Вы находитесь на странице: 1из 41

REVERSIBLE DATA HIDING

USING REVERSIBLE IMAGE


TRANFORMATION

AMILIYA NAMITHA GJ (SNM15CS003)


ANAKHA VARGHESE (SNM15CS004)
RAIMA THOMAS (SNM15CS017
CONTENTS
INTRODUCTION

OBJECTIVES

SCOPE AND RELEVANCE

EXISTING SYSTEM

PROPOSED SYSTEM

SYSTEM SPECIFICATION

SYSTEM MODELLING

ALGORITHMS USED

FORMS AND REPORTS

FUTURE SCOPE

CONCLUSION
INTRODUCTION

• Cloud computing

• Need for SECURITY

• REVERSIBLE DATA HIDING(RDH)

• REVERSIBLE IMAGE TRANSFORMATION(RIT)


OBJECTIVES
• Only authorised users will be allowed to access the documents.

• Provide a secure means of transferring sensitive data to users.

• Parallel I/O to reduce access time of data.

• Reduce costs by reusing existing system.


SCOPE AND RELEVANCE
• Cloud Computing and cloud storage have become the preferred
method for delivering information and online functionality.

• manage a private cloud environment that facilitates the backup and


data storage, using infrastructure already available or at low cost.

• allows full control of those who access the information thus


maintaining the confidentiality of the data.
EXISTING SYSTEM
• The existing RDH-EI method consists of two frameworks:

I. VRAE
II. RRBE
EXISTING SYSTEM
PROPOSED SYSTEM
• We propose a cloud environment to backup and store data on a private
cloud to increase the performance of these applications.

• RIT transfers the semantic of the original image I into the semantic of
another image J.

• This option allows input / output parallel, so that will reduce the access
times to data.

• On the client-end, a multiplatform application is developed using free


software that allows data transfer fast and simple way.
PROPOSED SYSTEM
• Files can be uploaded to the environment.
• A search key and a password is used for user authentication.
• Files can be searched using keyword or by listing all files.
• There is also an option for sharing text files.
• Files can be shared to other users.
• Receiver can view in inbox.
• Cover image can be changed using the option change icon image.
SYSTEM SPECIFICATION
HARDWARE REQUIREMENTS

Hardware : Pentium
Speed : 1.1 GHz
RAM : 1GB
Hard Disk : 20 GB
SYSTEM SPECIFICATION
SOFTWARE SPECIFICATION

Operating System : Windows


Technology : Java and J2EE
Web Technologies : Html, JavaScript, CSS
Web Server : Tomcat
Database : My SQL
Java Version : J2SDK1.5
SYSTEM MODELLING
MODULES

• User Management
• File Uploading
• File Searching
• File Downloading
SYSTEM MODELLING
• USE CASE DIAGRAM
TABLE DESCRIPTION

 LOGIN

Name Data Type


id int

username Varchar(20)

password Varchar(20)
 REGISTRATION
Name Data Type
fname varchar(20)
lname varchar(20)
dob varchar(20)
sex varchar(20)
housename varchar(20)
city varchar(20)
district varchar(20)
state varchar(20)
pincode varchar(20)
phnno varchar(20)
emailid varchar(20)
status varchar(20)
id varchar(20)
removed varchar(20)
 SHARE

Name Data Type


Sid int
Share_to Varchar(20)
Status Varchar(20)
Share_file Varchar(20)
category Varchar(20)

 Name Data Type


Fkey int
Uid Varchar(20)
Date_time Varchar(20)
Category Varchar(20)
Filepath Varchar(100)
storageKey Varchar(20)
 UPLOADS
ALGORITHMS USED
• MAGIC RECTANGLE ALGORITHM
A. BLOCK PAIRING
• divide the original image I and the target image J into N non-
overlapping blocks.

• pair the blocks of I and J as a sequence such that (B1,T1),...,(BN,TN).

• Find mean and standard deviation of each block.


• A throughput Nα is set.

• Assign the blocks into classes with SDs ∈ [0,Nα] to “Class 0”

• blocks with SDs ∈ (Nα,N100)is assigned to “Class 1”.


• An Example Of Block Pairing
BLOCK TRANSFORMATION
• Mean shifting transformation that is reversible.
• Let the original block B = {p1,p2,…..,pn} and
target block T = {p’1,p’2,….,p’n}
Transformed block T’ = {p’’1,p’’2,….,p’’n}
Pi’’=Pi + UT-UB
=Pi + ΔU
• rotate the block into the optimal direction θi (θi ∈ {0o, 90o, 180o
270o}.
• yields a transformed block Ti′.
• Parameters, ΔU, rotation directions are the accessorial information
ROLE OF AJAX

• Ajax was originally an acronym for Asynchronous JavaScript and XML.


• Ajax is not a programming language or a tool, but a concept.
• the method of exchanging data with a server, and updating parts of a
web page – without reloading the entire page.
• it refers to the use of XmlHttpRequest objects to interact with a web
server dynamically via JavaScript.
FORMS AND REPORTS
FUTURE SCOPE
• Improve the quality of the encrypted image.

• Extend the idea of RIT to audio and video.


CONCLUSION
• RIT protect the privacy of the original image.
• The encrypted image has the form of plaintext image.
• Can choose any one of the RDH methods for plaintext images to
embed watermark.
THANK YOU

Вам также может понравиться