SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
International Journal of Modern Engineering Research (IJMER)
               www.ijmer.com             Vol.2, Issue.4, July-Aug. 2012 pp-1951-1954      ISSN: 2249-6645


          Symmetric Key Cryptography on Images in AES Algorithm
                        and Hiding Data Losslessly
                           T. Arumuga Maria Devi1,                   Sabitha.S2
                          Assistant Professor, Dept. of CITE        M.Tech Student, Dept. of CITE
                                     Centre for Information Technology and Engineering,
                                      Manonmaniam Sundaranar University, Tirunelveli


 Abstract: Reversible (lossless) data embedding (hiding)         In this paper, both the cover image and the secret data are
has drawn lots of interest recently. Being reversible, the       given equal importance. The visual quality after
original cover content can be completely restored. This          encryption as well as the PSNR is also improved. It
paper proposes a novel reversible data hiding scheme             consists of three phases – AES image encryption, data
with a lower computational complexity and can be used            embedding and data extraction/image-recovery phases.
in applications where both the image and the hidden              In the first phase, the data of original image are entirely
information is highly confidential. It consists of three         encrypted by an AES (Advanced Encryption standard)
phases –AES image encryption, data embedding and data            stream cipher. The data encryption standard (DES) is
extraction/image-recovery phases. Here, the encrypted            weak due to smaller key size, 56 bit. Whereas AES can
image is made highly secured by using an AES (Advanced           use three different key sizes: 128, 192 and 256 bits. In
Encryption standard) stream cipher. Although a data-             the second phase, although a data-hider does not know
hider does not know the original image content, he can           the original image content, he can embed additional data
embed additional data into the encrypted image using the         into the encrypted image by modifying a part of
data hiding key. A receiver may firstly decrypt the              encrypted data using the data hiding key. In the third
encrypted image using the encryption key. This decrypted         phase, a receiver may firstly decrypt the encrypted image
image is similar to the original image. With the data-           containing the embedded data using the encryption key.
hiding key, the embedded data can be correctly extracted         This decrypted image is similar to the original image.
while the original image can be perfectly recovered.             With the data-hiding key, the embedded data can be
                                                                 correctly extracted while the original image can be
Index Terms: AES encryption – Data Embedding –                   perfectly recovered.
Image Recovery.
                                                                              II. EXISTING METHODS
                  I. INTRODUCTION
                                                                 In Difference Expansion method [1], the differences
Data hiding is a technique that is used to hide                  between two adjacent neighboring pixels are doubled to
information in digital media such as images, audio, video        generate a new least significant bit where the new data is
etc. The information that is hidden depends upon the             hidden providing large information package. In
purpose of application. Owing to data hiding, some               Generalized DE based method [2], Tian’s pixel-pair
distortion may occur in the original cover medium and            difference expansion was extended using difference
cannot be inverted back to the original medium. Such a           expansion of vectors. In Generalized LSB method [3], the
data hiding is called lossy data hiding. But in applications     cover image undergoes lossless compression to create a
such as medical image system, law enforcement, remote            space where the new data is added. Thus the PSNR is
sensing, military imaging etc it is desired to recover the       reduced. In Histogram shift mechanism [4], the pixel
original image content with greater accuracy for legal           values at the zero and the peak points of the histogram are
considerations. The data hiding scheme that satisfies this       modified to add the new data. In wavelet technique and
requirement is called reversible or lossless data hiding.        sorting [5], Kamstra et al. improved the location map by
Reversible data hiding was first proposed for                    sorting possible expandable locations. In integer-to-
authentication and its important feature is reversibility. It    integer wavelet transform method [6], LSB substitution
hides the secret data in the digital image in such a way         and bit shifting was done to add new data to the wavelet
that only the authorized person could decode the secret          coefficients obtained from integer-to-integer wavelet
information and restore the original image. Several data         transform. In [7], Wang et al. uses 2-D vector maps in the
hiding methods have been proposed. The performance of            cover image. In [8], Thodi et al. made better use of
a reversible data embedding algorithm is measured by its         redundancy of neighbouring pixels by using payload
payload capacity, complexity, visual quality and security.       independent overflow location map. But the
Earlier methods have lower embedding capacity and poor           compressibility is undesirable in some image types. In
image quality. As the embedding capacity and image               [9], Hu et al. solved the problem in [8] by constructing an
quality improved, this method became a covert                    efficient payload dependent overflow location map which
communication channel. Not only should the data hiding           has good compressibility. In [10], Hong et al. proposes
algorithm be given importance. The image on which the            the method of orthogonal projection and modifies the
data is hidden should also be highly secured.                    prediction error values to add the secret data. In [11], the
                                                                 data is hidden by modifying a part of the encrypted

                                                     www.ijmer.com                                               1951 | Page
International Journal of Modern Engineering Research (IJMER)
              www.ijmer.com             Vol.2, Issue.4, July-Aug. 2012 pp-1951-1954      ISSN: 2249-6645
image. But the encrypted image is not highly secured and
also the PSNR value is low.

