracted parameters.
PROPOSED METHOD
Reversible data hiding for protection of medical images with additional information based on histogram shifting and encoding technique.
Histogram analysis
Image Coding
Embedding
Extraction
Performance analysis
ADVANTAGES
Lossless recovery of the original image
High hiding capacity
Low distortion
diagram
Revesable Data Hiding:Steganography
REFERENCES:
[1] P. Joseph and S. Vishnukumar, “A study on steganographic techniques,” 2015 Global IEEE Conference on Communication Technologies (GCCT), Thuckalay, 2015, pp. 206-210. DOI: 10.1109/GCCT.2015.7342653
[2] F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn, “Information hiding-a survey,” in Proceedings of the IEEE, vol. 87, no. 7, pp. 1062-1078, Jul 1999. DOI: 10.1109/5.771065
[3] S. Chandra, S. Paira, S. S. Alam and G. Sanyal, “A comparative survey of Symmetric and Asymmetric Key Cryptography,” 2014 IEEE International Conference on Electronics, Communication and Computational Engineering (ICECCE), Hosur, 2014, pp. 83- 93.doi:10.1109/ICECCE.2014.7086640
[4] N. Kumar and S. Agrawal, “An efficient and effective lossless symmetric key cryptography algorithm for an image,” 2014 IEEE International Conference on Advances in Engineering & Technology Research (ICAETR – 2014), Unnao, 2014, pp. 1-5. DOI: 10.1109/ICAETR.2014.7012788
[5] Mehdi Hussain and Mureed Hussain – “A Survey of Image Steganography Techniques” International Journal of Advanced Science and Technology Vol. 54, May 2013
Customer Reviews
There are no reviews yet.