International Journal of Engineering Trends and Technology (IJETT) – Volume 17 Number 1 – Nov 2014 A Simple and Efficient Framework for Reversible Data Suppression in Images Vardhanapu Alekhya1, Kaligithi Rajesh Kumar 2 1,2 Final M.Tech Student1,Associate Professor2 dept of CSE in Swarnandhra College of Engineering & Technology, Seetharampuram, W.G.Dt,[A.P],India Abstract: Steganography is the efficient method to authenticate users and sending secret messages in present days. There are many existing methods for hiding data in image which depends of the density of the pixels and the color ranges. In many of the methods in previous research failed to maintain the originality of the image after hiding of data or message. So we introduced a novel technique to hide data in image by applying the cryptographic techniques on the image and the text. In this technique we mainly use LSB based techniques and symmetric cryptographic techniques. It reduces the distortion levels of the image and tried to maintain the original quality of the image. I. INTRODUCTION Present days there is increase in network usage. Many users are communicating and exchanging information through network. Due to rapid increase of the data exchange there is increase in malicious users also. For reducing the malicious attacks there are many researches done and still the researches are going on for increasing security over the network. But many of the methods are failed to reduce and defend over the network. Researchers focused on many issues such as the data embedding, image quality, data transferring, and data receiving, extracting message from the image. [1][2] Coming to data embedding it is also referred as data hiding in image there so many techniques such as encrypting of the message before embedding. In this concept cryptographic methods are introduced in steganography techniques. Initially the researchers introduced a public key cryptographic technique. In this technique users have to execute key exchanging protocol. After generating secret keys encrypt the text message and embed in image pixels. In there are two main uses of data hiding in media are to present proof of the copyright and guarantee of data integrity. So the data mustremain hiddenin a deployed signal and though the signal is going to modify as degrading as filtering and re-sampling or lossy content compression. In some applications the data hiding that is the consistency of amplification of the data and there is no need todifferentiate the detection or deleting until these data are for the profit ofboth the data owner and the user. So methods used for data hiding different and depends upon the density of data being hidden and the required invarianceof the data to modify. The method is not capable ISSN: 2231-5381 of achieving all these problems and a type of processes required to length the range of capable applications. Information concealing routines must be equipped for installing the information in a sign with the underneath limitations and properties: 1. The host signal must be consented to debased and the inserted information must be negligibly noticeable. (The point is for the information to covered up. As any entertainer will let you know, it is feasible for something to be shrouded while it stays in plain sight; you simply keep the individual from taking a gander at it. We will utilize the words covered up, imperceptible, unperceivable, and undetectable to imply that an onlooker does not recognize the vicinity of the information, regardless of the fact that they are discernible.)[4] 2. The inserted information must be specifically encoded into the media, instead of into a header or wrapper, so that the information stay in place crosswise over differing information document forms. 3. The inserted information must be safe to adjustments extending from deliberate and clever endeavors at evacuation to foreseen controls, e.g., channel commotion, sifting, resampling, trimming, encoding, lossy layering, printing and checking, computerized to-simple (D/A) change, and simple to-advanced (A/D) transformation, and so on. 4. Unbalanced coding of the inserted information is attractive, since the motivation behind information stowing away is to keep the information in the host signal, however not so much to make the information hard to get to. 5. Slip rectification coding1 must be utilized to guarantee information trustworthiness. It is certain that there will be some debasement to the installed information when the host sign is adjusted. 6. The installed information must act naturally timing or self-assertively re-contestant. This guarantees that the installed information can be recuperated when just parts of the host sign are accessible, e.g., if a sound chomp is concentrated from a meeting, information implanted in the sound section can be recouped. This peculiarity additionally encourages programmed unraveling of the concealed information; since there is no compelling reason to allude to the first have signal. Applications: [5] Exchange offs exist between the amount of implanted information and the level of http://www.ijettjournal.org Page 43 International Journal of Engineering Trends and Technology (IJETT) – Volume 17 Number 1 – Nov 2014 invulnerability to have signal change. Via compelling the level of host signal debasement, an information concealing system can work with either high inserted information rate,or high