New Reversible Data Hiding - Journal - ASPNET22 123

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

REVERSIBLE DATA HIDING IN ENCRYPTED IMAGE

Kailasam Selvaraj Joel Abraham A Lourdu Arul Ruban P


Department of InformationTechnology, Department of InformationTechnology, Department of InformationTechnology,
Kalasalingam Academy of Research Kalasalingam Academy of Research Kalasalingam Academy of Research
and Institution and Institution and Institution
Anand Nagar, Krishnankoil, Anand Nagar, Krishnankoil, Tamilnadu Anand Nagar, Krishnankoil, Tamilnadu
Tamilnadu. joelabraham175@gmail.com brockruban@gmail.com
s.kailasam@klu.ac.in

Manoj Kumar G Shankar Dayan S


Department of InformationTechnology, Department of InformationTechnology,
Kalasalingam Academy of Research Kalasalingam Academy of Research
and Institution and Institution
Anand Nagar, Krishnankoil, Tamilnadu Anand Nagar, Krishnankoil,Tamilnadu
manojselvam82@gmail.com shankardayan5552@gmail.com

.Abstract: RDH is used to hide secret information within inability to input large amounts of data or the need for the
some multimedia files.This data hiding is used for medical original image to be available for data extraction. Using
or military instruction. In this project, we create a web- multiple secret sharing and lightweight encryption algorithms,
based application for military network. In that application, the proposed approach provides a secure and efficient solution
commander will add soldier details. if any messages are
to hide the reversible information of encrypted images.
transfered into soldier means, commander will send the
request to image provider. Because they need image to hide Overall, the study fully presents the proposed approach and its
the content into that image. Image provider will send the implementation using ASP.NET. The proposed approach can
image with encrypted format and secret key(shared one be a valuable tool for developers and researchers involved in
key) using cryptographic algorithm. Then commander will information security and image processing.
send the messages as encrypted format inside that II. LITERATURE REVIEW
encrypted image. If the soldier will login to the site, they
give private key and secret key. If the keys are matched Reversible data hiding in encrypted images using private
then image and hidden messages are decrypted and they sharing Signal data Processing, vol. 143, pp. 269–281, 2021.
get original messages.So this project is used to secure X. Wu, J. Weng, and W. Yan. In this study, we encrypted
information in military network. pictures is substituted for secret sharing. First, a fundamental
Keywords: paradigm for reversible data hiding in encrypted images
Least Significant Bit (LSB), Reversible Data Hiding using secret sharing is presented. A suggested image
(RDH), Payload, Data Bit Embedding, Steganography
encryption algorithm then makes use of Shamir's secret
sharing. The suitability of the shares produced by the
I. INTRODUCTION
suggested encryption method for data embedding is
"New Reversible Information Hidden in Encrypted Image supported by theoretical analysis. Finally, two fundamental
Based on Multiple Secret Sharing and Lightweight Encryption approaches utilising difference histogram shifting and
Algorithms" is a research paper that proposes a new approach difference expansion are presented along with some
to reverse information hidden in encrypted images. The extensions. Experimental findings are used to show the
proposed method combines multi-secret sharing and benefits of the suggested approaches, including their high
lightweight encryption algorithms to provide a secure and embedding and low computational complexity.
efficient solution for hiding recoverable information in
encrypted images. Mirroring the ciphertext group enables reversible data
The research paper provides a detailed overview of the concealment in a homomorphic restated sphere.X. Luo and S.
proposed approach and its implementation using ASP.NET, a Xiang pages. 3099–3110 in IEEE Deals on Circuits and
web app framework developed by Microsoft. ASP.NET Systems for Video Technology, vol. 28, no. 11, 2021 a novel
provides a robust and scalable platform for developing web RDH strategy was proposed by restated images which makes
applications and is widely used by developers around the use of the homomorphic and probabilistic Paillier
world. cryptosystem parcels. To create space for data impacted, the
The proposed approach is designed to address the limitations proposed system randomly names and reversibly beds groups
of existing reversible data hiding techniques, such as the of contiguous pixels into the rest of the image. A reference
element and a large number of host elements are present in colour Each pixel may use one of the 256(28) colours from a
each blockIn alike a way, the adjustment on MCGs for data palette or colour reference. argentine-scale 8-bit audio For any
coverlet will not beget any elements overfilled in plaintext particular image, any of the 256(28) argentine tones may be
sphere and the bedded information will be directly pulled used. It is feasible to alter the LSBs of an 8-bit picture or the
taken away the restated sphere. LSBs of 24-bit images with colour by inserting LSBs. Steps
For 24-bit filmland, the easiest LSB addition adds 3 bits per
A novel, adaptable framework for spherical data hiding frame. Since there are 24 bits per image, we can use 24 data
movement.Y.-Q. Shi, J. Huang, and F. Huang. IEEE Deals on bits and 3 hidden bits to conceal 1/8 of the hidden bits.
Information Forensics and Security, issue 11, number 12, Content Data Hider
Owner
2019, pages 2777–2789. To create the outline of the picture,
the basic pixels were first separated into sub-blocks of size m Encryption key Data Hiding
Key
n. The same crucial sluice byte is used to modify the pixels in
Image
the same sub-block after creating a crucial sluice using an Original image Encryption Data Hiding Secret
encryption key. Following gate encryption, a permutation key Information

is used to randomly permute the translated m nsub-blocks.


