SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1163
Information hiding based on optimization technique for
Encrypted Images
Durfi Ashraf1, Sayiema Amin2
1,2 P.G. student, Department of Electronics & Communication Engineering,
Adesh Institute of Engineering & Technology, Punjab, India
Abstract- With the development of latest technologies i
n communication and computer networks, the importanc
e and value of exchanged data over the internet or other
media types are increasing. One of the fundamental issu
es with sending information over the web is the ‘security
threat’ it postures which means that the confidential or p
ersonal information can be hacked or stolen in various p
erspectives. Text fusion in images is an important techno
logy for image processing. We have lots of information re
lated to the reports and need lots of space to store and th
e proper position and name which relates that image wit
h that data. Reversible data hiding is a method to embed
extra message into some unsatisfactory spread media, f
or example, medical or military images with a reversible
way so that the original content can be accurately restor
ed. Generally data hiding is utilized for communication
which is secret. In this paper, a technique is proposed for
reversible data hiding in encrypted images. An algorith
m is proposed which will first find out the area of interes
t and after that noisy pixel. BAT algorithm is used to find
the coordinates of the noisy pixels and will embed text d
ata on it and after that rest of the data will be fed into th
e border area of the images. The research work also prov
ides the knowledge about the ability of the algorithm to s
ecure and protect data against attacks and its speed and
efficiency in doing so.
Keywords — Graphical user Interface, Performan
ce analysis, Image encryption, reversible data hidin
g, separable reversible data hiding, AOI, NAOI, BAT,
image recovery, Computation time.
1. INTRODUCTION
Presently in these days, applications of computer have diffu
sed into each sphere of life for control of numerous sophisti
cated applications. Lot of these applications is of safety criti
cal, substantial, and complex. Subsequently, there must be r
eliable software. In other words, software of good quality a
nd also high reliability is crucial. Aside from presence of nu
merous techniques for enhanced reliability, software testin
g is very common and important followed methodology. Th
us, testing remains the most vital part of quality assurance i
n the practice of the development of software. Even though
there are so many techniques are available for quality assur
ance such as design reviews, formal specifications, inspectio
n and checking of model exists till today. Since the software
now has now an imperative part in our lives both socially a
nd economically. There is pressure for professionals of soft
ware to concentrate on quality issues. The software with po
or quality that can bring loss of property or life is no more a
dequate to society. [1]
Software testing is very expensive and labor-intensive; it re
presents pretty nearly 50% of the cost of development of so
ftware system. If the process of testing could be automated,
the cost of software developing ought to be decreased fund
amentally. Of the problems included in software testing, on
e is of specific importance here; the issue of creating test da
ta. Generation of test data in testing of software is the proce
dure of distinguishing program input data which fulfill crite
rion of selected testing. A test data generator is a device whi
ch helps a programmer in generation of test data for a prog
ram. There are three types of generators of test data: path
wise test generators, data specification generators, and ran
dom test generators. [2]
Software testing is an imperative activity in lifecycl
e of software development. Organizations of software spen
d significant part of their budget in activities which are relat
ed to testing. Testing incorporates executing a program on
a set of test cases and contrasting the actual results with the
results that are expected. Testing ought to concentrate on p
revention of fault. Test cases are normally derived for some
artifacts of software like specifications, design or may be im
plementation of the system. For testing a system, the imple
mentation ought to be understood first which should be pos
sible by making a suitable model of the system. A typical so
urce for tests is the program code. Each time the execution
of program is done, the program is tested by the user. So we
need to execute the program with the particular intent of r
emoving and fixing errors. With a specific end goal to locate
the highest conceivable number of errors, there must be co
nduction of tests systematically and test cases ought to be d
esigned by utilizing restrained techniques. UML (Unified Mo
deling Language) is a broadly accepted arrangement of nota
tions for modeling the system which is object oriented. It ha
s numerous diagrams for portraying the dynamic behavior
of objects in the system. [3]
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1164
The requirement for better quality means more pre
ssure for testing of software and for test engineers dealing
with it. Software Testing is the procedure of executing a pro
gram with the goal of discovering errors. Each code of softw
are has been assessed and confirmed through activities of S
oftware Quality and Assurance yet these activities definitely
not sufficient. Every time the delivery of the software to the
client is done, it has been tested thoroughly by the client be
fore gets it to the production. In this way QA team needs to t
est the software before it gets to the client. Flow of informat
ion of testing is said to be as a technique of testing which in
dicates the technique to choose input test cases and analyze
results of test. Majority of the engineers of software would
concur that testing is a crucial component of the process of
quality software, and is a standout among the most costly a
nd challenging activities carried out during development an
d maintenance of software. The process of software testing
has been depicted as a sequence of phases, steps and proce
dures that bring about Quality Software Development Deliv
ery to the production. Hence Testing can be depicted as a pr
ocedure utilized for establishing that the software has achie
ved a predetermined degree of quality regarding selected at
tributes. [1]
Testing is an imperative phase development and m
aintenance of the software. It is a challenging task for invest
igation of unified modeling language (UML) models followi
ng the information about a system is dispersed across vario
us views of model. The models of UML are proposed to help
to minimize the complexity of the problem, with the increm
ent in complexities and sizes of product. Still, the models of
UML themselves turn out to be complex and large including
a numerous interactions crosswise over several objects. It i
s unwieldy for producing test models such as control flow g
raph from source code. This is particularly valid for large pr
ograms. The UML sequence diagrams are utilized for modeli
ng distinct behavior of an object through sequence graph. S
uch transitions and states are discriminating to choose the i
nvocations of particular operation that would be made taki
ng into account the conditions emerging during the executi
on of a scenario. For testing at unit level, we can get tests fr
om state machine diagrams of UML, which embody the beh