             III. PROPOSED SCHEME

         Figure 1 shows the block diagram of the
proposed scheme. There are three phases – AES image
encryption, data embedding and data extraction / image-
recovery phases.

AES Image Encryption
The original image is in uncompressed format. Firstly, if
the image is a colour image, then encrypt each red, green
and blue channels otherwise convert it into a gray scale
image with each pixel value ranging in between [0-255]
represented by 8 bits and then encrypt the image. The
pixel bits are represented as bi,j,0, bi,j,1,…..bi,j,7.
AES is a substitution-permutation network, which is a
series of mathematical operations that uses substitutions
and permutations such that each output bit depends upon
every input bit. The AES algorithm consists of a set of
processing steps repeated for a number of iterations called
rounds. The number of rounds depends upon the key size.
Each round is a cipher with four operations except the last
round which is having only three operations. First,
AddRoundKey step is performed where the incoming
data and the key are added together. Then it performs the       Data Embedding
round operation. Figure 2 shows the operations in each          In this phase, even though a data hider doesn’t know the
round [12].                                                     original content of the image he can embed the secret data
SubByte: each byte of the block is replaced by its              into the encrypted image by modifying a small part of the
substitute in the substitution box(S-box).                      encrypted image.
ShiftRow: bytes in last three rows are cyclically shifted




left over different number of offsets.                          Firstly, the encrypted image is divided into several
MixColumn: Each column is multiplied with a known               segments of block size s x s. Each block is then used to
matrix. Multiplying by 1 means leaving unchanged, by 2          carry one bit. The sum total of the pixel values of each
means shifting byte to the left and by 3 means shifting to      block is calculated. It is then compared with a threshold
the left and then performing XOR with the initial               value which is set manually such as to obtain greater
unshifted value.                                                PSNR value. The data is then added to the block whose
AddRoundKey: XOR with the actual data and the subkey.           sum of the pixel value is greater than the threshold value
In final round there is no MixColumn step. These steps          by xor-ing the original pixel bits with the secret data.
are done for 10 rounds. Thus it becomes difficult for the       In order to receive the image properly at the receiver, the
attacker to obtain any information about the original           image is compressed using wavelet transform which is a
content from the encrypted image.                               lossless compression method.


                                                   www.ijmer.com                                               1952 | Page
International Journal of Modern Engineering Research (IJMER)
                 www.ijmer.com               Vol.2, Issue.4, July-Aug. 2012 pp-1951-1954      ISSN: 2249-6645

Data Extraction and Image Recovery
In this phase, the image is decrypted using AES
decryption. The steps are AddRoundkey, inverse subbyte
using inverse S-box, inverse shiftrow where the bits are
cyclically shifted towards right, inverse mixcolumn step
using inverse P-box, and AddRoundkey.
The average energy of error between the original and
decrypted pixel value is,
             𝐸 𝐴 = 1 8 7𝑢=0[𝑢 − 7 − 𝑢 ]2          [1]
 u is the no. of bits.
PSNR of the decrypted image,
                            255 2
         𝑃𝑆𝑁𝑅 = 10 log10    𝐸𝐴 2
                                    = 55.11𝑑𝐵          [2]

The decrypted image is segmented into blocks. The sum                               Figure 4. PSNR Vs Data set
total of pixel values of each block is found then. For each
block, if this value is greater than the threshold value then                          V. CONCLUSION
the data is hidden in that block and is extracted by xor-ing         In this work, the cover medium is highly secured for
the original bits with the decrypted bits. Finally combine           reversible data hiding with lower computational
the extracted bits to obtain the secret data and collect the         complexity. The data of the original image is completely
recovered blocks to form the original image.                         encrypted by AES stream cipher which overcomes the
                                                                     disadvantages of DES stream cipher. Even though the
           IV. EXPERIMENTAL SETUP                                    data hider doesn’t know the original content, he can hide
Figure 3(a) shows the original cover media used. 3(b)                the data by modifying a part of the encrypted image. The
shows the encrypted image. 3(c) shows the decrypted                  receiver decrypts the image using AES decryption. The
image carrying the secret data and the value of PSNR                 PSNR value of the decrypted image is high. The hidden
caused by data embedding is 55.11dB. At last, the                    data is then extracted with the data hiding key and the
embedded data was successfully extracted and the cover               original image is recovered. This work may be applicable
image was recovered. Figure 4 shows the PSNR with                    where both the hidden data and the cover media are
respect to the data set values.                                      highly confidential.

