Secret sharing based reversible data hiding in encrypted images with multiple data-hiders

      

ABSTARCT :

The existing models of reversible data hiding in encrypted images (RDH-EI) are based on single data-hider, where the original image cannot be reconstructed when the data-hider is damaged. To address this issue, this paper proposes a novel model with multiple data-hiders for RDH-EI based on secret sharing. It divides the original image into multiple different encrypted images with the same size of the original image and distributes them to multiple different data-hiders for data hiding. Each data-hider can independently embed data into the encrypted image to obtain the corresponding marked encrypted image. The original image can be loss lessly recovered by collecting sufficient marked encrypted images from undamaged data-hiders when individual data-hiders are subjected topotential damage. This further protects the security of the original image. We provide four cases of the proposed model, namely, twojoint cases and two separable cases. From the proposed model, we derive a separable RDH-EI method with high-capacity. Experimental results are presented to illustrate the effectiveness of the proposed method.

EXISTING SYSTEM :

? Data hiding by digital watermarking is usually employed for multimedia copyright protection, authenticity verification, or similar purposes. ? Watermarking is here adopted as a technique to provide a blind measure of the quality of service in multimedia communications. ? The general watermark embedding procedure consists of embedding a watermark sequence which is usually binary into host data by means of a key. ? In the detection phase the key is used to verify the presence of the embedded sequence.

DISADVANTAGE :

• The proposed model contains multipledata-hiders, the original image can be restored by collectingsufficient marked encrypted images from undamaged data-hiders even if some of the data-hiders are subjected to poten-tial damage. • We present four cases of the proposed model,that is, two joint cases and two separable cases. We im-plement a separable case called content-owner-independentand data-hider-independent. • The proposed separable RDH-EI method can achieve higher embedding capacity com-pared with the state-of-the-art methods.

PROPOSED SYSTEM :

• By using a multi-MSB embedding strategy, the secret bits can be embedded in the encrypted images without any pixel oversaturation in the plaintext domain. • More importantly, by using multi-MSB embedding strategy, secrets bits can be directly extracted from encrypted domain from the multi-MSB of pixels without any error. The reconstructed image with very high visual quality can be obtained only in the case that the encryption key is obtained. • Compared with the other state-of-the-art methods, the proposed method can achieve a significantly higher maximum embedding rate

ADVANTAGE :

• The embedding rate of the proposed method is compared with several state-of-the-art methods . • The embedding rate of the proposed method is significantly higher than these state-of-the-art methods. • Meanwhile, the embedding rate of the proposed method is a constant value, which means that it is not affected by the image distribution. • In these state-of-the-art methods, the embedding rates depend on image distribution. • Images with smooth textures can achieve higher embedding rates, while images with complex textures have lower embedding rates, which can be avoided in the proposed method. • This is because they vacate embedding room before encryption bythe correlation of natural images, such as MSB prediction, adaptive, and difference expansion. • Instead, the proposed method vacates embedding room after encryption and embeds data into encrypted images with bit-plane replacement.

Download DOC Download PPT

We have more than 145000 Documents , PPT and Research Papers

Have a question ?

Chat on WhatsApp