avioral depiction of every component. [4]
The information about system is disseminated over
a various views of the model of the system, captured throu
gh substantial number of diagrams. The models of UML are
expected to help in reducing the complexity of the problem,
with increase in complexities and sizes of the product. Still,
the models of UML themselves become complex and large i
nclude a large number of interactions crosswise over many
objects. Many products of software are based on state. In su
ch type of systems, the behavior of system is depicted by its
state. In this manner, unless a system is made to accept all it
s conceivable states and tested, it would not be possible to r
eveal bugs based on state. Adequate testing of the system of
such type of software needs satisfactory coverage of transit
ions and states of the system. It is a noteworthy issue to fulf
ill the requirement specification for the production of high-
quality software systematically. A legitimately generated te
st suite may not just find the errors in the system of softwar
e and additionally help in minimizing the high cost connecte
d with software testing. [4]
2. AUTOMATED TESTING
Automated software testing is a procedure in which tools of
software execute pre-scripted tests on an application of sof
tware before it is discharged into production. The aim of au
tomated testing is to simplify as much of the effort of testin
g as conceivable with minimum set of scripts. If unit testing
devours a huge percentage of resources of the team of quali
ty assurance (QA), such as then this process may be a decen
t candidate for automation. The tools of automated testing h
ave the ability of executing tests, reporting results and cont
rasting results with prior runs of test. Tests completed out
with these tools can be repeatedly run at any time of day.
The strategy of process being utilized to execute au
tomation is known as test automation framework. Various f
rameworks have been implemented over many years by or
ganizations of testing and commercial vendors. Automation
testing with commercial off-the-shelf (COTS) or software wi
th open source can be complicated, as they mostly need cus
tomization. In most organizations, automation is implement
ed only when it has been resolved when it has been depicte
d that the program of manual testing is not fulfilling expecta
tions and it is unrealistic to acquire most human testers. [5]
The steps of automation process are [6]:
1. Test Tool selection
2. Define scope of automation
3. Planning. Design and Development
4. Test Execution
5. Maintenance
3. UML DIAGRAM
Unified Modeling Language (UML) is a standardized used ge
nerally for modeling of language in the field of software eng
ineering. The Unified Modeling Language incorporates a set
of techniques of graphic notation to produce visual models
of object-oriented software-intensive systems. The Unified
Modeling Language was developed by Grady Booch, Ivar Jac
obson and Jim Rumbaing at Rational Software in 1990s. It w
as adopted by the Object Management Group (OMG) in 199
7, and has been overseen by this association ever since. In 2
000, the Unified Modeling Language was acknowledged by t
he International Standard Organization for Standardization
(ISO) as standard for Industry for modeling intensive syste
ms of software. The Unified Modeling Language is becoming
fastly a required skill for anyone virtually incorporated in p
rojects of software. UI designers, project managers and test
ers, requirement analysts, architects, software developers a
nd database professionals are progressively being asked to
make and use specifications which are written in UML. It cle
arly gives explanation for the concepts such as enterprise ar
chitecture, business modeling and objects oriented analysis.
UML is now a de-facto standard for modeling of software. T
here are mainly two reasons the requirement of modeling l
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1165
anguage. Firstly, the model offers a blueprint for developers
so they exactly know what they need to develop and for pr
oject managers so that they calculate precisely the cost of gi
ven project. Secondly and more significantly, UML is the bri
dge between non-technical users and technical developers.
[7]
The UML became popular because of the following
reasons [7]:
1. It is very flexible. It permits many distinctive types of mo
deling such as Defining database architecture, Sequencing o
f events and Business Process modeling event workflow.
2. Supports Methodologies which are Object-Oriented: UML
supports object-oriented methodologies. UML can be utiliz
ed to design both object oriented and relational models.
3. Platform-Independent: It permits architecture of softwar
e to model any type of application on any operating system
in any language of programming or any network.
4. The integration of different stages of SDLC through tools
of UML has brought the analyst, modeler, designer, and the
developers of software application closer to one another.
4. RELATED WORK
Lots of research work has been done in the area of separabl
e reversible data hiding. Many efficient methods have been
proposed for reversible data hiding for encrypted images. S
ome important work in the area of reversible data hiding is
as follows:
In reference [5], a novel approach for separable reversible d
ata hiding in encrypted images is proposed. In the first stag
e, owner of the matter encrypts the original image which is
uncompressed by utilizing the encryption key. At that point,
data hider may compress the least significant bits of the en
crypted image utilizing and key of data hiding to make an in
adequate space to oblige some extra information. With an e
ncoded image containing additional information, if a receiv
er has the key of data hiding, he can obtain the extra inform
ation however he doesn’t know the content of an image. If t
he receiver has both the key of encryption and key of data h
iding, he can obtain the extra information and also recupera
te the original content with no lapse by misusing the spatial
relationship in regular image when the amount of extra inf
ormation is not too very expansive.
In Paper [6], authors propose an authenticated and secure d
iscrete reversible data hiding in cipher images manages aut
hentication and security. In the first stage, owner of the con
tent encodes the image which is original and uncompressed
utilizing an encryption key. At that point, data hider may co
mpress the least significant bits of the encrypted image utili
zing and key of data hiding to make an inadequate space to
oblige some extra information. With an encoded image cont
aining additional information, if a receiver has the key of da
ta hiding, he can obtain the extra information however he d
oesn’t know the content of an image. If the receiver has bot
h the key of encryption and key of data hiding, he can obtai
n the extra information and also recuperate the original con
tent with no lapse by misusing the spatial relationship in re
gular image when the amount of extra information is not to
o very vast. It is additionally a downside that if the receiver
has any one key as known, and afterward he can take any o
ne data from the encoded information. SHA-1 algorithm is b
eing utilized keeping in mind to achieve authentication.
Reference [7] explains about the technique for reversible da
ta hiding in encrypted images using DCT. Reversible data hi
ding is a strategy to insert extra message into some spread