imperviousness to alteration, however not both. As one expands, the other must abatement. While this can be indicated scientifically for some information concealing frameworks for example, a spread range, it appears to hold valid for all information concealing frameworks. In any framework, you can exchange data transfer capacity for power by abusing repetition. The amount of inserted information and the level of host signal alteration differ from application to application. Hence, distinctive strategies are utilized for distinctive applications II.RELATED WORK The plan is made up of picture encryption, information inserting and information extraction/picture recuperation stages. This paper proposes distinguishable Original Image Encryption key side, the information implanted in the made space can be effortlessly recovered from the scrambled picture containing extra information as per the information concealing key. Since the information inserting just influences the LSB, a decoding with the encryption key can bring about a picture like the first form. Image Encryption process: While an encoded binary image can be packed with a lossless way by discovering the disorders of low density equality check codes, a lossless pressure technique for scrambled ash image utilizing dynamic decay and rategood punctured turbo codes is created in .With the lossy layering strategy exhibited in, an scrambled ash image can be proficiently compacted via tossing the unreasonably unpleasant and fine data of coefficients produced from orthogonal change. While having the packed information, a beneficiary may remake the key substance of unique image by recovering the estimations of coefficients. The substance manager scrambles the first uncompressed image utilizing an encryption key to deliver an encoded image. Encrypted Image Data hiding key Embed Data to embed Encrypted Text Stego image reversible information covering up in encoded picture. In the proposed plan, the first picture is encoded utilizing an encryption key and the extra information are installed into the scrambled picture utilizing information stowing away key. With a scrambled picture containing extra information, if the recipient has just the information concealing key, he can remove the extra information however collector does not know the picture content. If recipient has the encryption key, he can decode the got information to get a picture like the first one, yet can't separate the inserted extra information The substance holder scrambles the first uncompressed picture utilizing an encryption key to create an encoded picture.[6,7] At that point, the information hider layers the minimum critical bits (LSB) of the scrambled picture utilizing an information concealing key to make a scanty space to oblige the extra information. At the beneficiary ISSN: 2231-5381 At that point, the information hider layers the minimum critical bits (LSB) of the scrambled image utilizing an information concealing key to make a scanty space to suit the extra information. At the collector side, the information installed in the made space can be effortlessly recovered from the scrambled image containing extra information as indicated by the information concealing key. Since the information implanting just influences the LSB, a decoding with the encryption key can bring about an image like the first form. At the point when utilizing both of the encryption and information concealing keys, the installed extra information can be effectively separated and the first image can be impeccably recuperated by misusing the spatial connection in characteristic image.[9] Data embedding method: In the information inserting stage, a few parameters are inserted into a little number of scrambled pixels, and the LSB of the other encoded pixels are layered to make a space for obliging the extra information and the first information at the positions possessed by the parameters. As indicated by the information concealing scratch, the information hider pseudo arbitrarily chooses NP encoded pixels that will be utilized to convey the parameters for information covering up. Here NP is a little positive number, for instance Np=20.the other encoded pixels are pseudo-arbitrarily permuted and partitioned into number of gatherings, each of which contain L pixels. The change way is additionally controlled by the information concealing key. For every pixel-gathering, gather the M minimum critical bits of the L pixels, and mean them as B (k,1) , B (k,2) … B(k,m*l) where k is a gathering file inside [1,(n-Np)/L] and M is a positive whole number http://www.ijettjournal.org Page 44 International Journal of Engineering Trends and Technology (IJETT) – Volume 17 Number 1 – Nov 2014 short of what 5. The information hider additionally creates a network G measured (M*l – S) * M*l, which is made out of two sections. The left part is the personality lattice and the right part is pseudo-irregular binary network inferred from the information concealing key. For each one gathering, which is item with the G lattice to structure a grid of size (M * L-S). Which has scanty bits of size S, in which the information is installed and organizes the pixels into the first structure and permutated to structure an unique im Image Decryption method: When having an encrypted image containing embedded data, a receiver firstly generates ri,j,k according to the encryption key, and calculates the exclusive-or