The majority of the RDH methods that were initially
suggested can be applied directly to the translated picture \
Data
because the connection between the neighbouring pixels in Extract Secret
Extraction
information
each sub-block can be kept well.

Data
A data hiding method for high dynamic level of photos was Encryption
hiding
key
published by T. Li, N. C. Huang, and C. M. Wang in the key

International Journal of Innovation Computing, Inf. and


Control, volume 7, issue 5, in May 2019. For HDR photos,
Reconstructed Image
Li et al. suggested a data-hiding strategy that enhances image Recovery

Cheng and Wang's scheme's embedding capability. Lietal


used an High Dynamic Range image decrypted. The sign and Receiver
exponent fields are finished when the secret dispatches are
bedded into the mantissa field. They presented three data Fig 1. Proposed Architecture Diagram
hiding algorithms based on the optimal pixel adaptation We would also hide 2 bits of the encoded information for
process (OPAP), which provide an High embedding capacity every 8 bits of the cover picture. We could get the following
and tone-colluded stego picture quality are perfectly by adding a third piece: 3/8 hidden bits per data bit = 24 data
balanced. Their approach advocated using pixels as bits per pixel x 9 hidden bits per pixel.acquiring encoded bits
embedding units and provided an embedding rate of 26 bpps at a data rate for each picture's bit.
on average. The data rate for insertion in bit images is 1 LSB insertions, or
1 embedded bit every 8 cover bits.
"Medical image protection using a double-encrypted By calculating the amount of cover bytes necessary to
opposition-based optimisation algorithm," It was proposed in transmit an embedded byte, we can tackle the problem from a
a research by AvudaiappanT., BalasubramanianR., new perspective.
PandiyanS.S., SaravananM., LakshmanaprabuS.K., and We found that these SNK methods incorporate the message
ShankarK. that was released in 2015(23). For medical picture using the homomorphic evaluation property, and preserve
encryption procedures, both full and special confusion-based picture privacy using Paillier encryption (or other extra
encryption is suitable. The two phases, which are based on homomorphic encryption). To meet the aforementioned
looking, reorganise and reorganise items as well as requirements, we substitute secret sharing, which also benefits
encompass information about the image using chaotic maps. from homomorphicevaluation in some respects, for some of
Through simulation, a more effective form of the proposed the Paillier encryption. We present an abstraction of those
strategy is developed. This strategy also provides protection SNK algorithms before introducing our approach.
against intrusions for continuing private picture IV. RESULTS AND DISCUSSION
communication. Key Generation
Use to generate a key from pseudo random algorithm. After
III. METHODOLOGY getting an n-bit input and an n-bit random key, PRF
RGB 24-bit Each of the 224 hues, each of which uses 8 bits generates an output. Before supplying names, it must first
to represent a distinct mix of the primary colours red, green, generate a secret at random. The private key is ultimately
and blue, can represent one of the 224 pixels. in eight pieces,
created and stored in the database. It uses the same method
but different IDs to produce noticeably more variation.
Image Encryption
In the process encrypt the image and the image was converted
into error image. Then, the error message was again encrypted
this method is known as double encryption. Thus, the
encryption encrypts the message in the error image, when
applying a key in encryption and will get secret message.

Data Embedding

It breaks up the secret information into various chunks. Then


generate a second share without the need for a key in order to Fig.3.Key given to extract the data
embed a unit, using the method to insert the message into the
encrypted pixels.

