Tuesday, June 14, 2016





SEPARATE DATA EXTRACTION IN ENCRYPTED IMAGES BY REVERSIBLE DATA HIDING USING SIRDS

M. KARTHIK                                                                                                                                                                                             Research scholar, Department of  Computer Science,                                                                                                             
 Tamil University, Thanjavur                                                                                    karthikrj69@gmail.com

K.RAVIKUMAR                                                           
Assistant Professor, Department of  Computer Science, Tamil University, Thanjavur                            ravikasi2011@yahoo.com

 ABSTRACT:
Reversible data hiding used to data hidden process in image and also can recover after analyze hidden data in cover image. This RDH schema provides the secrecy of user data’s and also its encoded cover image. Previous methods embedding data in cover(secure) image after retrieving process may be issue is to produced an some errors on data extraction time. most important problem is earlier scheme information hidden in cover image using RDH, hence data retrieval process time were produced an free of errors. In this proposed scheme make SIRDS as secrecy image is share of visual cryptography scheme to reduce transaction risk for both forwarder and receiver like secure information sharing. SIRDS Encoding technique modifies image pixel values using the random dots in the event according to the B-VCS to produce non pixel expansion shares of the B-VCS. Modifying the pixel free dots using a SIRDS will degrade the visual quality of the rebuilder substance. Here, recommend for these model that is based on the visual feature of cover image SIRDS working is based on construction rules for a (2, n)-B-VCS that maximize the cover image contrast and recovered data strength in the cover image using the B-VCS. SIRDS different type of picture separation after the data bit which was hiding multiple set of pixel, For this the data retrieval method‟ require the index position of those blocks which were considered in hiding process and the pixel pairs position where the data is hidden as the input. The experimental results for our proposed method offers better performance over previous work.

INDEX TERMS:
RDH, Privacy Protection, SIRDS, VCS, Pixel Expansion..

INTRODUCTION:
                          
RDH is successful communication technology; desires for information sharing and transfer have increased exponentially. The threat of an eavesdroppers accessing secret information has been an ever existing concern for the information communication in the public region. Steganography and Cryptography are the most widely used techniques to overcome these risks.        
Cryptography involves switching a plain text into an unreadable cipher text. Other hand, Steganography embeds message into a cover media and hides its existence. A digital image is considered as the transporter in these techniques. These techniques make some level of security of user information. However, neither of them alone is secure enough for sharing data over an unsecure communication is vulnerable to intruder attacks and channel. Although these techniques are often combined


together to complete higher levels of security there still is a need of a highly secured system to share information over any communication media minimizing the risk of intrusion.

Visual cryptography is a powerful technique that merges the notions of ciphers and secures sharing in cryptography with that of graphics. VC takes a binary data and divides it into two or more section known as shares. When the shares are written on transparencies and then superimposed, the secret data can be recovered well again. Visual cryptography is a unique technique in the logic that the encrypted message can be decrypted directly by the (HVS). It focuses on resolving the problem of secret sharing. A secure sharing method suggested by Shamir’s and Naor [2] enables allocation of a secret amongst n parties, such that only predefined unauthorized sets will be able to reconstruct the secret information. In a k out of n secret data sharing problem n transparencies are produced and it needs a smallest amount of k shares to retrieve well again the original image (message). The image remains hidden if fewer than k transparencies are stacked mutually. Each and every pixel appears within k modified versions known as shares. The shares are a group of m black and white sub-pixels arranged closely together.
Before the development of digital means, conventional methods were creature used for transferring or receiving messages. Before mail messages, before phones were sent on end. For the messages where privacy was of prime concern, the behavior of implementing protection were following:
·         Write the information using such notations that actual meaning of the message was concealed.
·         choose the messenger skilled of delivering the information securely.
·         secrete the communication such that even its presence can’t be predicted.