media with a reversible way so that the original content can
be consummately restored after extraction of the message
which is hidden. The extraction of data can be accomplished
by analyzing the block smoothness. This paper adopts a pla
n for measuring the blocks smoothness, and uses the schem
e of closest match to further diminishing the rate of error of
removed bits. The results of experiment reveal that the pro
posed technique offers better execution over side match sys
tem.
In reference [8], more consideration is paid to reversible da
ta hiding in images that are encrypted, since it keeps up the
amazing property that the original cover can be losslessly r
ecuperated after inserted data is obtained while securing th
e content of an image confidentially. All past techniques em
bed information by reversibly memory space from the encr
ypted images, which may be liable to few errors on extracti
on of data or restoration of image. A novel strategy is propo
sed in this paper by saving space of memory before encrypt
ion with a conventional RDH (Reversible Data Hiding) techn
ique, and accordingly it is simple for the information hider t
o reversibly embed information in the image.
In paper [9], method of data hiding by adjusting histogram
of medical images and dissimilarities in view of division of b
lock is proposed. Reversible data hiding by utilizing method
of modification of histogram considers the distinctions of t
he pixels which enhance the capacity of data hiding. To imp
rove the capacity of data hiding, the method of block divisio
n is preferred.
5. MOTIVATION
Reversible data hiding is a procedure through which origin
al image can be recuperated back losslessly after embedded
message is extracted. This technique is used in law forensic
s, military and medical images where no alteration of the or
iginal image is permitted. The main aim of this study is to hi
de the data in encrypted images. In this work, AOI (area of i
nterest) is finding out and fuse the related document in the
NAOI (non area of interest) of the image. The data is fused a
t the borders of the images and then build the particular an
d pre-defined border space. The algorithm is proposed whic
h will first find out the area of interest and then noisy pixels
of an image. BAT algorithm is used to find the coordinates
of the noisy pixels.
The research is based on following objectives:
1. To Study various reversible data hiding techniques
with evaluation parameters.
2. To study and implement BAT algorithm for
generating hash key.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1166
3. Implementing hash key for data fusion into the host
image.
4. Decrypting host image and data from embedded
image.
5. Evaluating various parameters for calculating the
percentage of improvement.
6. PROPOSED SCHEME
Generally there are two types of techniques of data hiding-
separable reversible data hiding and non-separable reversi
ble data hiding. The aim of this research is to hide the data r
eversibly using BAT optimization for encrypted images. In i
t, area of interest is find out for particular image and then fu
se the related document in the NAOI of the image. The techn
ique used is to fuse data at the borders of the image and bui
ld the particular and pre-defined border space. An algorith
m is proposed which will first find out area of interest and t
hen use BAT algorithm to find out the coordinates of the noi
sy pixels and embed text data on these pixels and rest data
will be fed into the border area of images.
Fig. 3 Flowchart of proposed work
7. RESULTS AND DISCUSSIONS
This section presents the simulated results of encryption,
data hiding, decryption and computation time.
 Encryption and Computation Time
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1167
Data Hiding and Computation Time
 Decryption and Computation Time
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1168
8. CONCLUSION
The main aim of this research is to implement BAT algorith
m for encrypted images to hide the data. Reversible data hi
ding is a procedure in which original image can be regained
back without any loss and also after getting the embedded
message. It hides the secret information in the digital image
in such a way that just the approved individual could interp
ret the secret data and restore the original image. We have
used BAT algorithm for hiding data. Hence if the image is tr
ansmitted, it is secured. Our proposed algorithm has shown
better results than the algorithms already present for encr
yption of images.
REFERENCES
[1] V.Santhosh, J.Harish, R.V.K Sumanth, N.Vijay “Separable
Reversible Data Hiding In Encrypted Image”, Department of
CSE, GRIET..
[2] Rini.J, “Study on Separable Reversible Data Hiding in En
crypted Images”, Intenational Journal of Advancements in Re
search & Technology (IJOART), Vol.2, No.12, December 2013
.
[3] S.Poongodi, Dr.B.Kalavathi, M.Shanmugapriya “Secure T
ransformation of Data in Encrypted Image using Reversible
Data hiding Technique”, International Journal of Engineerin
g Science and Innovative Technology (IJESIT), Vol.2, No.4, Jul
y 2013.
[4] Vinit K.Agham, Tareek M Pattewar “Separable Reversibl
e Data Hiding Techniqe Based on RGB-LSB Method”, Interna
tional Journal of Research in Advent Technology, Vol.1, No.3,
October 2013.
[5] Xinpeng Zhang, “Separable Reversible Data Hiding in En
cypted Image”, IEEE , Vol.7, No.2, 2012.
[6] C.Anuradha, S.Lavanya, “Secure and Authenticated Reve
rsible Data Hiding in Encrypted Image”, International Journ
al of Advanced Research in Computer Science and Software E
ngineering,, Vol 3, Issue 4,April 2013.
[7] Vimal, Mahendra Kumar Patil, “Reversible Data Hiding I
n Encrypted Images using DCT”, International Journal of En
gineering And Science, Vol.3 Issue 3, June 2013, pp. 45-49.
[8] Lalit Dhande, Priya Khune, Vinod Deore, Dnyaneshwar G
awade, “Hide Inside-Separable Reversible Data Hiding in En
crypted Image”, International Journal of Innovative Technolo
gy and Exploring Engineering (IJITEE), Vol.3, Issue 9, Februa
ry 2014.
[9] A.Lavanya, V.Natarajan, “Data Hiding Using Histogram M
odification of Difference in Medical Images Based on Block
Division”, International Conference on Recent Trends in Inf
ormation Technology (ICRTIT), IEEE, 2012. [10] T. Marga
ret, “Reversible Data Hiding In Encrypted Images by XOR Ci
phering Technique”, International Journal of Advanced Rese
arch in Electrical, Electronics and Instrumentation Engineeri
ng, Vol.3, Issue 2, February 2014.
[11] Shruti M. Rakhunde, “Reversible Data Hiding using Vis
ual Cryptography: A Review”, International Journal of Innov
ative Research in Computer and Communication Engineering
(IJIRCCE), Vol.2, Issue 1, January 2014.
[12] Masoud Nosrati, Ronak Karimi, Mehdi Hariri, “Reversib
le Data Hiding: Principles, Techniques and Recent Studies”,
World Applied Programming Journal, Vol. 2, Issue 5, May 20
12.
[13] Dr. V Khanaa, Dr, Krishna Mohanta, “Secure and Authe
nticated Reversible Data Hiding In Encrypted Images” Inter
national Journal of Engineering and Computer Science, Vol.2,
Issue 3, March 2013.
[14] Harish G, Smitha ShekarB, Prjawal R, Sunil S Shetty, “R
eversible Data Hiding In Encrypted Images by Reserving Ro
om before Encryption”, International Journal of Engineering
Research,Vol.3, Issue 7, pp 435-437, July 2014.
[15] Prof. Praveen Bhanodia, Prof. Mrudula, Prashant Kale, “
Separable Reversible Data Hiding Using Matrix Addition Co
mpression Approach for Color Images”, International Journ
al of Emerging Technology and Advanced Engineering, Vol.3,
Issue 2, Februray 2013.