                                                                                 VI. ACKNOWLEDGMENT
                                                                     The authors would like to thank the members of the Dept.
                                                                     of CITE, M S University, Tirunelveli for various
                                                                     algorithms used in this research, and all the people who
                                                                     helped in preparing and carrying out the experiments and
                                                                     data collection.

                                                                                          REFERENCES
                                                                     [1]    Jun Tian, “Reversible data embedding using a
           (a)                                  (b)                         difference expansion,” IEEE Transactions on
                                                                            Circuits System and Video Technology, vol. 13, no.
                                                                            8, pp. 890-896, Aug. 2003.

                                                                     [2]    A.M. Alattar, “Reversible watermark using the
                                                                            difference expansion of a generalized integer
                                                                            transform,” IEEE Trans. Image Process., vol. 13,
                                                                            no. 8, pp. 1147-1156, Aug. 2004.

                                                                     [3].   M.U.Celik, G.Sharma, A.M Tekalp, and E. Saber,
                                                                            “Loseless Generalized-LSB data embedding,”
                          (c)                                               IEEE Trans. Image Process., vol. 14, no. 2, pp.
  Figure 3. (a) Original image, (b) Encrypted image, (c)                    253-266, Feb. 2005.
          Decrypted image with the secret data
                                                                     [4].   Z. Ni, Y.Q. Shi, N. Ansari, and W. Su, “Reversible
                                                                            data hiding,” IEEE Transactions on Circuits
                                                                            System and Video Technology, vol. 16, no.3, pp.
                                                                            354-362, Aug. 2006.

                                                                     [5].   L. Kamstra and H. J. A. M. Heijmans, “Reversible
                                                                            data embedding into images using wavelet

                                                      www.ijmer.com                                               1953 | Page
International Journal of Modern Engineering Research (IJMER)
              www.ijmer.com            Vol.2, Issue.4, July-Aug. 2012 pp-1951-1954      ISSN: 2249-6645

        techniques and sorting,” IEEE Trans. Image                                   AUTHORS
       Process., vol. 14, no.12, pp. 2082-2090, Dec.
       2005.                                                                       S. Sabitha received B.Tech. Degree
                                                                                   in Electronics and Communication
[6].   S. Lee, C. D. Yoo, and T. Kalker, “Reversible                               Engineering from Mount Zion
       image watermarking based on integer-to-integer                              College of Engg., Mahatma Gandhi
       wavelet transform,” IEEE Trans. Inf. Forensics                              University, Kerala       in 2010.
       Security, vol. 2, no. 3, pp. 321-330, Sep. 2007.                            Currently, she is doing M.Tech in
                                                                                   Computer       and      Information
[7].   X. T. Wang, C. Y. Shao, X. G. Xu and X. M. Niu                              Technology     in    Manonmaniam
       “Reversible data hiding scheme for 2-D vector                 Sundaranar University, Tirunelveli. Her research
       maps based on difference expansion,” IEEE                     interests include Signal and Image Processing and
       Trans. Inf. Forensics Security, vol. 2, no. 3, pp.            Software Engineering.
       311-320, Sep. 2007.

[8].   D.M. Thodi and J.J. Rodriguez, “Expansion                                  T. Arumuga Maria Devi received
       embedding        techniques     for reversible                             B.E. Degree in Electronics and
       watermarking,” IEEE Trans. Image Process., vol.                            Communication Engineering from
       16, no. 3, pp. 721-730, Mar. 2007.                                         Manonmaniam                 Sundaranar
                                                                                  University, Tirunelveli, India in 2003,
[9].   Y. Hu, H.K. Lee, and J. Li, “DE based Reversible                           M.Tech degree in Computer and
       data hiding with improved overflow location map,”                          Information      Technology        from
       IEEE Transactions on Circuits System and Video                             Manonmaniam                 Sundaranar
       Technology, vol. 19, no.3, pp. 250-260, Feb. 2009.                         University, Tirunelveli, India in 2005
                                                               and worked as Lecturer in the Department of Electronics
[10]. W. Hong, T. S. Chen, Y. P Chang, C. W. Shiu, “A          and Communication         in Sardar Raja College of
      high capacity reversible data hiding scheme using        Engineering. Currently, she has submitted thesis for Ph.D
      orthogonal projection and prediction error               in     Information    Technology-Computer          Science
      modification,” Signal Processing., vol. 90, no.12,       Engineering and also is the Assistant Professor of Centre
      pp. 2911-2922, May. 2010                                 for Information Technology and Engineering of
                                                               Manonmaniam Sundaranar University. Her research
[11]. Xinpeng Zhang, “Reversible data hiding in                interests include Signal and Image Processing,
      encrypted image,” IEEE Signal Processing., vol.          Multimedia and Remote Communication.
      18, no.4, pp. 255-258, April. 2011