In steganography, the possible cover carriers are innocent looking (text, audio, video, and images) which will hold the hidden data. A message is the information hidden and may be cipher text, plaintext, images, or anything else that can be embedded into a bit stream (binary data). The cover carrier and the embedded message create a stego-image (carrier). Embedding data may need stego key which is additional secret data, such as a password, required for hiding the secure information. Example, when secret information is embedding within a cover image, the resulting product is a stego-image like cover image.
A possible formula may be represented as:
Cover medium + embedded message + stego key = stego-medium

DEFINITION :

femd : steganographic function "embedding"
fext : steganographic function "extracting"
Cover: envelop data in which emb will be secreted
Embed: message to be hidden stegno: cover data with the hidden message

Fig 1 the Steganographic System

The benefit of steganography is that can be used to secretly transmit data’s without the reality of the transmission being discovered. Often, using encryption might recognize the receiver or sender as somebody with something to hide.
Reversible data hiding (RDH) in images is a technique, by the original cover can be losslessly recovered after the embedded message be extracted. This important method is widely used in medical descriptions, military imagery and law forensics, where no distortion of the unique cover is acceptable
VISUAL cryptography is a technique that encrypts a secure data into n shares, with each applicant holding one share on secure image; any applicant with fewer than k, 2 k n, shares cannot reveal any information about the top secret image. Stacking the k shares reveals the underground image, which can be acknowledged directly by the human visual system [4]. Conventional shares [3]–[1], which consist of many random and meaningless pixels satisfy the security requirement for protecting secret contents, but they have a drawback—there is a high transmission risk because noise-like shares raise the suspicion of attackers, who may intercept the shares. Thus the risk both to the participants and to the shares increases in turn increasing the probability of transmission failure.

PREVIOUS ARTS

All previous techniques hided data by reversibly vacating room from the embedded images, which may be issue to some errors on data retrieval and image restoration.
In a data owner encrypts the original image using a regular cipher text with a secret key. Then producing encrypted image, the data owner hands over it to a data hider and the data hider can embed some auxiliary information into the encrypted image by lossless vacating some room according to a data hiding key. Then a receiver, maybe the data owner himself or an authorized third party can extract the embedded secure data with the data hiding key and further recover the original image(data) from the encrypted version according to the encryption key.
In all techniques of the encrypted 8 bit gray-scale images are generated by encrypting every bit - planes with a stream cipher. The method in fragments the encrypted image into a number of non overlapping blocks sized by each block is used to carry one added bit. The method fragments the encrypted image into a number of non overlapping blocks sized by a * a each block is used to carry one added bit.
To do this, pixels in each block are pseudo-randomly separated into two sets S1 and S2 according to a secure data key. If the extra bit to be embedded is 0, flip the 3 of each encrypted pixel in S1, otherwise flip the 3 encrypted of pixels in S2. data extraction and image recovery, the receiver flips all the three pixels in S1 to form a new decrypted block, and flips all the three  pixels in S2 to form another new block; one of them will be decrypted to the original block. Due to spatial relationship in natural images, original block is presumed to be smoother than hindered block and embedded bit can be retrieval correspondingly. There is a threat of defeat of bit extraction and image recovery when divided block is relatively small or has much fine-detailed textures.
        Hong [11] reduced the error rate of Zhang’s method [16] the pixels in calculating the smoothness of all block and using plane match. The recovery and extraction of blocks are performed according to the descending order of the absolute smoothness difference between two candidate blocks and recovered blocks can further be used to evaluate the smoothness of unrecovered blocks, which is referred to as plane match.
Zhang’s method in [12] pseudo-randomly permuted and divided encrypted image into a number of groups with size of L. The LSB-planes of each one group are compressed with a parity-check matrix and the vacated room is used to embed data. At the receiver side, the 8-P most significant bits (MSB) of pixels are obtained by decryption directly.

PROPOSED METHOD:

Julesz implemented the random-dot format of the stereogram, in which the 3D form find a way around the monocular processes and is visible only when stereoscopic fusion is obtained. A random-dot stereogram (RDS) is a stereo couple of images of random dots, which when viewed with the support of a stereoscope or with the eyes focused on a point in front of behind the images; generate an awareness of depth, with objects appearing to be in front of or behind the display level. Clarke and Tyler proposed a stereoscopic technique that allows the stereoscopic presentation of 3D form from a single printed image by a random dot pattern. That method is known as Random Dot Auto stereograms or Single Image Random Dot Stereogram’s (SIRDS).
The emergence of a SIRDS consists of numerous random dots that have a similar appearance with shares in a Visual Cryptography System. The only difference is that people can reconstruct the original object via binocular disparity from a SIRDS. Hence, hiding a share of a VCS in a SIRDS can decrease suspicion of hidden secrets. The property indicates that the SIRDS is best, and an ordinary, candidate to serve as a cover image for a share of a conventional Visual Cryptography System. This thesis is willing in to developing a technique for sharing visual secrets using SIRDSs.
In the SIRDS, the image contains many random-dot patterns that periodically replicate in the horizontal direction; the stereopsis of the objects arises from differences in the horizontal positions of the image. The pixel allotment in n SIRDSs that were generated independently. Suppose each SIRDS has the same pixel density d, the probability of pixel distribution pattern.
The pixel distribution connecting all SIRDSs are stacked, each all pixel distribution prototype will uniformly appear in the stacked image. It is approximately impossible to make public any meaningful information by stacking two shares together. Try to modify any pixels in SIRDSs such that the modified SIRDSs can share secret Information (images) the same way as VCSs. In the following, will inspect whether the modified pixels in a SIRDS will interfere with the visual effect of stereopsis in the SIRDS.
This observation indicates that the altered SIRDSs can be detected by a human visual system, thus making it difficult to share extra information in RDS. Hence, there are a transaction between keeping the visual quality of stereopsis in a SIRDS and producing a high-quality VCS. When try to construct a specific VCS from a set of SIRDSs, it may be necessary to alter a large number of random pixels to observe the pixel distribution regulation of the VCS. However, these altered pixels can be perceived as an illusion of 3D depth and these interfere with the original stereopsis in the SIRDS. On the above observation, formulated a mathematical optimization model to discover an most favorable solution to share a secret image in SIRDSs where the objective is to maximize contrast under the restriction of the visual quality of SIRDSs. Using this model, dealers can adjust the visual quality of SIRDSs to obtain the best display quality of the recovered images.
This implementation propose a (2, k)-BVCS for sharing a binary secret image in n SIRDSs. The proposed encryption process is shown in Fig. 2. The first phase, n depth maps are used to produce n SIRDSs using the auto stereogram generator. In the proposed (2,k)-BVCS, each depth map has the same image size and all generated SIRDSs have the same pixel density d.
Fig 2 two-phase encryption process of (k, n)-BVCS.
The construction rules generator, based on given parameters, n and d, of each SIRDS, generates guidelines for altering pixels in the SIRDSs. The encryptor alters pixels only within a specific region, which is called the encryption region, where black secret pixels appear. Due to the altered pixels could be disclosed in the verification image of a SIRDS. To preserve the security condition for each share of the BVCS, the encryption region will be enlarged to cover neighbors of the black secret pixels. The construction rules of a BVCS consist of two (n + 1) × (n + 1) matrices, M0 and M1, for sharing white and black secret pixels in a secret image.
Next, design an encryption algorithm for the BVCS encryptor. Based on the modification rule for a given BVCS, the algorithm alters pixels on n SIRDSs, ST1,. . ., STn , to share a binary secret SE.


Fig 3 Architecture Diagrams



EXPERIMENTS AND COMPARISONS:

In this section, discuss an experiments that conducted to evaluate the presentation of the development new method (2, k)-BVCSs. also there present some demonstrations of the execution results for observing the visual effects of the BVCSs. Finally, compare the properties of this study with previous approaches.

Histogram Comparison


Original histogram
The calculate approximately error is estimate via some data can be embedded into the estimating error sequence with histogram shift.


Shifted histogram

The development can be as high as 2 to 4 dB at low embedding rate. As for quality images such as Baboon with rather flat error histogram, the second solution has a better performance of 1 to 2 dB.

