SlideShare a Scribd company logo
2
Most read
3
Most read
4
Most read
Optimized Reversible Data Hiding Technique for
Secured Data Transmission
Guide:- Submitted by:
Himanshu bal
Department of Information Technology
2015-2016
TE(IT)seminar 14/3/2016 pgno.1 slideno. 1
PROBLEM DEFINITION
Discussing a solution for reversible data hiding by optimizing the
techniques presently available for secured data transmission.
TE(IT)seminar 14/3/2016 pgno.1 slideno. 2
Optimized Reversible Data Hiding Technique for Secured Data Transmission
OBJECTIVE:
1. Generate an optimized reversible data hiding technique to overcome the issues in
current RHD trends like:
1. Low embedding capacity
2. High distortion rate etc.
3. Low utilization of 2D histogram
TE(IT)seminar 14/3/2016 pgno. 1 slideno. 3
Optimized Reversible Data Hiding Technique for Secured Data Transmission
INTRODUCTION
1. Steganography is the art or practice of concealing a message, image, or file
within another message, image, or file.
2. The word steganography combines the Ancient Greek words steganos, meaning
"covered, concealed, or protected”.
3. One of its application is Reversible data hiding (RHD).
4. Reversible data hiding (RDH) is used to embed secret message into a cover image
by slightly modifying its pixel values.
TE(IT)seminar 14/3/2016 pgno. 1 slideno.4
Optimized Reversible Data Hiding Technique for Secured Data Transmission
WHY STEGANOGRAPHY
OVER
CRYPTOGRAPHY????
TE(IT)seminar 14/3/2016 pgno.2 slideno.5
Optimized Reversible Data Hiding Technique for Secured Data Transmission
LITERATURE SURVEY
DIFFERENT RDH METHODS:
1. Tian's method of LSB (2003). J. Tian, Reversible data embedding using a difference
expansion, IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–
896,Aug.2003
2. Ni et al’s method of histogram shifting (2006). Reversible image watermarking on
prediction errors by efficient histogram modification, Signal Process., vol. 92,no. 12,
pp. 3000–3009, Dec. 2006.
3. Thodi and Rodriguez hybrid method (2012). , “A Novel Reversible Data Hiding
Scheme Based on Two-Dimensional Difference-Histogram Modification”, IEEE
Transactions on Information Forensics and Security, July 2012.
TE(IT)seminar 14/3/2016 pgno.2 slideno.6
Optimized Reversible Data Hiding Technique for Secured Data Transmission
RELATED WORKS
TE(IT)seminar 14/3/2016 pgno.2 slideno. 7
Optimized Reversible Data Hiding Technique for Secured Data Transmission
NE ET AL’S METHOD OF HISTOGRAM
SHIFTING
1. The method modifies the pixel-pairs with differences 1 or -1 to carry data.
2. For data embedding, the difference image is first computed for a gray-scale cover
image using formula :
D(i,j) = I(i, 2j + 1) – I(i, 2j)
3. Then marked image is obtained as
TE(IT)seminar 14/3/2016 pgno.3 slideno.8
Optimized Reversible Data Hiding Technique for Secured Data Transmission
NE ET AL’S METHOD OF HISTOGRAM
SHIFTING contd.
1.Then the information bits can be extracted as
2.And finally the original picture can be recovered
3.Here the difference Dm(i,j) = Im(i,2j+1) – Im(i, 2j) is the difference value
computed from the marked image.
TE(IT)seminar 14/3/2016 pgno. 3 slideno. 9
Optimized Reversible Data Hiding Technique for Secured Data Transmission
b=
0, if Dm(i,j)=-1
1, if Dm(i,j)=+1