More Related Content

What's hot (11)

PDF
Chapter 7 software reliability
despicable me
 
PDF
@#$@#$@#$"""@#$@#$"""
nikhilawareness
 
PDF
Experiences in shift left test approach
Journal Papers
 
PDF
Volume 2-issue-6-1983-1986
Editor IJARCET
 
PDF
An empirical evaluation of
Aadhityaa Infomedia
 
PPT
Ch15 software reliability
Abraham Paul
 
PDF
O0181397100
IOSR Journals
 
PDF
IRJET-A Review of Testing Technology in Web Application System
IRJET Journal
 
PPT
Software reliability
Anand Kumar
 
PDF
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
PDF
Developing software analyzers tool using software reliability growth model
IAEME Publication
 
Chapter 7 software reliability
despicable me
 
@#$@#$@#$"""@#$@#$"""
nikhilawareness
 
Experiences in shift left test approach
Journal Papers
 
Volume 2-issue-6-1983-1986
Editor IJARCET
 
An empirical evaluation of
Aadhityaa Infomedia
 
Ch15 software reliability
Abraham Paul
 
O0181397100
IOSR Journals
 
IRJET-A Review of Testing Technology in Web Application System
IRJET Journal
 
Software reliability
Anand Kumar
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
Developing software analyzers tool using software reliability growth model
IAEME Publication
 

Similar to Information hiding based on optimization technique for Encrypted Images (20)

PDF
Unit Testing Essay
Dani Cox
 
DOCX
International Journal of Soft Computing and Engineering (IJS
hildredzr1di
 
PDF
A Review on Software Fault Detection and Prevention Mechanism in Software Dev...
iosrjce
 
PDF
F017652530
IOSR Journals
 
PDF
Developing software analyzers tool using software reliability growth model
IAEME Publication
 
PDF
FROM THE ART OF SOFTWARE TESTING TO TEST-AS-A-SERVICE IN CLOUD COMPUTING
ijseajournal
 
PDF
From the Art of Software Testing to Test-as-a-Service in Cloud Computing
ijseajournal
 
PDF
Software reliability engineering
Mark Turner CRP
 
PDF
IRJET- Development Operations for Continuous Delivery
IRJET Journal
 
PDF
Systematic Review Automation in Cyber Security
YogeshIJTSRD
 
PDF
Intro softwareeng
PINKU29
 
PPTX
Software Testing Concepts
Shahram Foroozan
 
PPTX
Software testing ppt
Poonkodi Jayakumar
 
PDF
A Survey of Software Reliability factor
IOSR Journals
 
PPTX
Challenges in Security Testing
Shikha Jarial
 
PDF
How automation can help boost security
TestingXperts
 
PDF
Software testing for project report .pdf
Kamal Acharya
 
PDF
st-notes-13-26-software-testing-is-the-act-of-examining-the-artifacts-and-the...
mwpeexdvjgtqujwhog
 
PDF
A RELIABLE AND AN EFFICIENT WEB TESTING SYSTEM
ijseajournal
 
PDF
A RELIABLE AND AN EFFICIENT WEB TESTING SYSTEM
ijseajournal
 
Unit Testing Essay
Dani Cox
 
International Journal of Soft Computing and Engineering (IJS
hildredzr1di
 
A Review on Software Fault Detection and Prevention Mechanism in Software Dev...
iosrjce
 
F017652530
IOSR Journals
 
Developing software analyzers tool using software reliability growth model
IAEME Publication
 
FROM THE ART OF SOFTWARE TESTING TO TEST-AS-A-SERVICE IN CLOUD COMPUTING
ijseajournal
 
From the Art of Software Testing to Test-as-a-Service in Cloud Computing
ijseajournal
 