Encoding and Decoding Time Comparison
Encoding  Time Comparison
Encoding Rate
CONCLUSION:

SIRDS is a new method drawing attention because of the privacy requirements from public environment information management. Earlier method implement RDH in encrypted images by vacating room after encryption, which proposed by reserving room before encryption. This thesis work proposed a (k, n)-BVCS and developed a new technique for hiding a size-invariant in n SIRDSs. This work explored the possibility of hiding a share of a VCS in SIRDS that are printed on transparencies. The greatest recovered images in (k, n)-B-VCS, 2 n 10, ranges and SIRDs can produce clear recovered images for a (k, n)-B-VCS. The experimental results establish the effectiveness and the flexibility of the proposed (k, n)-BVCS efficient encoding rate and processing time little bit is increased. In the future work secure information will be encrypt then embedding into the secret image like second time verification, that encryption algorithm like AES, Blowfish and RSA etc.

REFERENCES:
[1] M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology—EUROCRYPT (Lecture Notes in Computer Science). New York, NY, USA: Springer-Verlag, 1995, pp. 1–12.
[2] R. Ito, H. Kuwakado, and H. Tanaka, “Image size invariant visual cryptography,” IEICE Trans. Fundam. Electron., Commun., Comput. Sci., vol. E82-A, no. 10, pp. 481–494, 1999.
[3] C. N. Yang, “New visual secret sharing schemes using probabilistic method,” Pattern Recognit. Lett., vol. 25, no. 4, pp. 481–494, Mar. 2004.
[4] P. L. Chiu and K. H. Lee, “A simulated annealing algorithm for general threshold visual cryptography schemes,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 992–1001, Sep. 2011.
[5] J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896, Aug. 2003.
[6] Z. Ni, Y. Shi, N. Ansari, and S. Wei, “Reversible data hiding,” IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354–362, Mar. 2006.
[7] D.M. Thodi and J. J. Rodriguez, “Expansion embedding techniques for reversible watermarking,” IEEE Trans. Image Process., vol. 16, no. 3, pp. 721–730, Mar. 2007.
[8] X. L. Li, B. Yang, and T. Y. Zeng, “Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection,” IEEE Trans. Image Process., vol. 20, no. 12, pp. 3524–3533, Dec. 2011.
[9] P. Tsai, Y. C. Hu, and H. L. Yeh, “Reversible image hiding scheme using predictive coding and histogram shifting,” Signal Process., vol. 89, pp. 1129–1143, 2009.
[10] L. Luo et al., “Reversible imagewatermarking using interpolation technique,” IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 187–193, Mar. 2010.
[11] V. Sachnev, H. J. Kim, J. Nam, S. Suresh, and Y.-Q. Shi, “Reversible watermarking algorithm using sorting and prediction,” IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 7, pp. 989–999, Jul. 2009.
[12] A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography. Boca Raton, FL, USA: CRC, 1996.
[13] K. Hwang and D. Li, “Trusted cloud computing with secure resources and data coloring,” IEEE Internet Comput., vol. 14, no. 5, pp. 14–22, Sep./Oct. 2010.
[14] M. Johnson, P. Ishwar, V. M. Prabhakaran, D. Schonberg, and K. Ramchandran, “On compressing encrypted data,” IEEE Trans. Signal Process., vol. 52, no. 10, pp. 2992–3006, Oct. 2004.
[15] T. Guo, F. Liu, and C. Wu, “k out of k extended visual cryptography scheme by random grids,” Signal Process., vol. 94, pp. 90–101, Jan. 2014.
[16] Z. Zhou, G. R. Arce, and G. D. Crescenzo, “Halftone visual cryptography,” IEEE Trans. Image Process., vol. 15, no. 8, pp. 2441–2453,
Aug. 2006.
[17] Z. Wang, G. R. Arce, and G. D. Crescenzo, “Halftone visual cryptography via error diffusion,” IEEE Trans. Inf. Forensics Security, vol. 4, no. 3, pp. 383–396, Sep. 2009.
[18] F. Liu and C. Wu, “Embedded extended visual cryptography schemes,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 2, pp. 307–322, Jun. 2011.
[19] H. W. Thimbleby, S. Inglis, and I. H. Witten, “Displaying 3D images: Algorithms for single-image random-dot stereograms,” Computer, vol. 27, no. 10, pp. 38–48, Oct. 1994.
[20] W. Zhou and A. C. Bovik, “A universal image quality index,” IEEE Signal Process. Lett., vol. 9, no. 3, pp. 81–84, Mar. 2002.


No comments:

Post a Comment