BOOKS

[12]. Data Communications and Networking, Behrouz
      A. Forouzan, fourth edition.




                                                  www.ijmer.com                                              1954 | Page

Más contenido relacionado

La actualidad más candente

Reconstructing the Path of the Object based on Time and Date OCR in Surveilla...
Reconstructing the Path of the Object based on Time and Date OCR in Surveilla...Reconstructing the Path of the Object based on Time and Date OCR in Surveilla...
Reconstructing the Path of the Object based on Time and Date OCR in Surveilla...
ijtsrd
 
Ax31139148
Ax31139148Ax31139148
Ax31139148
IJMER
 

La actualidad más candente (18)

High capacity histogram shifting based reversible data hiding with data compr...
High capacity histogram shifting based reversible data hiding with data compr...High capacity histogram shifting based reversible data hiding with data compr...
High capacity histogram shifting based reversible data hiding with data compr...
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Reconstructing the Path of the Object based on Time and Date OCR in Surveilla...
Reconstructing the Path of the Object based on Time and Date OCR in Surveilla...Reconstructing the Path of the Object based on Time and Date OCR in Surveilla...
Reconstructing the Path of the Object based on Time and Date OCR in Surveilla...
 
Reversible Encrypytion and Information Concealment
Reversible Encrypytion and Information ConcealmentReversible Encrypytion and Information Concealment
Reversible Encrypytion and Information Concealment
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
MULTIPLE RECONSTRUCTION COMPRESSION FRAMEWORK BASED ON PNG IMAGE
MULTIPLE RECONSTRUCTION COMPRESSION FRAMEWORK BASED ON PNG IMAGEMULTIPLE RECONSTRUCTION COMPRESSION FRAMEWORK BASED ON PNG IMAGE
MULTIPLE RECONSTRUCTION COMPRESSION FRAMEWORK BASED ON PNG IMAGE
 
Ieee a secure algorithm for image based information hiding with one-dimension...
Ieee a secure algorithm for image based information hiding with one-dimension...Ieee a secure algorithm for image based information hiding with one-dimension...
Ieee a secure algorithm for image based information hiding with one-dimension...
 
Improved block based segmentation for jpeg compressed document images
Improved block based segmentation for jpeg compressed document imagesImproved block based segmentation for jpeg compressed document images
Improved block based segmentation for jpeg compressed document images
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarking
 
Reversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionReversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryption
 
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in image
 
Is3314841490
Is3314841490Is3314841490
Is3314841490
 
Secure High Capacity Data Hiding in Images using EDBTC
Secure High Capacity Data Hiding in Images using EDBTCSecure High Capacity Data Hiding in Images using EDBTC
Secure High Capacity Data Hiding in Images using EDBTC
 
Ijnsa050205
Ijnsa050205Ijnsa050205
Ijnsa050205
 
Ax31139148
Ax31139148Ax31139148
Ax31139148
 
An Uncompressed Image Encryption Algorithm Based on DNA Sequences
An Uncompressed Image Encryption Algorithm Based on DNA Sequences An Uncompressed Image Encryption Algorithm Based on DNA Sequences
An Uncompressed Image Encryption Algorithm Based on DNA Sequences
 
AN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHY
AN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHYAN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHY
AN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHY
 

Destacado

Cs31411414
Cs31411414Cs31411414
Cs31411414
IJMER
 
At2419231928
At2419231928At2419231928
At2419231928
IJMER
 
Picture powerpoint
Picture powerpointPicture powerpoint
Picture powerpoint
padisav17
 
Acc 561 final exam
Acc 561 final examAcc 561 final exam
Acc 561 final exam
liam111221
 
Acc 421 final exam
Acc 421 final examAcc 421 final exam
Acc 421 final exam
liam111221
 