Software reliability engineering
Mark Turner CRP
 
IRJET- Development Operations for Continuous Delivery
IRJET Journal
 
Systematic Review Automation in Cyber Security
YogeshIJTSRD
 
Intro softwareeng
PINKU29
 
Software Testing Concepts
Shahram Foroozan
 
Software testing ppt
Poonkodi Jayakumar
 
A Survey of Software Reliability factor
IOSR Journals
 
Challenges in Security Testing
Shikha Jarial
 
How automation can help boost security
TestingXperts
 
Software testing for project report .pdf
Kamal Acharya
 
st-notes-13-26-software-testing-is-the-act-of-examining-the-artifacts-and-the...
mwpeexdvjgtqujwhog
 
A RELIABLE AND AN EFFICIENT WEB TESTING SYSTEM
ijseajournal
 
A RELIABLE AND AN EFFICIENT WEB TESTING SYSTEM
ijseajournal
 
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
IRJET Journal
 
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
PDF
Kiona – A Smart Society Automation Project
IRJET Journal
 
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
PDF
Breast Cancer Detection using Computer Vision
IRJET Journal
 
PDF
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
PDF
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
PDF
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
PDF
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
Kiona – A Smart Society Automation Project
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Ad

Recently uploaded (20)

PPTX
Heart Bleed Bug - A case study (Course: Cryptography and Network Security)
Adri Jovin
 
PPTX
Pharmaceuticals and fine chemicals.pptxx
jaypa242004
 
PPT
Oxygen Co2 Transport in the Lungs(Exchange og gases)
SUNDERLINSHIBUD
 
PDF
IoT - Unit 2 (Internet of Things-Concepts) - PPT.pdf
dipakraut82
 
PPTX
Innowell Capability B0425 - Commercial Buildings.pptx
regobertroza
 
PPTX
Thermal runway and thermal stability.pptx
godow93766
 
PDF
POWER PLANT ENGINEERING (R17A0326).pdf..
haneefachosa123
 
PPTX
site survey architecture student B.arch.
sri02032006
 
PPTX
ISO/IEC JTC 1/WG 9 (MAR) Convenor Report
Kurata Takeshi
 
PDF
6th International Conference on Machine Learning Techniques and Data Science ...
ijistjournal
 
PDF
A presentation on the Urban Heat Island Effect
studyfor7hrs
 
PPT
inherently safer design for engineering.ppt
DhavalShah616893
 
PDF
PORTFOLIO Golam Kibria Khan — architect with a passion for thoughtful design...
MasumKhan59
 
PDF
Additional Information in midterm CPE024 (1).pdf
abolisojoy
 
PDF
Statistical Data Analysis Using SPSS Software
shrikrishna kesharwani
 
PPTX
265587293-NFPA 101 Life safety code-PPT-1.pptx
chandermwason
 
PPTX
Benefits_^0_Challigi😙🏡💐8fenges[1].pptx
akghostmaker
 
PDF
UNIT-4-FEEDBACK AMPLIFIERS AND OSCILLATORS (1).pdf
Sridhar191373
 
PPTX
drones for disaster prevention response.pptx
NawrasShatnawi1
 
PPTX
Introduction to Neural Networks and Perceptron Learning Algorithm.pptx
Kayalvizhi A
 
Heart Bleed Bug - A case study (Course: Cryptography and Network Security)
Adri Jovin
 
Pharmaceuticals and fine chemicals.pptxx
jaypa242004
 
Oxygen Co2 Transport in the Lungs(Exchange og gases)
SUNDERLINSHIBUD
 
IoT - Unit 2 (Internet of Things-Concepts) - PPT.pdf
dipakraut82
 
Innowell Capability B0425 - Commercial Buildings.pptx
regobertroza
 
Thermal runway and thermal stability.pptx
godow93766
 
POWER PLANT ENGINEERING (R17A0326).pdf..
haneefachosa123
 
site survey architecture student B.arch.
sri02032006
 
ISO/IEC JTC 1/WG 9 (MAR) Convenor Report
Kurata Takeshi
 
6th International Conference on Machine Learning Techniques and Data Science ...
ijistjournal
 
A presentation on the Urban Heat Island Effect
studyfor7hrs
 
inherently safer design for engineering.ppt
DhavalShah616893
 
PORTFOLIO Golam Kibria Khan — architect with a passion for thoughtful design...
MasumKhan59
 
Additional Information in midterm CPE024 (1).pdf
abolisojoy
 
Statistical Data Analysis Using SPSS Software
shrikrishna kesharwani
 
265587293-NFPA 101 Life safety code-PPT-1.pptx
chandermwason
 
Benefits_^0_Challigi😙🏡💐8fenges[1].pptx
akghostmaker
 
UNIT-4-FEEDBACK AMPLIFIERS AND OSCILLATORS (1).pdf
Sridhar191373
 
drones for disaster prevention response.pptx
NawrasShatnawi1
 
Introduction to Neural Networks and Perceptron Learning Algorithm.pptx
Kayalvizhi A
 