of the received data and ri,j,k to decrypt the image. We denote the Decrypted bits as b1i,j,k . Clearly, the original five most significant bits (MSB) are retrieved correctly. For a certain pixel, if the embedded bit in the block including the pixel is zero and the pixel belongs to S1, or the embedded bit is 1 and the pixel belongs to S0, the data-hiding does not affect any encrypted bits of the pixel. So, the three decrypted LSB must be same as the original LSB, implying that the decrypted gray value of the pixel is correct. On the other hand, if the embedded bit in the pixel’s block is 0 and the pixel belongs to S0, or the embedded bit is 1 and the pixel belongs to S1, the decrypted LSB. That means the three decrypted LSB must be different from the original LSB. In this case: b’ i,j,k + bi,j,k = 1 On the other hand, if the embedded bit in the pixel’s block is 0 and the pixel belongs to S0, or the embedded bit is 1 and the pixel belongs to S1, the decrypted LSB. Data Extraction The receiver has both the data hiding, he may aim to extract the embedded data according to the data hiding key. The values of M, Land S, the original LSB of the Np selected encrypted pixels, and the (N-Np) * S/L - Np additional bits can be extracted from the encrypted image containing embedded data. By putting the Np LSB into their original positions, the encrypted data of the Np selected pixels are retrieved, and their original gray values can be correctly decrypted using the encryption keys. In the following, it will recover the original gray values of the other (N-Np) pixels. Consider the case that the receiver has the encryption key but does not know the data-hiding key. Clearly, he cannot obtain the values of parameters and cannot extract the embedded data. However, the original image content can be roughly recovered. III. PROPOSED SYSTEM In our proposed technique we introduced the data hiding technique on encrypted image using two keys such as encryption key and data hiding key. First the sender and receiver generates encryption key randomly using Diffie Hellman key exchange algorithm. Sender encrypts the cover image with the encryption key. Then generates data hiding key randomly, then obtain the positions from the ISSN: 2231-5381 data hiding. Before embedding the data bits we apply run length encoding technique for compression of the image. This algorithm uses arithmetic modulus as the basis of its calculation. Suppose Alice and Bob follow this key exchange procedure with Eve acting as a man in middle interceptor (or the bad guy).Here are the calculation steps followed in this algorithm that make sure that eve never gets to know the final keys through which actual encryption of data takes place. First, both Alice and Bob agree upon a prime number and another number that has no factor in common. Lets call the prime number as p and the other number as g. Note that gis also known as the generator and p is known as prime modulus. Now, since eve is sitting in between and listening to this communication so eve also gets to know p and g. Now, the modulus arithmetic says that r = (g to the power x) mod p. So r will always produce an integer between 0 and p. The first trick here is that given x (with g and p known),it’s very easy to find r. But given r(with g and p known) it’s difficult to deduce x. One may argue that this is not that difficult to crack but what if the value of p is a very huge prime number? Well, if this is the case then deducing x (if r is given) becomes almost next to impossible as it would take thousands of years to crack this even with supercomputers. This is also called the discrete logarithmic problem. Coming back to the communication, all the three Bob, Alice and eve now know g and p. Now, Alice selects a random private number xa and calculates (g to the power xa) mod p =ra. This resultant ra is sent on the communication channel to Bob. Intercepting in between, eve also comes to know ra. Similarly Bob selects his own random private number xb, calculates (g to the power xb) mod p = rb and sends this rb to Alice through the same communication channel. Obviously eve also comes to know about rb. So eve now has information about g, p, ra and rb. Now comes the heart of this algorithm. Alice calculates (rb to the power xa) mod p = Final key which is equivalent to (g to the power (xa*xb) ) mod p . Similarly Bob calculates (ra to the power xb) mod p = Final key which is again equivalent to (g to the power(xb * xa)) mod p. So both Alice and Bob were able to calculate a common Final key without sharing each other’s private random number and eve sitting in between will not be able to determine theFinal key as the private numbers were never transferred. http://www.ijettjournal.org Page 45 International Journal of Engineering Trends and Technology (IJETT) – Volume 17 Number 1 – Nov 2014 Run Apply Encoding Algorithm: IV. CONCLUSOIN Suppose we are given a file or a source message that has too many redundant characters. For example, an average MS Word file has too many consecutive byte-255 and NULL characters. Is it possible to represent these consecutive bytes or “runs” into a more compact form? Indeed, a compression technique was designed to solve this particular problem. It is called Run-Length Encoding or RLE. Its name so accurately describes the process because it encodes a run of bytes to the following 2byte form:{byte,length},with length representing the number of