Fig. 2.Data encryption and embedding into the image Fig.4.Extract the data from image
Image Decryption
V. CONCLUSION
Decryption means decrypt the process with the help of keys,in shared-one-key is a novel class of reversible data that conceals
the process have to decrypt the image into message with the itself in encrypted pictures. (SOK). Only the image provider
help of similar keys.Decrypt the message from the error and the receiver in this class share a secret key, and anyone
image. who is aware of the embedding process can conceal in
particular. SOK is significantly less flexible than SNK. The
Data extraction
SNK schemes that are currently in use, however, depend on
The encryption key, the data-hiding key, or both keys could additive homomorphism encryption. To improve productivity
be in the possession of a recipient in this area. The values of and maintain the overall size, we build our Shared Only Key
the parameters can first be obtained from the MSB of the scheme using secret sharing as its fundamental component.
selected encrypted pixels if the recipient only has access to the Then, an Shared No Key plan with a few characteristics is
data-hiding secret and the encrypted picture with encoded transformed into a Shared Only Key version. We give a
data. The receiver rearranges and groups the leftover pixels thorough explanation of the Shared Only Key scheme derived
after which he extracts the embedded bits from the MSB plane from the Shared No Key schemes to show the efficacy.
of each group. It should be observed that the parameter values Finally, we suggest a general SOK is converted into SIK
or pixel-groups cannot be accessed by an attacker without the scheme because we want to perform a follow-up study.
data-hiding passcode, making it difficult to retrieve the
encoded data. The diversity and what appears to be haphazard REFERENCES
selection of pictures is what causes this.Furthermore, even
[1] T.Filler, J.Judas, J.Fridrich, Minimizing Additive
though the recipient has the data-hiding keyis able to
Distortion in Steganography Using Syndrome-Trellis Codes,
effectively extract the embedded data, he is unable to learn
Information Forensics and Security, IEEE Transactions on, 6,
anything about the original image's content.
920-935 (2021).

[2] IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8,
pp. 890-896, August 2020. J. Tian, "Reversible data
embedding using a difference expansion."
[3] Lossless generalised-LSB data embedding, IEEE Trans. [17] P. Tsai, Y.-C. Hu, and H.-L. Yeh, “Reversible image
Image Process., vol. 14, no. 2, pp. 253-266, Feb. 2021. M. U. hiding scheme using predictive coding and histogram
Celik, G. Sharma, A. M. Tekalp, and E. Saber. shifting,” Signal Processing, vol. 89, no. 6, pp. 1129–1143,
2019.
[4] Z. Ni, Y.-Q. Shi, N.Ansari, and W. Su, “Reversible
data hiding,” IEEE Trans. Circuits Syst., Video Technol., vol. [18] D. M. Thodi and J. J. Rodr´ ıguez, “Expansion
16, no. 3, pp. 354–362, 2019. embedding techniques for reversible watermarking,” IEEE
transactions on image processing, vol. 16, no. 3, pp. 721–730,
[5] L. Luo, Z. Chen, M. Chen, X. Zeng, and Z. Xiong, 2018.
“Reversible image watermarking using interpolation
technique,” IEEE Trans. Inf. Forensics Secur., vol. 5, no. 1, [19] Avudaiappan T., Balasubramanian R., Pandiyan S.S.,
pp. 187–193, 2019. Saravanan M., LakshmanaprabuS.K.,and Shankar K.,
“Medical Image Security Using Dual Encryption with
[6] X. Zhang, “Reversible data hiding in encrypted image,” Oppositional Based Optimization Algorithm”, Journal of
IEEE.Signal Process. Lett.,vol. 18, no. 4, pp. 255–258, Apr. Medical Systems, Vol. 58, no.3, pp. 777-780,2018.
2018.

[7] X. Zhang, C. Qin, and G. Sun, “Reversible data hiding in


encrypted images using pseudorandom sequence modulation,”
in Proc. IWDW 2020, LNCS, vol. 7809, pp. 358–367, 2020.

[8] W. Hong, T.-S. Chen, and H.-Y. Wu, “An improved


reversible data hiding in encrypted images using side match,”
IEEE Signal Process. Lett. vol. 19, no. 4, pp. 199– 202, Apr.
2019.

[9] W. Hong, T.-S. Chen, J. Chen, Y.-H. Kao, H.-Y. Wu, and
M.C. Wu, “Reversible data embedment for encrypted
cartoon images using unbalanced bit flipping,” in Proc.
ICSI 2019, LNCS, vol. 7929, pp. 208–214, 2019.

[11] J. Tian, “Reversible data embedding using a difference


expansion,” IEEE transactions on circuits and systems for
video technology, vol. 13, no. 8, pp. 890–896, 2021.

[12] Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, “Reversible data


hiding,” IEEE Transactions on circuits and systems for video
technology, vol. 16, no. 3, pp. 354–362, 2006.

[13] W. Hong, “Adaptive reversible data hiding method based


on error energy control and histogram shifting,” Optics
Communications, vol. 285, no. 2, pp. 101–108, 2022.

[14] W. Hong and T.-S. Chen, “A local variance-controlled


reversible data hiding method using prediction and histogram-
shifting,” Journal of Systems and Software, vol. 83, no. 12,
pp. 2653–2663, 2020.

[15] S.-W. Jung, S.-J. Ko et al., “A new histogram


modification based reversible data hiding algorithm
considering the human visual system,” IEEE Signal
Processing Letters, vol. 18, no. 2, pp. 95–98, 2021.

[16] Y.-Y. Tsai, D.-S. Tsai, and C.-L. Liu, “Reversible data
hiding scheme based on neighboring pixel differences,”
Digital Signal Processing, vol. 23, no. 3, pp. 919–927, 2019.

You might also like