Information hiding based on optimization technique for Encrypted Images

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1163 Information hiding based on optimization technique for Encrypted Images Durfi Ashraf1, Sayiema Amin2 1,2 P.G. student, Department of Electronics & Communication Engineering, Adesh Institute of Engineering & Technology, Punjab, India Abstract- With the development of latest technologies i n communication and computer networks, the importanc e and value of exchanged data over the internet or other media types are increasing. One of the fundamental issu es with sending information over the web is the ‘security threat’ it postures which means that the confidential or p ersonal information can be hacked or stolen in various p erspectives. Text fusion in images is an important techno logy for image processing. We have lots of information re lated to the reports and need lots of space to store and th e proper position and name which relates that image wit h that data. Reversible data hiding is a method to embed extra message into some unsatisfactory spread media, f or example, medical or military images with a reversible way so that the original content can be accurately restor ed. Generally data hiding is utilized for communication which is secret. In this paper, a technique is proposed for reversible data hiding in encrypted images. An algorith m is proposed which will first find out the area of interes t and after that noisy pixel. BAT algorithm is used to find the coordinates of the noisy pixels and will embed text d ata on it and after that rest of the data will be fed into th e border area of the images. The research work also prov ides the knowledge about the ability of the algorithm to s ecure and protect data against attacks and its speed and efficiency in doing so. Keywords — Graphical user Interface, Performan ce analysis, Image encryption, reversible data hidin g, separable reversible data hiding, AOI, NAOI, BAT, image recovery, Computation time. 1. INTRODUCTION Presently in these days, applications of computer have diffu sed into each sphere of life for control of numerous sophisti cated applications. Lot of these applications is of safety criti cal, substantial, and complex. Subsequently, there must be r eliable software. In other words, software of good quality a nd also high reliability is crucial. Aside from presence of nu merous techniques for enhanced reliability, software testin g is very common and important followed methodology. Th us, testing remains the most vital part of quality assurance i n the practice of the development of software. Even though there are so many techniques are available for quality assur ance such as design reviews, formal specifications, inspectio n and checking of model exists till today. Since the software now has now an imperative part in our lives both socially a nd economically. There is pressure for professionals of soft ware to concentrate on quality issues. The software with po or quality that can bring loss of property or life is no more a dequate to society. [1] Software testing is very expensive and labor-intensive; it re presents pretty nearly 50% of the cost of development of so ftware system. If the process of testing could be automated, the cost of software developing ought to be decreased fund amentally. Of the problems included in software testing, on e is of specific importance here; the issue of creating test da ta. Generation of test data in testing of software is the proce dure of distinguishing program input data which fulfill crite rion of selected testing. A test data generator is a device whi ch helps a programmer in generation of test data for a prog ram. There are three types of generators of test data: path wise test generators, data specification generators, and ran dom test generators. [2] Software testing is an imperative activity in lifecycl e of software development. Organizations of software spen d significant part of their budget in activities which are relat ed to testing. Testing incorporates executing a program on a set of test cases and contrasting the actual results with the results that are expected. Testing ought to concentrate on p revention of fault. Test cases are normally derived for some artifacts of software like specifications, design or may be im plementation of the system. For testing a system, the imple mentation ought to be understood first which should be pos sible by making a suitable model of the system. A typical so urce for tests is the program code. Each time the execution of program is done, the program is tested by the user. So we need to execute the program with the particular intent of r emoving and fixing errors. With a specific end goal to locate the highest conceivable number of errors, there must be co nduction of tests systematically and test cases ought to be d esigned by utilizing restrained techniques. UML (Unified Mo deling Language) is a broadly accepted arrangement of nota tions for modeling the system which is object oriented. It ha s numerous diagrams for portraying the dynamic behavior of objects in the system. [3]
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1164 The requirement for better quality means more pre ssure for testing of software and for test engineers dealing with it. Software Testing is the procedure of executing a pro gram with the goal of discovering errors. Each code of softw are has been assessed and confirmed through activities of S oftware Quality and Assurance yet these activities definitely not sufficient. Every time the delivery of the software to the client is done, it has been tested thoroughly by the client be fore gets it to the production. In this way QA team needs to t est the software before it gets to the client. Flow of informat ion of testing is said to be as a technique of testing which in dicates the technique to choose input test cases and analyze results of test. Majority of the engineers of software would concur that testing is a crucial component of the process of quality software, and is a standout among the most costly a nd challenging activities carried out during development an d maintenance of software. The process of software testing has been depicted as a sequence of phases, steps and proce dures that bring about Quality Software Development Deliv ery to the production. Hence Testing can be depicted as a pr ocedure utilized for establishing that the software has achie ved a predetermined degree of quality regarding selected at tributes. [1] Testing is an imperative phase development and m aintenance of the software. It is a challenging task for invest igation of unified modeling language (UML) models followi ng the information about a system is dispersed across vario us views of model. The models of UML are proposed to help to minimize the complexity of the problem, with the increm ent in complexities and sizes of product. Still, the models of UML themselves turn out to be complex and large including a numerous interactions crosswise over several objects. It i s unwieldy for producing test models such as control flow g raph from source code. This is particularly valid for large pr ograms. The UML sequence diagrams are utilized for modeli ng distinct behavior of an object through sequence graph. S uch transitions and states are discriminating to choose the i nvocations of particular operation that would be made taki ng into account the conditions emerging during the executi on of a scenario. For testing at unit level, we can get tests fr