Reversible Data Hiding With Optimal Value Transfer
ABSTRACT:
In reversible data hiding techniques, the values of host data are modified according to some
particular rules and the original host content can be perfectly restored after extraction of the
hidden data on receiver side. In this paper, the optimal rule of value modification under a
payload-distortion criterion is found by using an iterative procedure, and a practical reversible
data hiding scheme is proposed. The secret data, as well as the auxiliary information used for
content recovery, are carried by the differences between the original pixel-values and the
corresponding values estimated from the neighbors. Here, the estimation errors are modified
according to the optimal value transfer rule. Also, the host image is divided into a number of
pixel subsets and the auxiliary information of a subset is always embedded into the estimation
errors in the next subset. A receiver can successfully extract the embedded secret data and
recover the original content in the subsets with an inverse order. This way, a good reversible
data hiding performance is achieved.
EXISTING SYSTEM:
GLOBALSOFT TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
A data-hider can also employ histogram modification mechanism to realize reversible data
hiding. In the host image is divided into blocks sized 4 ×4, 8 ×8, or 16 ×16, and gray values are
mapped to a circle. After pseudo-randomly segmenting each block into two sub-regions,
rotation of the histograms of the two sub-regions on this circle is used to embed one bit in each
block. On the receiving side, the original block can be recovered from a marked image in an
inverse process. Payload of this method is low since each block can only carry one bit. Based
on this method, a robust lossless data hiding scheme is proposed, which can be used for semi-
fragile image authentication. A typical HM method presented for utilizes the zero and peak
points of the histogram of an image and slightly modifies the pixel grayscale values to embed
data into the image. In binary tree structure is used to eliminate the requirement to communicate
pairs of peak and zero points to the recipient, and a histogram shifting technique is adopted to
prevent overflow and underflow. The histogram modification mechanism can also be
implemented in the difference between sub-sampled images and the prediction error of host
pixels and several good prediction approaches have been introduced to improve the
performance of reversible data hiding.
DISADVANTAGES OF EXISTING SYSTEM:
 In these reversible data hiding methods, a spare place can always be made available to
accommodate secret data as long as the chosen item is compressible, but the capacities
are not very high.
 Payload of this method is low since each block can only carry one bit.
PROPOSED SYSTEM:
In this paper, we will find the optimal rule of value modification under a payload-distortion
criterion. By maximizing a target function using iterative algorithm, an optimal value transfer
matrix can be obtained. Furthermore, we design a practical reversible data hiding scheme, in
which the estimation errors of host pixels are used to accommodate the secret data and their
values are modified according to the optimal value transfer matrix. This way, a good payload-
distortion performance can be achieved
ADVANTAGES OF PROPOSED SYSTEM:
 A smarter prediction method is exploited to make the estimation errors closer to zero, a
better performance can be achieved, but the computation complexity due to the prediction
will be higher.
 The payload-distortion performance of the proposed scheme is excellent.
 The host image is divided into a number of subsets and the auxiliary information of a
subset is always embedded into the estimation errors in the next subset. This way, one
can successfully extract the embedded secret data and recover the original content in the
subsets with an inverse order.
SYSTEM CONFIGURATION:-
HARDWARE REQUIREMENTS:-
 Processor - Pentium –IV
 Speed - 1.1 Ghz
 RAM - 256 MB(min)
 Hard Disk - 20 GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA
SOFTWARE REQUIREMENTS:
• Operating system : - Windows XP.
• Coding Language : C#.Net
REFERENCE:
Xinpeng Zhang, Member, IEEE “Reversible Data Hiding With Optimal Value Transfer” IEEE
TRANSACTIONS ON MULTIMEDIA, VOL. 15, NO. 2, FEBRUARY 2013.
CLOUING
DOMAIN: WIRELESS NETWORK PROJECTS

More Related Content

DOCX
Reversible data hiding with optimal value transfer
PDF
Presentation: Wind Speed Prediction using Radial Basis Function Neural Network
PDF
A040101001006
PDF
WIND SPEED & POWER FORECASTING USING ARTIFICIAL NEURAL NETWORK (NARX) FOR NEW...
PPTX
Kcc201728apr2017 170828235330
PPTX
KCC2017 28APR2017
PPTX
Predicting Drug Target Interaction Using Deep Belief Network
PDF
A0270107
Reversible data hiding with optimal value transfer
Presentation: Wind Speed Prediction using Radial Basis Function Neural Network
A040101001006
WIND SPEED & POWER FORECASTING USING ARTIFICIAL NEURAL NETWORK (NARX) FOR NEW...
Kcc201728apr2017 170828235330
KCC2017 28APR2017
Predicting Drug Target Interaction Using Deep Belief Network
A0270107

What's hot (19)