NOW LETS’S COME TO OUR NEW
ENHANCED METHOD
TE(IT)seminar 14/3/2016 pgno.4 slideno.10
Optimized Reversible Data Hiding Technique for Secured Data Transmission
ARCHITECTURE FOR EMBEDDING
AND EXTRACTION
ARCHITECTURE FOR EMBEDDING ARCHITECTURE FOR EXTRACTION
TE(IT)seminar 14/3/2016 pgno. 4 slideno.11
Optimized Reversible Data Hiding Technique for Secured Data Transmission
WORKING OF HISTOGRAM SHIFTING
BASED RDH METHOD
THE HISTOGRAM SHIFTING BASED RHD METHOD REQUIRE FOUR
STEPS TO COMPLETE THE PROCESS:
1. Histogram shifting
2. Encoding process
3. Embedding process
4. Extraction process
TE(IT)seminar 14/3/2016 pgno. 5 slideno. 12
Optimized Reversible Data Hiding Technique for Secured Data Transmission
HISTOGRAM SHIFTING CONSISTS OF
FOLLOWING STEPS
1. Computing difference image for gray scale
2. Using histogram bins for expansion embedding
3. Modification of pixels
TE(IT)seminar 14/3/2016 pgno.5 slideno. 13
Optimized Reversible Data Hiding Technique for Secured Data Transmission
ENCODING PROCESS
1. Data compression.
2. Using run length encoding.
3. Counting the runs.
TE(IT)seminar 14/3/2016 pgno.5 slideno.14
Optimized Reversible Data Hiding Technique for Secured Data Transmission
EMBEDDING PROCESS
1. Dividing the host image into non overlapping blocks.
2. Using LSB replacement to embed the location mapping.
3. embed the LSB sequence Into using shifting and embedding functions
Illustration of the data embedding
TE(IT)seminar 14/3/2016 pgno.6 slideno. 15
Optimized Reversible Data Hiding Technique for Secured Data Transmission
WORKING PRINCIPLE FOR
EMBEDDING ANY TYPE OF MESSAGE
INFO HIDDEN
INFO
HIDDEN
INFO
STEGO
KEY
COVER
MEDIUM
STEGO
OUTPUT
TE(IT)seminar 14/3/2016 pgno.6 slideno. 16
Optimized Reversible Data Hiding Technique for Secured Data Transmission
EXTRACTION PROCESS
1. Dividing the marked image blocks.
2. determining the location map.
3. Extraction the embedded data.
TE(IT)seminar 14/3/2016 pgno.7 slideno.17
Optimized Reversible Data Hiding Technique for Secured Data Transmission
RESULTS OF HISTOGRAM METHOD
ORIGINAL IMAGE IMAGE AFTER EMBEDDING
HISTOGRAM BASED ON ORIGINAL IMAGE
SHIFTED AND EMBEDDED HISTOGRAM
TE(IT)seminar 14/3/2016 pgno.7 slideno. 18
Optimized Reversible Data Hiding Technique for Secured Data Transmission
PSNR VS EMBEDDING RATE
TE(IT)seminar 14/3/2016 pgno. 8 slideno.19
PERFORMANCE ANALYSIS
Optimized Reversible Data Hiding Technique for Secured Data Transmission
MOTIVATION
TE(IT)seminar 14/3/2016 pgno.8 slideno. 20
Optimized Reversible Data Hiding Technique for Secured Data Transmission
ADVANTAGES
1. The embedding capacity has been enhanced.
2. The distortion ration is reduced.
3. Better utilization of 2D histogram.
4. Better recovery of image.
TE(IT)seminar 14/3/2016 pgno. 9 slideno. 21
Optimized Reversible Data Hiding Technique for Secured Data Transmission
CONCLUSION
This algorithm can achieve a better performance compared with the
state-of-the-art works. So the proposed framework has a potential to
provide excellent RDH algorithms.
TE(IT)seminar 14/3/2016 pgno.11 slideno.22
Optimized Reversible Data Hiding Technique for Secured Data Transmission
TE(IT)seminar 14/3/2016 pgno. slideno. 23
Optimized Reversible Data Hiding Technique for Secured Data Transmission