om state machine diagrams of UML, which embody the beh avioral depiction of every component. [4] The information about system is disseminated over a various views of the model of the system, captured throu gh substantial number of diagrams. The models of UML are expected to help in reducing the complexity of the problem, with increase in complexities and sizes of the product. Still, the models of UML themselves become complex and large i nclude a large number of interactions crosswise over many objects. Many products of software are based on state. In su ch type of systems, the behavior of system is depicted by its state. In this manner, unless a system is made to accept all it s conceivable states and tested, it would not be possible to r eveal bugs based on state. Adequate testing of the system of such type of software needs satisfactory coverage of transit ions and states of the system. It is a noteworthy issue to fulf ill the requirement specification for the production of high- quality software systematically. A legitimately generated te st suite may not just find the errors in the system of softwar e and additionally help in minimizing the high cost connecte d with software testing. [4] 2. AUTOMATED TESTING Automated software testing is a procedure in which tools of software execute pre-scripted tests on an application of sof tware before it is discharged into production. The aim of au tomated testing is to simplify as much of the effort of testin g as conceivable with minimum set of scripts. If unit testing devours a huge percentage of resources of the team of quali ty assurance (QA), such as then this process may be a decen t candidate for automation. The tools of automated testing h ave the ability of executing tests, reporting results and cont rasting results with prior runs of test. Tests completed out with these tools can be repeatedly run at any time of day. The strategy of process being utilized to execute au tomation is known as test automation framework. Various f rameworks have been implemented over many years by or ganizations of testing and commercial vendors. Automation testing with commercial off-the-shelf (COTS) or software wi th open source can be complicated, as they mostly need cus tomization. In most organizations, automation is implement ed only when it has been resolved when it has been depicte d that the program of manual testing is not fulfilling expecta tions and it is unrealistic to acquire most human testers. [5] The steps of automation process are [6]: 1. Test Tool selection 2. Define scope of automation 3. Planning. Design and Development 4. Test Execution 5. Maintenance 3. UML DIAGRAM Unified Modeling Language (UML) is a standardized used ge nerally for modeling of language in the field of software eng ineering. The Unified Modeling Language incorporates a set of techniques of graphic notation to produce visual models of object-oriented software-intensive systems. The Unified Modeling Language was developed by Grady Booch, Ivar Jac obson and Jim Rumbaing at Rational Software in 1990s. It w as adopted by the Object Management Group (OMG) in 199 7, and has been overseen by this association ever since. In 2 000, the Unified Modeling Language was acknowledged by t he International Standard Organization for Standardization (ISO) as standard for Industry for modeling intensive syste ms of software. The Unified Modeling Language is becoming fastly a required skill for anyone virtually incorporated in p rojects of software. UI designers, project managers and test ers, requirement analysts, architects, software developers a nd database professionals are progressively being asked to make and use specifications which are written in UML. It cle arly gives explanation for the concepts such as enterprise ar chitecture, business modeling and objects oriented analysis. UML is now a de-facto standard for modeling of software. T here are mainly two reasons the requirement of modeling l
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1165 anguage. Firstly, the model offers a blueprint for developers so they exactly know what they need to develop and for pr oject managers so that they calculate precisely the cost of gi ven project. Secondly and more significantly, UML is the bri dge between non-technical users and technical developers. [7] The UML became popular because of the following reasons [7]: 1. It is very flexible. It permits many distinctive types of mo deling such as Defining database architecture, Sequencing o f events and Business Process modeling event workflow. 2. Supports Methodologies which are Object-Oriented: UML supports object-oriented methodologies. UML can be utiliz ed to design both object oriented and relational models. 3. Platform-Independent: It permits architecture of softwar e to model any type of application on any operating system in any language of programming or any network. 4. The integration of different stages of SDLC through tools of UML has brought the analyst, modeler, designer, and the developers of software application closer to one another. 4. RELATED WORK Lots of research work has been done in the area of separabl e reversible data hiding. Many efficient methods have been proposed for reversible data hiding for encrypted images. S ome important work in the area of reversible data hiding is as follows: In reference [5], a novel approach for separable reversible d ata hiding in encrypted images is proposed. In the first stag e, owner of the matter encrypts the original image which is uncompressed by utilizing the encryption key. At that point, data hider may compress the least significant bits of the en crypted image utilizing and key of data hiding to make an in adequate space to oblige some extra information. With an e ncoded image containing additional information, if a receiv er has the key of data hiding, he can obtain the extra inform ation however he doesn’t know the content of an image. If t he receiver has both the key of encryption and key of data h iding, he can obtain the extra information and also recupera te the original content with no lapse by misusing the spatial relationship in regular image when the amount of extra inf ormation is not too very expansive. In Paper [6], authors propose an authenticated and secure d iscrete reversible data hiding in cipher images manages aut hentication and security. In the first stage, owner of the con tent encodes the image which is original and uncompressed utilizing an encryption key. At that point, data hider may co mpress the least significant bits of the encrypted image utili zing and key of data hiding to make an inadequate space to oblige some extra information. With an encoded image cont aining additional information, if a receiver has the key of da ta hiding, he can obtain the extra information however he d oesn’t know the content of an image. If the receiver has bot h the key of encryption and key of data hiding, he can obtai n the extra information and also recuperate the original con tent with no lapse by misusing the spatial relationship in re gular image when the amount of extra information is not to o very vast. It is additionally a downside that if the receiver has any one key as known, and afterward he can take any o ne data from the encoded information. SHA-1 algorithm is b eing utilized keeping in mind to achieve authentication. Reference [7] explains about the technique for reversible da ta hiding in encrypted images using DCT. Reversible data hi ding is a strategy to insert extra message into some spread