Secure Reversible Image Data Hiding Over Encrypted Domain via Key Modulation using matlab


ABSTRACT:

This work proposes a novel reversible image data hiding (RIDH) scheme over encrypted domain. The data embedding is achieved through a public key modulation mechanism, in which access to the secret encryption key is not needed. At the decoder side, a powerful two-class SVM classifier is designed to distinguish encrypted and non-encrypted image patches, allowing us to jointly decode the embedded message and the original image signal. Compared with the state-of-the-arts, the proposed approach provides higher embedding capacity, and is able to perfectly reconstruct the original image as well as the embedded message. Extensive experimental results are provided to validate the superior performance of our scheme.
EXISTING METHOD:

The existing RIDH schemes including both non-separable as well as separable solutions, an extra data hiding key is introduced to ensure embedding security. Certainly, the data hiding key needs to be shared and managed between the date hider and the recipient. As mentioned earlier, the key management functions, e.g., the key generation, activation, de-activation, suspension, expiration, destruction, archival, and revocation, are difficult to be reliably implemented within such distributed infrastructure. 
A natural question arising now is whether we can design an encrypted-domain RIDH scheme, which does not require a secret data hiding key, while still ensuring that only the party with the secret encryption key K can disclose the embedded message. 
This could be very valuable in practice, as the cost and the potential risk of building up the KMS can be significantly reduced. Intuitively, this is achievable because the security offered by the encryption key may be appropriately extended to protect the data embedding.

DISADVANTAGES:

High redundancy 
Low PSNR
Low image quality
High SNR

PROPOSED METHOD:

In this paper, we design a secure reversible image data hiding (RIDH) scheme operated over the encrypted domain. We suggest a public key modulation mechanism, which allows us to embed the data via simple XOR operations, without the need of accessing the secret encryption key. 
At the decoder side, we propose to use a powerful two-class SVM classifier to discriminate encrypted and non-encrypted image patches, enabling us to jointly decode the embedded message and the original image signal perfectly. 
We also have performed extensive experiments to validate the superior embedding performance of our proposed RIDH method over encrypted domain.

ADVANTAGES:

Low redundancy 
High PSNR
High image quality
Low SNR

ALGORITHM DETAILS:

SVM Classifier
Wavelet based Image Decomposition


BLOCK DIAGRAM: 


SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS

Processor Type                     : Pentium -IV
Speed                                    : 2.4 GHZ
Ram                                      : 128 MB RAM
Hard disk                              : 20 GB HD

SOFTWARE REQUIREMENTS

Operating System                      : Windows 7 
Software Programming Package        : Matlab R2010b


12:48 AM 1 Crore Projects
Latest Post