Проект Киноклуб(1)
Проект Киноклуб(1)Проект Киноклуб(1)
Проект Киноклуб(1)
Anna Mazina
 
intipati wawasan
 intipati wawasan intipati wawasan
intipati wawasan
Iveen Chew
 
A04010 02 0107
A04010 02 0107A04010 02 0107
A04010 02 0107
IJMER
 
Presentation bm tahun 1 unit 4 2012
Presentation bm tahun 1 unit 4 2012Presentation bm tahun 1 unit 4 2012
Presentation bm tahun 1 unit 4 2012
凤 葆
 
Management fundamentals
Management fundamentals Management fundamentals
Management fundamentals
Jasimuddin Rony
 

Destacado (20)

Cs31411414
Cs31411414Cs31411414
Cs31411414
 
Hip hop
Hip hopHip hop
Hip hop
 
At2419231928
At2419231928At2419231928
At2419231928
 
Picture powerpoint
Picture powerpointPicture powerpoint
Picture powerpoint
 
Acc 561 final exam
Acc 561 final examAcc 561 final exam
Acc 561 final exam
 
GPS cycle slips detection and repair through various signal combinations
GPS cycle slips detection and repair through various signal combinationsGPS cycle slips detection and repair through various signal combinations
GPS cycle slips detection and repair through various signal combinations
 
The creative arts –
The creative arts –The creative arts –
The creative arts –
 
Variant Flexor Carpi Ulnaris Muscle and Variant Course of Ulnar Artery in For...
Variant Flexor Carpi Ulnaris Muscle and Variant Course of Ulnar Artery in For...Variant Flexor Carpi Ulnaris Muscle and Variant Course of Ulnar Artery in For...
Variant Flexor Carpi Ulnaris Muscle and Variant Course of Ulnar Artery in For...
 
Acc 421 final exam
Acc 421 final examAcc 421 final exam
Acc 421 final exam
 
Проект Киноклуб(1)
Проект Киноклуб(1)Проект Киноклуб(1)
Проект Киноклуб(1)
 
Eleni
EleniEleni
Eleni
 
An Access Control Model for Collaborative Management of Shared Data in OSNS
An Access Control Model for Collaborative Management of Shared Data in OSNSAn Access Control Model for Collaborative Management of Shared Data in OSNS
An Access Control Model for Collaborative Management of Shared Data in OSNS
 
Application of Neuro-Fuzzy System to Evaluate Sustainability in Highway Design
Application of Neuro-Fuzzy System to Evaluate Sustainability in Highway DesignApplication of Neuro-Fuzzy System to Evaluate Sustainability in Highway Design
Application of Neuro-Fuzzy System to Evaluate Sustainability in Highway Design
 
intipati wawasan
 intipati wawasan intipati wawasan
intipati wawasan
 
A04010 02 0107
A04010 02 0107A04010 02 0107
A04010 02 0107
 
Design and Implementation of HDLC Controller by Using Crc-16
Design and Implementation of HDLC Controller by Using Crc-16Design and Implementation of HDLC Controller by Using Crc-16
Design and Implementation of HDLC Controller by Using Crc-16
 
Presentation bm tahun 1 unit 4 2012
Presentation bm tahun 1 unit 4 2012Presentation bm tahun 1 unit 4 2012
Presentation bm tahun 1 unit 4 2012
 
Geotechnical Investigation of Soils: A Case Study of Gombe Town (Sheet 152NW)...
Geotechnical Investigation of Soils: A Case Study of Gombe Town (Sheet 152NW)...Geotechnical Investigation of Soils: A Case Study of Gombe Town (Sheet 152NW)...
Geotechnical Investigation of Soils: A Case Study of Gombe Town (Sheet 152NW)...
 
Management fundamentals
Management fundamentals Management fundamentals
Management fundamentals
 
Misty holcomb
Misty holcombMisty holcomb
Misty holcomb
 

Similar a Az2419511954

REAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUE
REAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUEREAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUE
REAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUE
International Journal of Technical Research & Application
 

Similar a Az2419511954 (20)

Secured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
Secured Reversible Data Hiding In Encrypted Images Using Hyper ChaosSecured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
Secured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
 
K041068072
K041068072K041068072
K041068072
 
F1803063236
F1803063236F1803063236
F1803063236
 
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
 
A Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted ImagesA Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted Images
 
REAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUE
REAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUEREAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUE
REAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUE
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
 
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
 
A010520107
A010520107A010520107
A010520107
 
Data encryption using LSB matching algorithm and Reserving Room before Encryp...
Data encryption using LSB matching algorithm and Reserving Room before Encryp...Data encryption using LSB matching algorithm and Reserving Room before Encryp...
Data encryption using LSB matching algorithm and Reserving Room before Encryp...
 