media with a reversible way so that the original content can be consummately restored after extraction of the message which is hidden. The extraction of data can be accomplished by analyzing the block smoothness. This paper adopts a pla n for measuring the blocks smoothness, and uses the schem e of closest match to further diminishing the rate of error of removed bits. The results of experiment reveal that the pro posed technique offers better execution over side match sys tem. In reference [8], more consideration is paid to reversible da ta hiding in images that are encrypted, since it keeps up the amazing property that the original cover can be losslessly r ecuperated after inserted data is obtained while securing th e content of an image confidentially. All past techniques em bed information by reversibly memory space from the encr ypted images, which may be liable to few errors on extracti on of data or restoration of image. A novel strategy is propo sed in this paper by saving space of memory before encrypt ion with a conventional RDH (Reversible Data Hiding) techn ique, and accordingly it is simple for the information hider t o reversibly embed information in the image. In paper [9], method of data hiding by adjusting histogram of medical images and dissimilarities in view of division of b lock is proposed. Reversible data hiding by utilizing method of modification of histogram considers the distinctions of t he pixels which enhance the capacity of data hiding. To imp rove the capacity of data hiding, the method of block divisio n is preferred. 5. MOTIVATION Reversible data hiding is a procedure through which origin al image can be recuperated back losslessly after embedded message is extracted. This technique is used in law forensic s, military and medical images where no alteration of the or iginal image is permitted. The main aim of this study is to hi de the data in encrypted images. In this work, AOI (area of i nterest) is finding out and fuse the related document in the NAOI (non area of interest) of the image. The data is fused a t the borders of the images and then build the particular an d pre-defined border space. The algorithm is proposed whic h will first find out the area of interest and then noisy pixels of an image. BAT algorithm is used to find the coordinates of the noisy pixels. The research is based on following objectives: 1. To Study various reversible data hiding techniques with evaluation parameters. 2. To study and implement BAT algorithm for generating hash key.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1166 3. Implementing hash key for data fusion into the host image. 4. Decrypting host image and data from embedded image. 5. Evaluating various parameters for calculating the percentage of improvement. 6. PROPOSED SCHEME Generally there are two types of techniques of data hiding- separable reversible data hiding and non-separable reversi ble data hiding. The aim of this research is to hide the data r eversibly using BAT optimization for encrypted images. In i t, area of interest is find out for particular image and then fu se the related document in the NAOI of the image. The techn ique used is to fuse data at the borders of the image and bui ld the particular and pre-defined border space. An algorith m is proposed which will first find out area of interest and t hen use BAT algorithm to find out the coordinates of the noi sy pixels and embed text data on these pixels and rest data will be fed into the border area of images. Fig. 3 Flowchart of proposed work 7. RESULTS AND DISCUSSIONS This section presents the simulated results of encryption, data hiding, decryption and computation time.  Encryption and Computation Time
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1167 Data Hiding and Computation Time  Decryption and Computation Time
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1168 8. CONCLUSION The main aim of this research is to implement BAT algorith m for encrypted images to hide the data. Reversible data hi ding is a procedure in which original image can be regained back without any loss and also after getting the embedded message. It hides the secret information in the digital image in such a way that just the approved individual could interp ret the secret data and restore the original image. We have used BAT algorithm for hiding data. Hence if the image is tr ansmitted, it is secured. Our proposed algorithm has shown better results than the algorithms already present for encr yption of images. REFERENCES [1] V.Santhosh, J.Harish, R.V.K Sumanth, N.Vijay “Separable Reversible Data Hiding In Encrypted Image”, Department of CSE, GRIET.. [2] Rini.J, “Study on Separable Reversible Data Hiding in En crypted Images”, Intenational Journal of Advancements in Re search & Technology (IJOART), Vol.2, No.12, December 2013 . [3] S.Poongodi, Dr.B.Kalavathi, M.Shanmugapriya “Secure T ransformation of Data in Encrypted Image using Reversible Data hiding Technique”, International Journal of Engineerin g Science and Innovative Technology (IJESIT), Vol.2, No.4, Jul y 2013. [4] Vinit K.Agham, Tareek M Pattewar “Separable Reversibl e Data Hiding Techniqe Based on RGB-LSB Method”, Interna tional Journal of Research in Advent Technology, Vol.1, No.3, October 2013. [5] Xinpeng Zhang, “Separable Reversible Data Hiding in En cypted Image”, IEEE , Vol.7, No.2, 2012. [6] C.Anuradha, S.Lavanya, “Secure and Authenticated Reve rsible Data Hiding in Encrypted Image”, International Journ al of Advanced Research in Computer Science and Software E ngineering,, Vol 3, Issue 4,April 2013. [7] Vimal, Mahendra Kumar Patil, “Reversible Data Hiding I n Encrypted Images using DCT”, International Journal of En gineering And Science, Vol.3 Issue 3, June 2013, pp. 45-49. [8] Lalit Dhande, Priya Khune, Vinod Deore, Dnyaneshwar G awade, “Hide Inside-Separable Reversible Data Hiding in En crypted Image”, International Journal of Innovative Technolo gy and Exploring Engineering (IJITEE), Vol.3, Issue 9, Februa ry 2014. [9] A.Lavanya, V.Natarajan, “Data Hiding Using Histogram M odification of Difference in Medical Images Based on Block Division”, International Conference on Recent Trends in Inf ormation Technology (ICRTIT), IEEE, 2012. [10] T. Marga ret, “Reversible Data Hiding In Encrypted Images by XOR Ci phering Technique”, International Journal of Advanced Rese arch in Electrical, Electronics and Instrumentation Engineeri ng, Vol.3, Issue 2, February 2014. [11] Shruti M. Rakhunde, “Reversible Data Hiding using Vis ual Cryptography: A Review”, International Journal of Innov ative Research in Computer and Communication Engineering (IJIRCCE), Vol.2, Issue 1, January 2014. [12] Masoud Nosrati, Ronak Karimi, Mehdi Hariri, “Reversib le Data Hiding: Principles, Techniques and Recent Studies”, World Applied Programming Journal, Vol. 2, Issue 5, May 20 12. [13] Dr. V Khanaa, Dr, Krishna Mohanta, “Secure and Authe nticated Reversible Data Hiding In Encrypted Images” Inter national Journal of Engineering and Computer Science, Vol.2, Issue 3, March 2013. [14] Harish G, Smitha ShekarB, Prjawal R, Sunil S Shetty, “R eversible Data Hiding In Encrypted Images by Reserving Ro om before Encryption”, International Journal of Engineering Research,Vol.3, Issue 7, pp 435-437, July 2014. [15] Prof. Praveen Bhanodia, Prof. Mrudula, Prashant Kale, “ Separable Reversible Data Hiding Using Matrix Addition Co mpression Approach for Color Images”, International Journ al of Emerging Technology and Advanced Engineering, Vol.3, Issue 2, Februray 2013.