Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 32

AN IMPROVED REVERSIBLE

DATA HIDING IN ENCRYPTED


JPEG BITSTREAMS

Presented by,
Sruthi Suresh
MTECH CSE S3
TOC18CSDS03
CONTENTS

11/17/2019
 INTRODUCTION
 EXISTING SYSTEM

 PROPOSED SYSTEM

 MODULES

 SYSTEM DESIGN

 EXPECTED OUTPUT

 CONCLUSION

 REFERENCES

2
INTRODUCTION

11/17/2019
 Reversible data hiding(RDH) embed the additional and secret
message into cover media.
 It perform a reversible procedure that extracts the hidden secret
message.
 Perfectly reconstructs the original data.

3
JPEG FORMATION

11/17/2019
4
JPEG COMPRESSION

11/17/2019
5
11/17/2019
6
11/17/2019
7
11/17/2019
8
LITERATURE SURVEY

11/17/2019
9
11/17/2019
10
11/17/2019
11
REVERSIBLE DATA HIDING IN
JPEG IMAGES[2015]

11/17/2019
 histogram shifting-based RDH scheme for JPEG images is proposed
 non-zero AC coefficients in DCT are represented by N = (N 1 , N 2 , ... , N m ),
where M represents the
 number of all nonzero AC coefficients in the JPEG image. They concluded
that most of the peak points of the
 AC coefficient histograms are located at points 1 and -1. The embedding
algorithm of their method is
 described as:
 N i ' = Ni + sign(Ni)*s if|Ni|=1
 N i' = Ni + sign (N i ) if |Ni|>1
 s indicates the secret information bit to be embedded and N i ' denotes the
corresponding 12
 hidden AC coefficients in the marked JPEG image.
11/17/2019
 Disadvantages
 zero coefficients remain unchanged and only coefficients with
values 1 and −1 are expanded to carry message bits.
 method has low hiding capacity because it only embeds message
bits in AC coefficients with values of 1 and -1.

13
IMPROVED JOINT REVERSIBLE DATA
HIDING IN ENCRYPTED IMAGE[2016]

11/17/2019
 an image owner encrypts the original image using a stream cipher
algorithm and uploads the ciphertext to a remote server.
 On server side, The combination of cyclic-shifting and data-
swapping is used to embed additional messages into the ciphered
image.
 After downloading the marked encrypted image from the server
and implementing the decryption, a recipient can extract the
hidden messages and losslessly recover the original image.

14
11/17/2019
 Disadvantages
 data extraction must be done after image decryption.

 This limitation makes the technique less useful in cloud storage.

15
HIDING SCHEME FOR ENCRYPTED JPEG
BITSTREAMS[2017]

11/17/2019
 The proposed system uses “reserving-room-before-encryption
(RRBE)” framework.
 Before encrypting the JPEG bitstream, the content owner first
reserves space on the original JPEG bitstream and encrypts the
modified JPEG bitstream.
 The data hider embeds the secret data into the spare space which
is previously reserved by the content owner.
 Receiver can extract the secret data by the data-hiding key and can
recover the original JPEG bitstream by the encryption key.

16
11/17/2019
 Advantages
 Data extraction and image recovery are seperable.

 disadvantages

 the owner is also required to do preprocessing, i.e., generating


spare rooms before encryption.
 the length of encrypted

 bitstream keeps unchanged after data hiding, which leads to a


limited embedding capacity.

17
PROBLEM DEFINITION

11/17/2019
18
PROPOSED SYSTEM
 Focuses on labeling encrypted JPEG images on

11/17/2019
cloud storage.
 Three parties:
 image owner

 cloud server

 authorized user

 Owner encrypts JPEG bitstream,uploads to cloud. 19


 Cloud server embeds messages into encrypted
bitstream to generate a marked encrypted

11/17/2019
bitstream.
 Hidden messages are extracted from marked
encrypted bitstream.
 Server recovers original encrypted
bitstream,when user required.
 After decryption, the user obtains the original 20

JPEG image.
11/17/2019
21
MODULES

11/17/2019
 IMAGE OWNER
 CLOUD SERVER

 AUTHORIZED USER

22
11/17/2019
23
11/17/2019
24
11/17/2019
25
SYSTEM DESIGN

11/17/2019
26
11/17/2019
Kenc

Kenc
27
11/17/2019
28
EXPECTED OUTPUT

11/17/2019
29
CONCLUSION

11/17/2019
30
REFERENCES

11/17/2019
31
11/17/2019
THANK YOU
32

You might also like