Data Steganography for Optical Color Image Cryptosystems
Data Steganography for Optical Color Image CryptosystemsData Steganography for Optical Color Image Cryptosystems
Data Steganography for Optical Color Image Cryptosystems
 
Encryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix MultiplicationEncryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix Multiplication
 
Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...
Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...
Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...
 
ICIECA 2014 Paper 20
ICIECA 2014 Paper 20ICIECA 2014 Paper 20
ICIECA 2014 Paper 20
 
Implementation for Data Hiding using Visual Cryptography
Implementation for Data Hiding using Visual Cryptography           Implementation for Data Hiding using Visual Cryptography
Implementation for Data Hiding using Visual Cryptography
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH Technique
 

Más de IJMER

Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
IJMER
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
IJMER
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
IJMER
 

Más de IJMER (20)

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
 

Az2419511954

  • 1. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.2, Issue.4, July-Aug. 2012 pp-1951-1954 ISSN: 2249-6645 Symmetric Key Cryptography on Images in AES Algorithm and Hiding Data Losslessly T. Arumuga Maria Devi1, Sabitha.S2 Assistant Professor, Dept. of CITE M.Tech Student, Dept. of CITE Centre for Information Technology and Engineering, Manonmaniam Sundaranar University, Tirunelveli Abstract: Reversible (lossless) data embedding (hiding) In this paper, both the cover image and the secret data are has drawn lots of interest recently. Being reversible, the given equal importance. The visual quality after original cover content can be completely restored. This encryption as well as the PSNR is also improved. It paper proposes a novel reversible data hiding scheme consists of three phases – AES image encryption, data with a lower computational complexity and can be used embedding and data extraction/image-recovery phases. in applications where both the image and the hidden In the first phase, the data of original image are entirely information is highly confidential. It consists of three encrypted by an AES (Advanced Encryption standard) phases –AES image encryption, data embedding and data stream cipher. The data encryption standard (DES) is extraction/image-recovery phases. Here, the encrypted weak due to smaller key size, 56 bit. Whereas AES can image is made highly secured by using an AES (Advanced use three different key sizes: 128, 192 and 256 bits. In Encryption standard) stream cipher. Although a data- the second phase, although a data-hider does not know hider does not know the original image content, he can the original image content, he can embed additional data embed additional data into the encrypted image using the into the encrypted image by modifying a part of data hiding key. A receiver may firstly decrypt the encrypted data using the data hiding key. In the third encrypted image using the encryption key. This decrypted phase, a receiver may firstly decrypt the encrypted image image is similar to the original image. With the data- containing the embedded data using the encryption key. hiding key, the embedded data can be correctly extracted This decrypted image is similar to the original image. while the original image can be perfectly recovered. With the data-hiding key, the embedded data can be correctly extracted while the original image can be Index Terms: AES encryption – Data Embedding – perfectly recovered. Image Recovery. II. EXISTING METHODS I. INTRODUCTION In Difference Expansion method [1], the differences Data hiding is a technique that is used to hide between two adjacent neighboring pixels are doubled to information in digital media such as images, audio, video generate a new least significant bit where the new data is etc. The information that is hidden depends upon the hidden providing large information package. In purpose of application. Owing to data hiding, some Generalized DE based method [2], Tian’s pixel-pair distortion may occur in the original cover medium and difference expansion was extended using difference cannot be inverted back to the original medium. Such a expansion of vectors. In Generalized LSB method [3], the data hiding is called lossy data hiding. But in applications cover image undergoes lossless compression to create a such as medical image system, law enforcement, remote space where the new data is added. Thus the PSNR is sensing, military imaging etc it is desired to recover the reduced. In Histogram shift mechanism [4], the pixel original image content with greater accuracy for legal values at the zero and the peak points of the histogram are considerations. The data hiding scheme that satisfies this modified to add the new data. In wavelet technique and requirement is called reversible or lossless data hiding. sorting [5], Kamstra et al. improved the location map