More Related Content

PDF
Impediment detection robot using Arduino
PPTX
3D OPTICAL STORAGE TECHNOLOGY technical seminar 4B.pptx
PPTX
Embedded Systems in Automobile
PPTX
Smart street lighting control system project PPT
PDF
steganography using visual cryptography_report
PPTX
Palm Vein Technology
DOCX
Face recognition system
PPTX
Stages of image processing
Impediment detection robot using Arduino
3D OPTICAL STORAGE TECHNOLOGY technical seminar 4B.pptx
Embedded Systems in Automobile
Smart street lighting control system project PPT
steganography using visual cryptography_report
Palm Vein Technology
Face recognition system
Stages of image processing

What's hot (20)

PPTX
Unit 3 machine vision
PDF
Why they made grayscale
PPT
An atm with an eye
PPT
Pill Camera ppt
PPT
3D Vision Technology
PPTX
Latest ECE Projects Ideas In Various Electronics Technologies
PDF
AI Personal Trainer Using Open CV and Media Pipe
PPT
Gsm based smart card information for lost atm cards
PPTX
Arduino Line following Car
PDF
Face Recognition Based Attendance System using Machine Learning
PPTX
Brain controlled wheel chair
PPTX
Palm Vein Technology
PPTX
Electronic Ticketing System for Public Transport System using NFC Technology
PDF
Silent sound technology final report
PDF
E intelligence
PPT
The motion estimation
DOCX
Human body temperature sensed automatic door opening system
PPTX
virtual surgery
PDF
Lecture 8 (Stereo imaging) (Digital Image Processing)
PPT
Palm vein technology
Unit 3 machine vision
Why they made grayscale
An atm with an eye
Pill Camera ppt
3D Vision Technology
Latest ECE Projects Ideas In Various Electronics Technologies
AI Personal Trainer Using Open CV and Media Pipe
Gsm based smart card information for lost atm cards
Arduino Line following Car
Face Recognition Based Attendance System using Machine Learning
Brain controlled wheel chair
Palm Vein Technology
Electronic Ticketing System for Public Transport System using NFC Technology
Silent sound technology final report
E intelligence
The motion estimation
Human body temperature sensed automatic door opening system
virtual surgery
Lecture 8 (Stereo imaging) (Digital Image Processing)
Palm vein technology
Ad

Similar to Reversible data hiding using histogram shifting method (20)

PDF
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
PDF
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
PDF
Ijariie1132
PDF
Conditional entrench spatial domain steganography
PDF
Optimized Reversible Data Hiding Technique for Secured Data Transmission
PDF
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
PDF
An improved robust and secured image steganographic scheme
PDF
IJREAMV03I022640.pdf
PDF
MESSAGE TRANSFER USING STEGANOGRAPHY
PDF
Ijetcas14 527
PDF
Using SBR Algorithm To Hide The Data Into The JPEG Image
PDF
Bp34412415
PDF
A Comparative Study And Literature Review Of Image Steganography Techniques
PDF
FPGA implementation of data hiding in images
PDF
Steganography
PDF
B03208016
PDF
Survey Paper on Steganography
PDF
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
PDF
An image steganography using improved hyper-chaotic Henon map and fractal Tro...
PDF
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
Ijariie1132
Conditional entrench spatial domain steganography
Optimized Reversible Data Hiding Technique for Secured Data Transmission
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
An improved robust and secured image steganographic scheme
IJREAMV03I022640.pdf
MESSAGE TRANSFER USING STEGANOGRAPHY
Ijetcas14 527
Using SBR Algorithm To Hide The Data Into The JPEG Image
Bp34412415
A Comparative Study And Literature Review Of Image Steganography Techniques
FPGA implementation of data hiding in images
Steganography
B03208016
Survey Paper on Steganography
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
Ad

Recently uploaded (20)

PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PPTX
ai tools demonstartion for schools and inter college
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PPTX
Essential Infomation Tech presentation.pptx
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PPTX
history of c programming in notes for students .pptx
PDF
Softaken Excel to vCard Converter Software.pdf
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PDF
System and Network Administration Chapter 2
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PPTX
Introduction to Artificial Intelligence
PDF
AI in Product Development-omnex systems
PDF
How Creative Agencies Leverage Project Management Software.pdf
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
Design an Analysis of Algorithms II-SECS-1021-03
Internet Downloader Manager (IDM) Crack 6.42 Build 41
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
wealthsignaloriginal-com-DS-text-... (1).pdf
ai tools demonstartion for schools and inter college
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
Odoo Companies in India – Driving Business Transformation.pdf
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
Essential Infomation Tech presentation.pptx
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
history of c programming in notes for students .pptx
Softaken Excel to vCard Converter Software.pdf
How to Choose the Right IT Partner for Your Business in Malaysia
System and Network Administration Chapter 2
Wondershare Filmora 15 Crack With Activation Key [2025
Introduction to Artificial Intelligence
AI in Product Development-omnex systems
How Creative Agencies Leverage Project Management Software.pdf
Odoo POS Development Services by CandidRoot Solutions
Design an Analysis of Algorithms II-SECS-1021-03

