SlideShare una empresa de Scribd logo
1 de 1
Impulse Technologies
                                       Beacons U to World of technology
        044-42133143, 98401 03301,9841091117 ieeeprojects@yahoo.com www.impulse.net.in
             Separable Reversible Data Hiding in Encrypted Image
   Abstract
         1
            This work proposes a novel scheme for separable reversible data hiding in
   encrypted images. In the first phase, a content owner encrypts the original uncompressed
   image using an encryption key. Then, a data-hider may compress the least significant bits
   of the encrypted image using a data-hiding key to create a sparse space to accommodate
   some additional data. With an encrypted image containing additional data, if a receiver
   has the data-hiding key, he can extract the additional data though he does not know the
   image content. If the receiver has the encryption key, he can decrypt the received data to
   obtain an image similar to the original one, but cannot extract the additional data. If the
   receiver has both the data-hiding key and the encryption key, he can extract the additional
   data and recover the original content without any error by exploiting the spatial
   correlation in natural image when the amount of additional data is not too large.




   1


  Your Own Ideas or Any project from any company can be Implemented
at Better price (All Projects can be done in Java or DotNet whichever the student wants)
                                                                                            1

Más contenido relacionado

La actualidad más candente

Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
Sreeda Perikamana
 

La actualidad más candente (19)

Reversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionReversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryption
 
Reversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionReversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryption
 
Lossless and reversible data hiding in encrypted images with public key crypt...
Lossless and reversible data hiding in encrypted images with public key crypt...Lossless and reversible data hiding in encrypted images with public key crypt...
Lossless and reversible data hiding in encrypted images with public key crypt...
 
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...
 
Learnable Image Encryption
Learnable Image EncryptionLearnable Image Encryption
Learnable Image Encryption
 
F1803063236
F1803063236F1803063236
F1803063236
 
V5 i7 0169
V5 i7 0169V5 i7 0169
V5 i7 0169
 
19_2
19_219_2
19_2
 
DIP Using Image Encryption and XOR Operation Affine Transform
DIP Using Image Encryption and XOR Operation Affine TransformDIP Using Image Encryption and XOR Operation Affine Transform
DIP Using Image Encryption and XOR Operation Affine Transform
 
Secured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
Secured Reversible Data Hiding In Encrypted Images Using Hyper ChaosSecured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
Secured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
 
Secure Data Sharing Using Compact Summation key in Hybrid Cloud Storage
Secure Data Sharing Using Compact Summation key in Hybrid Cloud StorageSecure Data Sharing Using Compact Summation key in Hybrid Cloud Storage
Secure Data Sharing Using Compact Summation key in Hybrid Cloud Storage
 
C3 s
C3 sC3 s
C3 s
 
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTINGDATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
 
Why Encryption For The Cloud Is A Good Idea
Why Encryption For The Cloud Is A Good IdeaWhy Encryption For The Cloud Is A Good Idea
Why Encryption For The Cloud Is A Good Idea
 
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMATDATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
 
Machine Learning @ NECST
Machine Learning @ NECSTMachine Learning @ NECST
Machine Learning @ NECST
 
Provenance based presentation on cloud computing security
Provenance based presentation on cloud computing securityProvenance based presentation on cloud computing security
Provenance based presentation on cloud computing security
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 

Destacado

Esperanza Renace - Megan Sherburne SPA 052
Esperanza Renace - Megan Sherburne SPA 052Esperanza Renace - Megan Sherburne SPA 052
Esperanza Renace - Megan Sherburne SPA 052
megsher193
 
Camilo Castro Duarte bombas-aplicaciones
Camilo Castro Duarte bombas-aplicacionesCamilo Castro Duarte bombas-aplicaciones
Camilo Castro Duarte bombas-aplicaciones
Camilo Castro Duarte
 
Bombas De Desplazamiento Positivo
Bombas De Desplazamiento PositivoBombas De Desplazamiento Positivo
Bombas De Desplazamiento Positivo
David Guzman
 
Bombas de desplazamiento positivo reciprocantes
Bombas de desplazamiento positivo reciprocantesBombas de desplazamiento positivo reciprocantes
Bombas de desplazamiento positivo reciprocantes
Emmanuel Campos
 
Diapositiva de interes compuesto
Diapositiva de interes compuestoDiapositiva de interes compuesto
Diapositiva de interes compuesto
Efernandez1
 

Destacado (20)

Empresa
EmpresaEmpresa
Empresa
 
Inetres compuesto
Inetres compuestoInetres compuesto
Inetres compuesto
 
Etandares de planificacion familiar
Etandares de planificacion familiarEtandares de planificacion familiar
Etandares de planificacion familiar
 
Esperanza Renace - Megan Sherburne SPA 052
Esperanza Renace - Megan Sherburne SPA 052Esperanza Renace - Megan Sherburne SPA 052
Esperanza Renace - Megan Sherburne SPA 052
 
Interes compuesto
Interes compuestoInteres compuesto
Interes compuesto
 
Interes Compuesto
Interes CompuestoInteres Compuesto
Interes Compuesto
 
Bombas de desplazamiento positivo
Bombas de desplazamiento positivoBombas de desplazamiento positivo
Bombas de desplazamiento positivo
 
11. bombas de desplazamiento positivo
11. bombas de desplazamiento positivo11. bombas de desplazamiento positivo
11. bombas de desplazamiento positivo
 
Camilo Castro Duarte bombas-aplicaciones
Camilo Castro Duarte bombas-aplicacionesCamilo Castro Duarte bombas-aplicaciones
Camilo Castro Duarte bombas-aplicaciones
 
Interés compuesto - presentación
Interés compuesto - presentaciónInterés compuesto - presentación
Interés compuesto - presentación
 