by Reversible data hiding was first proposed for sorting possible expandable locations. In integer-to- authentication and its important feature is reversibility. It integer wavelet transform method [6], LSB substitution hides the secret data in the digital image in such a way and bit shifting was done to add new data to the wavelet that only the authorized person could decode the secret coefficients obtained from integer-to-integer wavelet information and restore the original image. Several data transform. In [7], Wang et al. uses 2-D vector maps in the hiding methods have been proposed. The performance of cover image. In [8], Thodi et al. made better use of a reversible data embedding algorithm is measured by its redundancy of neighbouring pixels by using payload payload capacity, complexity, visual quality and security. independent overflow location map. But the Earlier methods have lower embedding capacity and poor compressibility is undesirable in some image types. In image quality. As the embedding capacity and image [9], Hu et al. solved the problem in [8] by constructing an quality improved, this method became a covert efficient payload dependent overflow location map which communication channel. Not only should the data hiding has good compressibility. In [10], Hong et al. proposes algorithm be given importance. The image on which the the method of orthogonal projection and modifies the data is hidden should also be highly secured. prediction error values to add the secret data. In [11], the data is hidden by modifying a part of the encrypted www.ijmer.com 1951 | Page
  • 2. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.2, Issue.4, July-Aug. 2012 pp-1951-1954 ISSN: 2249-6645 image. But the encrypted image is not highly secured and also the PSNR value is low. III. PROPOSED SCHEME Figure 1 shows the block diagram of the proposed scheme. There are three phases – AES image encryption, data embedding and data extraction / image- recovery phases. AES Image Encryption The original image is in uncompressed format. Firstly, if the image is a colour image, then encrypt each red, green and blue channels otherwise convert it into a gray scale image with each pixel value ranging in between [0-255] represented by 8 bits and then encrypt the image. The pixel bits are represented as bi,j,0, bi,j,1,…..bi,j,7. AES is a substitution-permutation network, which is a series of mathematical operations that uses substitutions and permutations such that each output bit depends upon every input bit. The AES algorithm consists of a set of processing steps repeated for a number of iterations called rounds. The number of rounds depends upon the key size. Each round is a cipher with four operations except the last round which is having only three operations. First, AddRoundKey step is performed where the incoming data and the key are added together. Then it performs the Data Embedding round operation. Figure 2 shows the operations in each In this phase, even though a data hider doesn’t know the round [12]. original content of the image he can embed the secret data SubByte: each byte of the block is replaced by its into the encrypted image by modifying a small part of the substitute in the substitution box(S-box). encrypted image. ShiftRow: bytes in last three rows are cyclically shifted left over different number of offsets. Firstly, the encrypted image is divided into several MixColumn: Each column is multiplied with a known segments of block size s x s. Each block is then used to matrix. Multiplying by 1 means leaving unchanged, by 2 carry one bit. The sum total of the pixel values of each means shifting byte to the left and by 3 means shifting to block is calculated. It is then compared with a threshold the left and then performing XOR with the initial value which is set manually such as to obtain greater unshifted value. PSNR value. The data is then added to the block whose AddRoundKey: XOR with the actual data and the subkey. sum of the pixel value is greater than the threshold value In final round there is no MixColumn step. These steps by xor-ing the original pixel bits with the secret data. are done for 10 rounds. Thus it becomes difficult for the In order to receive the image properly at the receiver, the attacker to obtain any information about the original image is compressed using wavelet transform which is a content from the encrypted image. lossless compression method. www.ijmer.com 1952 | Page