runs of a single byte and which means that we can encode as many as 255 consecutive runs. Binary files. Another clever form of run-length encoding is to encode if and only if there is a run. That is, do not encode an additional byte for a single non-redundant byte: encode only those redundant bytes. This is done by encoding twice the byte and then encoding the length byte: {byte, byte, length}. This way, we do not incur a length byte for those bytes which occur only independently in a data stream. Thus, in the decompression phase, the presence of a twin byte alerts us that there is exactly a run of bytes. Hence, {‘b’, ‘b’, 8} means that there are 10 runs of byte ‘b’. It follows that we must then write the next eight bytes after the two. The previous example would then be encoded like this: {‘a’}, {‘b’, ‘b’, 8}, {‘e’}, {‘f’, ‘f’, 1}, {‘g’, ‘g’, 2}, {‘h’, ‘h’, 0}, {‘i’}, {j}, {‘k’}. This encoding needs only 17 bytes for output. Notice that the letters ‘a’ and ‘e’ are now encoded as is, with single bytes. For very large files, this technique is more powerful than the “byte-length” technique. This method can record at most 257 consecutive bytes (2 + (0..255)). Another drawback we incur from this new technique, however, is the additional symbol encoded. If there are only two runs of a symbol, we would need an additional byte, encoding the run with three bytes instead of just two bytes. In general, however, this is more effective when we look at the data as a single large file which may naturally have a series of identical bytes. This is a very simple compression method used for sequential data. It is very useful in case of repetitive data. This technique replaces sequences of identical symbols (pixels) ,called runs by shorter symbols. The run length code for a gray scale image is represented by a sequence { Vi , Ri } where Vi is the intensity of pixel and Ri refers to the number of consecutive pixels with the intensity Vi as shown in the figure. If both Vi and Ri are represented by one byte, this span of 12 pixels is coded using eight bytes yielding a compression ratio of 1: 5. After this after the data hiding we derive the positions for embedding the data bits. At those positions we replace the data bits in the encrypted cover image. From the proposed technique we achieve more security over the distortion and the data hiding. For the retrieving the data and the image receiver have both keys encryption and data hiding keys. Having any one of the key do not extract the message or data. ISSN: 2231-5381 The data of original image are entirelyencrypted by a stream cipher. Although a data-hider does not know the original content, hecan embed additional data into the encrypted image by modifying a part of encrypted data.With an encrypted image containing embedded data, a receiver may firstly decrypt it usingthe encryption key, and the decrypted version is similar to the original image. According to the data-hiding key, with the aid of spatial correlation in natural image, the embedded datacan be correctly extracted while the original image can be perfectly recovered. REFERENCES [1] M. Johnson, P. Ishwar, V. M. Prabhakaran, D. Schonberg, and K. Ramchandran, “On compressing encrypted data,” IEEE Trans.SignalProcess., vol. 52, no. 10, pp. 2992–3006, Oct. 2004. [2] W. Liu, W. Zeng, L. Dong, and Q. Yao, “Efficient compression of encryptedgray scale images,” IEEE Trans. Image Process., vol. 19, no. 4,pp. 1097–1102, Apr. 2010. [3] X. Zhang, “Lossy compression and iterative reconstruction for encryptedimage,” IEEE Trans. Inform. Forensics Security, vol. 6, no. 1,pp. 53–58, Feb. 2011. [4] T. Bianchi, A. Piva, and M. Barni, “On the implementation of the discreteFourier transform in the encrypted domain,” IEEE Trans. Inform.Forensics Security, vol. 4, no. 1, pp. 86–97, Feb. 2009. [5] T. Bianchi, A. Piva, and M. Barni, “Composite signal representation forfast and storage-efficient processing of encrypted signals,” IEEE Trans. Inform. Forensics Security, vol. 5, no. 1, pp. 180–187, Feb. 2010. [6] N. Memon and P. W. Wong, “A buyer-seller watermarking protocol,”IEEE Trans. Image Process., vol. 10, no. 4, pp. 643–649, Apr. 2001. [7] M. Kuribayashi and H. Tanaka, “Fingerprinting protocol for imagesbased on additive homomorphic property,” IEEE Trans. ImageProcess., vol. 14, no. 12, pp. 2129–2139, Dec. 2005. [8] M. Deng, T. Bianchi, A. Piva, and B. Preneel, “An efficient buyersellerwatermarking protocol based on composite signal representation,” inProc. 11th ACM Workshop Multimedia and Security, 2009, pp. 9–18. [9] S. Lian, Z. Liu, Z. Ren, and H. Wang, “Commutative encryption andwatermarking in video compression,” IEEE Trans. Circuits Syst. VideoTechnol., vol. 17, no. 6, pp. 774–778, Jun. 2007. [10] M. Cancellaro, F. Battisti, M. Carli, G. Boato, F. G. B. Natale, andA. Neri, “A commutative digital image watermarking and encryptionmethod in the tree structured Haar transform domain,” Signal Processing:Image Commun., vol. 26, no. 1, pp. 1–12, 2011. BIOGRAPHIES Vardhanapu Alekhya received B.tech degree in Computer science &Engineering from JNTU Kakinada University. She pursuing M.tech (CSE) in Swarnandhra College of Engineering & Technology (underthe university of JNTU Kakinada. Kaligithi Rajesh Kumar completed M.tech. Currently he is working as Associate Professor in Swarnandhra College of Engineering and Technology.(Under University of JNTU Kakinada). http://www.ijettjournal.org Page 46