blind recovery of data

26
A Project On BLIND RECOVERY OF COVERED DATA FROM DIGITAL CARRIER Presented By- NIKAM AJINKYA HARBA VIJAY AVHAD SOMINATH GUIDED BY- Prof. M.N KALE

Upload: ajinkya-nikam

Post on 13-Apr-2017

171 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: BLIND RECOVERY OF DATA

A Project On

“BLIND RECOVERY OF COVERED DATA FROM DIGITAL CARRIER ”

Presented By-NIKAM AJINKYAHARBA VIJAYAVHAD SOMINATH

GUIDED BY-

Prof. M.N KALE

Page 2: BLIND RECOVERY OF DATA

Introduction Existing System Proposed System Encryption Techniques Decryption Technique Results Advantages Conclusion Reference

Classification

Outline

Page 3: BLIND RECOVERY OF DATA

Digital Data embedding.

Applications may vary.

Improved Embedding performance.

Improved recovery performance.

Extension to limited attacking.

After extracting the data hidden original image is retrieved.

Classification

Introduction What Is Data Hiding ?

Page 4: BLIND RECOVERY OF DATA

Reversible Data Hiding technique image is compressed and encrypted

Secret encryption key used can access the image and decrypt

After extracting the data hidden original image is retrieved.

Classification

EXISTING SYSTEM

Page 5: BLIND RECOVERY OF DATA

Classification

Compressed and Encrypted use in Existing System

Page 6: BLIND RECOVERY OF DATA

Reduce the risk of using Cryptography algorithm alone.

Cryptography algorithm + Information hiding technique.

Symmetric key Encryption.

Attention on the blind recovery of secret data hidden.

Encryption algorithm remain hidden from host.

Classification

PROPOSED SYSTEM

Page 7: BLIND RECOVERY OF DATA

Vessel data.

Steganography is that embedding capacity is very large.

For a 'normal' image, roughly 50% of the data might be replaceable with secret data.

Password use as a symmetric key.

Classification

Steganography

Page 8: BLIND RECOVERY OF DATA

Image Encryption.

Size of image The host image is an 8-bit or higher grey level image

For color host images, the binary cipher text can be inserted into one or all of the RGB components.

Image encryption:

Page 9: BLIND RECOVERY OF DATA

Image Decryption.

For color images, the data is decomposed into each RGB component

Each 1-bit layer is extracted and correlated with the appropriate cipher.

into an 8-bit image based on floating point numbers.

Image decryption

Page 10: BLIND RECOVERY OF DATA

SYSTEM ARCHITECTURE

Page 11: BLIND RECOVERY OF DATA

Random Distribution of Message

Generation of Seed

Random position Selection

Bit Smarter

1-Hide And Seek

Page 12: BLIND RECOVERY OF DATA

Input : Message,shared secret,cover image,seed.Output : Stego image.initialize with shared seedwhile data left to embed do

get pixel from cover imageif pixel !=0 and pixel !=1 thenget next LSB from messagereplace LSB with Message LSBend ifinsert pixel into stego image

end while

Hide And Seek Algorithm

Page 13: BLIND RECOVERY OF DATA

Color Base

• There is a large amount of redundant bits in an image. The redundant bits of an object are those bits that can be altered.

• The alteration cannot be visibly detected by human eyes, due to use of blue color.

• Every pixel in a color image composed of three colors Red, Green and Blue so every pixel contains 24 bits

Page 14: BLIND RECOVERY OF DATA

Classification

LSB• Replaces the least significant bit of cover image

with the message bits.. • Image alteration is not perceptible for any human

eyes as its value will affect the pixel value only by “1”. • So, this property is used to hide the data in the

image. Here we have considered last two bits as LSB bits as they will affect the pixel value only by “3”.

Page 15: BLIND RECOVERY OF DATA

Divide the cover image into set of groups (2x 8)pixel.

Separate the R, G and B band of each pixel. Extract hash value. Random number generation Use hash values to determine the selected

pixel for each block. Data bits are replaced on selected pixels

Classification

2-LFSR(Linear feedback shift register)

Page 16: BLIND RECOVERY OF DATA

M-IGLS

1. First Convert Host Image To Observation Vector Form y(m), m=1,2…...m 2. Create Partition N1.N2/M

3. Number Of Carrier Used By Embedder.

4. Finding Noisy region.

5. Create M-IGLS Header

6. Stego Analysis.

Page 17: BLIND RECOVERY OF DATA

• H - Host image• M - finite image alphabet.• N1,N2 – image size in pixel.

Image

Page 18: BLIND RECOVERY OF DATA

Algorithm

Page 19: BLIND RECOVERY OF DATA

Results

Encoding Process

Page 20: BLIND RECOVERY OF DATA

Classification

Images

Page 21: BLIND RECOVERY OF DATA

Classification

Decoding Process

Page 22: BLIND RECOVERY OF DATA

Classification

Decoded Message

Page 23: BLIND RECOVERY OF DATA

Classification

Advantages1) Confidential communication and secret data storing

2) Protection of data alteration

3)Access control system for digital content distribution

4) Media Database systems

Page 24: BLIND RECOVERY OF DATA

Classification

Applications

1)Confidential communication and secret data storing

2)Protection of data alteration

3)Access control system for digital content distribution

4)Use in Military application to Protect data.

5)Use To Protect data In School , Colleges , Office

Page 25: BLIND RECOVERY OF DATA

Classification

Conclusion

For Experimental studies we have taken four different algorithms for encryption Hide And Seek, LFSR, Single Bit LSB, Color Based. and we decrypted the Message from our Single Static Algorithm MIGLS. with Attention on the blind recovery of secret data hidden in medium.

Hence in this project in decryption phase algo decrypt the Message from stego image by using Single Static Algorithm MIGLS successfully.

Page 26: BLIND RECOVERY OF DATA

Classification

Reference

1] Extracting Spread-Spectrum Hidden Data from Digital Media Ming Li, Member,IEEE, Michel Kulhandjian, Dimitris A. Pados, Member, IEEE, Stella N. Batalama, Senior Member, IEEE, and Michael J. Medley, Senior Member IEEE,IEEE Transactions on Secure Computing vol:8 NO:7 2013.

2] Literature Survey On Modern Image Steganographic Techniques Priya ThomasDepartment of Computer Science and Engineering Nehru College of Engineering and Research Center, Kerala, India.International Journal of Engineering Research Technol-ogy Issue 5, May - 2013 ISSN: 2278-0181.

3] M. Li, D. A. Pados, S. N. Batalama, and M. J. Medley, ”Passive spreadspectrumsteganalysis,” in Proc. IEEE Intern. Conf. Image Proc. (ICIP), Brussels, Belgium,Sept. 2011, pp. 1997-2000.

4] A. Valizadeh and Z. J. Wang, ”Correlation-and-bit-aware spread spectrum embedding for data hiding,” IEEE Trans. Inform. Forensics and Security, vol. 6 , pp. 267-282,June 2011.