  • 3. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.2, Issue.4, July-Aug. 2012 pp-1951-1954 ISSN: 2249-6645 Data Extraction and Image Recovery In this phase, the image is decrypted using AES decryption. The steps are AddRoundkey, inverse subbyte using inverse S-box, inverse shiftrow where the bits are cyclically shifted towards right, inverse mixcolumn step using inverse P-box, and AddRoundkey. The average energy of error between the original and decrypted pixel value is, 𝐸 𝐴 = 1 8 7𝑢=0[𝑢 − 7 − 𝑢 ]2 [1] u is the no. of bits. PSNR of the decrypted image, 255 2 𝑃𝑆𝑁𝑅 = 10 log10 𝐸𝐴 2 = 55.11𝑑𝐵 [2] The decrypted image is segmented into blocks. The sum Figure 4. PSNR Vs Data set total of pixel values of each block is found then. For each block, if this value is greater than the threshold value then V. CONCLUSION the data is hidden in that block and is extracted by xor-ing In this work, the cover medium is highly secured for the original bits with the decrypted bits. Finally combine reversible data hiding with lower computational the extracted bits to obtain the secret data and collect the complexity. The data of the original image is completely recovered blocks to form the original image. encrypted by AES stream cipher which overcomes the disadvantages of DES stream cipher. Even though the IV. EXPERIMENTAL SETUP data hider doesn’t know the original content, he can hide Figure 3(a) shows the original cover media used. 3(b) the data by modifying a part of the encrypted image. The shows the encrypted image. 3(c) shows the decrypted receiver decrypts the image using AES decryption. The image carrying the secret data and the value of PSNR PSNR value of the decrypted image is high. The hidden caused by data embedding is 55.11dB. At last, the data is then extracted with the data hiding key and the embedded data was successfully extracted and the cover original image is recovered. This work may be applicable image was recovered. Figure 4 shows the PSNR with where both the hidden data and the cover media are respect to the data set values. highly confidential. VI. ACKNOWLEDGMENT The authors would like to thank the members of the Dept. of CITE, M S University, Tirunelveli for various algorithms used in this research, and all the people who helped in preparing and carrying out the experiments and data collection. REFERENCES [1] Jun Tian, “Reversible data embedding using a (a) (b) difference expansion,” IEEE Transactions on Circuits System and Video Technology, vol. 13, no. 8, pp. 890-896, Aug. 2003. [2] A.M. Alattar, “Reversible watermark using the difference expansion of a generalized integer transform,” IEEE Trans. Image Process., vol. 13, no. 8, pp. 1147-1156, Aug. 2004. [3]. M.U.Celik, G.Sharma, A.M Tekalp, and E. Saber, “Loseless Generalized-LSB data embedding,” (c) IEEE Trans. Image Process., vol. 14, no. 2, pp. Figure 3. (a) Original image, (b) Encrypted image, (c) 253-266, Feb. 2005. Decrypted image with the secret data [4]. Z. Ni, Y.Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Transactions on Circuits System and Video Technology, vol. 16, no.3, pp. 354-362, Aug. 2006. [5]. L. Kamstra and H. J. A. M. Heijmans, “Reversible data embedding into images using wavelet www.ijmer.com 1953 | Page
  • 4. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.2, Issue.4, July-Aug. 2012 pp-1951-1954 ISSN: 2249-6645 techniques and sorting,” IEEE Trans. Image AUTHORS Process., vol. 14, no.12, pp. 2082-2090, Dec. 2005. S. Sabitha received B.Tech. Degree in Electronics and Communication [6]. S. Lee, C. D. Yoo, and T. Kalker, “Reversible Engineering from Mount Zion image watermarking based on integer-to-integer College of Engg., Mahatma Gandhi wavelet transform,” IEEE Trans. Inf. Forensics University, Kerala in 2010. Security, vol. 2, no. 3, pp. 321-330, Sep. 2007. Currently, she is doing M.Tech in Computer and Information [7]. X. T. Wang, C. Y. Shao, X. G. Xu and X. M. Niu Technology in Manonmaniam “Reversible data hiding scheme for 2-D vector Sundaranar University, Tirunelveli. Her research maps based on difference expansion,” IEEE interests include Signal and Image Processing and Trans. Inf. Forensics Security, vol. 2, no. 3, pp. Software Engineering. 311-320, Sep. 2007. [8]. D.M. Thodi and J.J. Rodriguez, “Expansion T. Arumuga Maria Devi received embedding techniques for reversible B.E. Degree in Electronics and watermarking,” IEEE Trans. Image Process., vol. Communication Engineering from 16, no. 3, pp. 721-730, Mar. 2007. Manonmaniam Sundaranar University, Tirunelveli, India in 2003, [9]. Y. Hu, H.K. Lee, and J. Li, “DE based Reversible M.Tech degree in Computer and data hiding with improved overflow location map,” Information Technology from IEEE Transactions on Circuits System and Video Manonmaniam Sundaranar Technology, vol. 19, no.3, pp. 250-260, Feb. 2009. University, Tirunelveli, India in 2005 and worked as Lecturer in the Department of Electronics [10]. W. Hong, T. S. Chen, Y. P Chang, C. W. Shiu, “A and Communication in Sardar Raja College of high capacity reversible data hiding scheme using Engineering. Currently, she has submitted thesis for Ph.D orthogonal projection and prediction error in Information Technology-Computer Science modification,” Signal Processing., vol. 90, no.12, Engineering and also is the Assistant Professor of Centre pp. 2911-2922, May. 2010 for Information Technology and Engineering of Manonmaniam Sundaranar University. Her research [11]. Xinpeng Zhang, “Reversible data hiding in interests include Signal and Image Processing, encrypted image,” IEEE Signal Processing., vol. Multimedia and Remote Communication. 18, no.4, pp. 255-258, April. 2011 BOOKS [12]. Data Communications and Networking, Behrouz A. Forouzan, fourth edition. www.ijmer.com 1954 | Page