Reversible data hiding using histogram shifting method

  • 1. Optimized Reversible Data Hiding Technique for Secured Data Transmission Guide:- Submitted by: Himanshu bal Department of Information Technology 2015-2016 TE(IT)seminar 14/3/2016 pgno.1 slideno. 1
  • 2. PROBLEM DEFINITION Discussing a solution for reversible data hiding by optimizing the techniques presently available for secured data transmission. TE(IT)seminar 14/3/2016 pgno.1 slideno. 2 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  • 3. OBJECTIVE: 1. Generate an optimized reversible data hiding technique to overcome the issues in current RHD trends like: 1. Low embedding capacity 2. High distortion rate etc. 3. Low utilization of 2D histogram TE(IT)seminar 14/3/2016 pgno. 1 slideno. 3 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  • 4. INTRODUCTION 1. Steganography is the art or practice of concealing a message, image, or file within another message, image, or file. 2. The word steganography combines the Ancient Greek words steganos, meaning "covered, concealed, or protected”. 3. One of its application is Reversible data hiding (RHD). 4. Reversible data hiding (RDH) is used to embed secret message into a cover image by slightly modifying its pixel values. TE(IT)seminar 14/3/2016 pgno. 1 slideno.4 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  • 5. WHY STEGANOGRAPHY OVER CRYPTOGRAPHY???? TE(IT)seminar 14/3/2016 pgno.2 slideno.5 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  • 6. LITERATURE SURVEY DIFFERENT RDH METHODS: 1. Tian's method of LSB (2003). J. Tian, Reversible data embedding using a difference expansion, IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890– 896,Aug.2003 2. Ni et al’s method of histogram shifting (2006). Reversible image watermarking on prediction errors by efficient histogram modification, Signal Process., vol. 92,no. 12, pp. 3000–3009, Dec. 2006. 3. Thodi and Rodriguez hybrid method (2012). , “A Novel Reversible Data Hiding Scheme Based on Two-Dimensional Difference-Histogram Modification”, IEEE Transactions on Information Forensics and Security, July 2012. TE(IT)seminar 14/3/2016 pgno.2 slideno.6 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  • 7. RELATED WORKS TE(IT)seminar 14/3/2016 pgno.2 slideno. 7 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  • 8. NE ET AL’S METHOD OF HISTOGRAM SHIFTING 1. The method modifies the pixel-pairs with differences 1 or -1 to carry data. 2. For data embedding, the difference image is first computed for a gray-scale cover image using formula : D(i,j) = I(i, 2j + 1) – I(i, 2j) 3. Then marked image is obtained as TE(IT)seminar 14/3/2016 pgno.3 slideno.8 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  • 9. NE ET AL’S METHOD OF HISTOGRAM SHIFTING contd. 1.Then the information bits can be extracted as 2.And finally the original picture can be recovered 3.Here the difference Dm(i,j) = Im(i,2j+1) – Im(i, 2j) is the difference value computed from the marked image. TE(IT)seminar 14/3/2016 pgno. 3 slideno. 9 Optimized Reversible Data Hiding Technique for Secured Data Transmission b= 0, if Dm(i,j)=-1 1, if Dm(i,j)=+1
  • 10. NOW LETS’S COME TO OUR NEW ENHANCED METHOD TE(IT)seminar 14/3/2016 pgno.4 slideno.10 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  • 11. ARCHITECTURE FOR EMBEDDING AND EXTRACTION ARCHITECTURE FOR EMBEDDING ARCHITECTURE FOR EXTRACTION TE(IT)seminar 14/3/2016 pgno. 4 slideno.11 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  • 12. WORKING OF HISTOGRAM SHIFTING BASED RDH METHOD THE HISTOGRAM SHIFTING BASED RHD METHOD REQUIRE FOUR STEPS TO COMPLETE THE PROCESS: 1. Histogram shifting 2. Encoding process 3. Embedding process 4. Extraction process TE(IT)seminar 14/3/2016 pgno. 5 slideno. 12 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  • 13. HISTOGRAM SHIFTING CONSISTS OF FOLLOWING STEPS 1. Computing difference image for gray scale 2. Using histogram bins for expansion embedding 3. Modification of pixels TE(IT)seminar 14/3/2016 pgno.5 slideno. 13 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  • 14. ENCODING PROCESS 1. Data compression. 2. Using run length encoding. 3. Counting the runs. TE(IT)seminar 14/3/2016 pgno.5 slideno.14 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  • 15. EMBEDDING PROCESS 1. Dividing the host image into non overlapping blocks. 2. Using LSB replacement to embed the location mapping. 3. embed the LSB sequence Into using shifting and embedding functions Illustration of the data embedding TE(IT)seminar 14/3/2016 pgno.6 slideno. 15 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  • 16. WORKING PRINCIPLE FOR EMBEDDING ANY TYPE OF MESSAGE INFO HIDDEN INFO HIDDEN INFO STEGO KEY COVER MEDIUM STEGO OUTPUT TE(IT)seminar 14/3/2016 pgno.6 slideno. 16 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  • 17. EXTRACTION PROCESS 1. Dividing the marked image blocks. 2. determining the location map. 3. Extraction the embedded data. TE(IT)seminar 14/3/2016 pgno.7 slideno.17 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  • 18. RESULTS OF HISTOGRAM METHOD ORIGINAL IMAGE IMAGE AFTER EMBEDDING HISTOGRAM BASED ON ORIGINAL IMAGE SHIFTED AND EMBEDDED HISTOGRAM TE(IT)seminar 14/3/2016 pgno.7 slideno. 18 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  • 19. PSNR VS EMBEDDING RATE TE(IT)seminar 14/3/2016 pgno. 8 slideno.19 PERFORMANCE ANALYSIS Optimized Reversible Data Hiding Technique for Secured Data Transmission
  • 20. MOTIVATION TE(IT)seminar 14/3/2016 pgno.8 slideno. 20 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  • 21. ADVANTAGES 1. The embedding capacity has been enhanced. 2. The distortion ration is reduced. 3. Better utilization of 2D histogram. 4. Better recovery of image. TE(IT)seminar 14/3/2016 pgno. 9 slideno. 21 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  • 22. CONCLUSION This algorithm can achieve a better performance compared with the state-of-the-art works. So the proposed framework has a potential to provide excellent RDH algorithms. TE(IT)seminar 14/3/2016 pgno.11 slideno.22 Optimized Reversible Data Hiding Technique for Secured Data Transmission
  • 23. TE(IT)seminar 14/3/2016 pgno. slideno. 23 Optimized Reversible Data Hiding Technique for Secured Data Transmission