Diapositivas interes compuesto ing rafael salcedo
Diapositivas   interes compuesto ing rafael salcedoDiapositivas   interes compuesto ing rafael salcedo
Diapositivas interes compuesto ing rafael salcedo
 
Bombas De Desplazamiento Positivo
Bombas De Desplazamiento PositivoBombas De Desplazamiento Positivo
Bombas De Desplazamiento Positivo
 
CLASIFICACIÓN Y FUNCIONAMIENTO DE BOMBAS CENTRIFUGA 0407
CLASIFICACIÓN Y FUNCIONAMIENTO DE BOMBAS CENTRIFUGA 0407CLASIFICACIÓN Y FUNCIONAMIENTO DE BOMBAS CENTRIFUGA 0407
CLASIFICACIÓN Y FUNCIONAMIENTO DE BOMBAS CENTRIFUGA 0407
 
Interes compuesto
Interes compuestoInteres compuesto
Interes compuesto
 
Bombas de desplazamiento positivo reciprocantes
Bombas de desplazamiento positivo reciprocantesBombas de desplazamiento positivo reciprocantes
Bombas de desplazamiento positivo reciprocantes
 
Interés compuesto - Aplicaciones
Interés compuesto - Aplicaciones Interés compuesto - Aplicaciones
Interés compuesto - Aplicaciones
 
Diapositiva de interes compuesto
Diapositiva de interes compuestoDiapositiva de interes compuesto
Diapositiva de interes compuesto
 
Bombas de desplazamiento positivo
Bombas de desplazamiento positivoBombas de desplazamiento positivo
Bombas de desplazamiento positivo
 
DESNUTRICION INFANTIL
DESNUTRICION INFANTILDESNUTRICION INFANTIL
DESNUTRICION INFANTIL
 
Tipos de bombas
Tipos de bombasTipos de bombas
Tipos de bombas
 

Similar a 21

Az2419511954
Az2419511954Az2419511954
Az2419511954
IJMER
 
Image Steganography. Image Steganography. Image Steganography
Image Steganography. Image Steganography. Image SteganographyImage Steganography. Image Steganography. Image Steganography
Image Steganography. Image Steganography. Image Steganography
Monica Turner
 

Similar a 21 (20)

Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
 
novel Approach For Data Hiding by integrating Steganography and Extended Visu...
novel Approach For Data Hiding by integrating Steganography and Extended Visu...novel Approach For Data Hiding by integrating Steganography and Extended Visu...
novel Approach For Data Hiding by integrating Steganography and Extended Visu...
 
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
 
Sub1584
Sub1584Sub1584
Sub1584
 
Data encryption using LSB matching algorithm and Reserving Room before Encryp...
Data encryption using LSB matching algorithm and Reserving Room before Encryp...Data encryption using LSB matching algorithm and Reserving Room before Encryp...
Data encryption using LSB matching algorithm and Reserving Room before Encryp...
 
K041068072
K041068072K041068072
K041068072
 
Stegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in ImageStegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in Image
 
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
 
Az2419511954
Az2419511954Az2419511954
Az2419511954
 
REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE ENCRYPTIO...
REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE ENCRYPTIO...REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE ENCRYPTIO...
REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE ENCRYPTIO...
 
A Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted ImagesA Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted Images
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
 
IMAGE STEGANOGRAPHY USING CNN
IMAGE STEGANOGRAPHY USING CNNIMAGE STEGANOGRAPHY USING CNN
IMAGE STEGANOGRAPHY USING CNN
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
 
11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography
 
Designing an efficient image encryption then-compression system via predictio...
Designing an efficient image encryption then-compression system via predictio...Designing an efficient image encryption then-compression system via predictio...
Designing an efficient image encryption then-compression system via predictio...
 
Encryption
EncryptionEncryption
Encryption
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
 
Image Steganography. Image Steganography. Image Steganography
Image Steganography. Image Steganography. Image SteganographyImage Steganography. Image Steganography. Image Steganography
Image Steganography. Image Steganography. Image Steganography
 

Más de IMPULSE_TECHNOLOGY

Más de IMPULSE_TECHNOLOGY (20)

17
1717
17
 
16
1616
16
 
15
1515
15
 
25
2525
25
 
24
2424
24
 
23
2323
23
 
22
2222
22
 
21
2121
21
 
20
2020
20
 
19
1919
19
 
18
1818
18
 
16
1616
16
 
15
1515
15
 
14
1414
14
 
13
1313
13
 
12
1212
12
 
11
1111
11
 
10
1010
10
 
9
99
9
 
8
88
8
 

Último

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Último (20)

ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 

21

  • 1. Impulse Technologies Beacons U to World of technology 044-42133143, 98401 03301,9841091117 ieeeprojects@yahoo.com www.impulse.net.in Separable Reversible Data Hiding in Encrypted Image Abstract 1 This work proposes a novel scheme for separable reversible data hiding in encrypted images. In the first phase, a content owner encrypts the original uncompressed image using an encryption key. Then, a data-hider may compress the least significant bits of the encrypted image using a data-hiding key to create a sparse space to accommodate some additional data. With an encrypted image containing additional data, if a receiver has the data-hiding key, he can extract the additional data though he does not know the image content. If the receiver has the encryption key, he can decrypt the received data to obtain an image similar to the original one, but cannot extract the additional data. If the receiver has both the data-hiding key and the encryption key, he can extract the additional data and recover the original content without any error by exploiting the spatial correlation in natural image when the amount of additional data is not too large. 1 Your Own Ideas or Any project from any company can be Implemented at Better price (All Projects can be done in Java or DotNet whichever the student wants) 1