PPTX
SW_BigData
PDF
Investigation and Evaluation of Microgrid Optimization Techniques
PDF
Target Response Electrical usage Profile Clustering using Big Data
PDF
A general weighted_fuzzy_clustering_algorithm
PDF
G018134149
PPTX
Crop classification using supervised learning techniques
PPTX
Joint Approach of Routing , Rate Adaptation and Power Control in Wireless Mes...
PPTX
Joint Approach of Routing , Rate Adaptation and Power Control in Wireless Mes...
PDF
FrackingPaper
PPTX
Deep Learning Fast MRI Using Channel Attention in Magnitude Domain
PDF
Measurement Of Rn222 Concentrations In The Air Of Peshraw & Darbandikhan Tu...
PPTX
IEEE SSCI 2011 Talk - Neural Networks Ensembles for Short-Term Load Forecasting
PDF
Advanced Techniques for Mobile Robotics
PDF
Electricity Demand Forecasting Using Fuzzy-Neural Network
PDF
Electricity Demand Forecasting Using ANN
PDF
post119s1-file3
PDF
Power system transient stability margin estimation using artificial neural ne...
PDF
Adaptive Training of Radial Basis Function Networks Based on Cooperative
PDF
Ay33292297
SW_BigData
Investigation and Evaluation of Microgrid Optimization Techniques
Target Response Electrical usage Profile Clustering using Big Data
A general weighted_fuzzy_clustering_algorithm
G018134149
Crop classification using supervised learning techniques
Joint Approach of Routing , Rate Adaptation and Power Control in Wireless Mes...
Joint Approach of Routing , Rate Adaptation and Power Control in Wireless Mes...
FrackingPaper
Deep Learning Fast MRI Using Channel Attention in Magnitude Domain
Measurement Of Rn222 Concentrations In The Air Of Peshraw & Darbandikhan Tu...
IEEE SSCI 2011 Talk - Neural Networks Ensembles for Short-Term Load Forecasting
Advanced Techniques for Mobile Robotics
Electricity Demand Forecasting Using Fuzzy-Neural Network
Electricity Demand Forecasting Using ANN
post119s1-file3
Power system transient stability margin estimation using artificial neural ne...
Adaptive Training of Radial Basis Function Networks Based on Cooperative
Ay33292297
Ad

Viewers also liked (13)

DOCX
Scalable face image retrieval using attribute enhanced sparse codewords
DOCX
Query adaptive image search with hash codes
DOCX
Scalable face image retrieval using attribute enhanced sparse codewords
DOCX
Enforcing secure and privacy preserving information brokering in distributed ...
DOCX
Local directional number pattern for face analysis face and expression recogn...
DOCX
Reversible watermarking based on invariant image classification and dynamic h...
DOCX
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
PDF
Reversible Watermarking based on Histogram Shifting Modification:A Review
PDF
Optimized Reversible Data Hiding Technique for Secured Data Transmission
DOCX
Reversible data hiding in encrypted images by reserving room before encryption
PPTX
Reversible data hiding in encrypted images by reserving room before encryption
PPT
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
PDF
State of the Word 2011
Scalable face image retrieval using attribute enhanced sparse codewords
Query adaptive image search with hash codes
Scalable face image retrieval using attribute enhanced sparse codewords
Enforcing secure and privacy preserving information brokering in distributed ...
Local directional number pattern for face analysis face and expression recogn...
Reversible watermarking based on invariant image classification and dynamic h...
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Reversible Watermarking based on Histogram Shifting Modification:A Review
Optimized Reversible Data Hiding Technique for Secured Data Transmission
Reversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryption
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
State of the Word 2011
Ad

Similar to Reversible data hiding with optimal value transfer (20)

PPTX
REVERSIBLE DATA HIDING WITH GOOD PAYLOAD DISTORTIONPpt 3
PDF
Framework for reversible data hiding using cost-effective encoding system for...
PDF
IRJET- Reversible Data Hiding using Histogram Shifting Method: A Critical Review
PDF
Reversible Data Hiding in the Spatial and Frequency Domains
PDF
Reversible Image Data Hiding with Contrast Enhancement
PDF
Reversible Data Hiding in Encrypted Image: A Review
PDF
Matlab reversible data hiding with optimal value transfer
PDF
Reversible data hiding with optimal value transfer
PDF
High capacity histogram shifting based reversible data hiding with data compr...
PDF
IRJET- A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...
PDF
Reversible Data Hiding Methods : A Survey
PDF
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...
PDF
Data Hiding Using Reversibly Designed Difference-Pair Method
PDF
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...
PDF
A comparative case study on the various techniques of reversible data hiding
PDF
P017329498
PDF
An Architectural Approach of Data Hiding In Images Using Mobile Communication
PDF
K041068072
PDF
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDING
PDF
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDING
REVERSIBLE DATA HIDING WITH GOOD PAYLOAD DISTORTIONPpt 3
Framework for reversible data hiding using cost-effective encoding system for...
IRJET- Reversible Data Hiding using Histogram Shifting Method: A Critical Review
Reversible Data Hiding in the Spatial and Frequency Domains
Reversible Image Data Hiding with Contrast Enhancement
Reversible Data Hiding in Encrypted Image: A Review
Matlab reversible data hiding with optimal value transfer
Reversible data hiding with optimal value transfer
High capacity histogram shifting based reversible data hiding with data compr...
IRJET- A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...
Reversible Data Hiding Methods : A Survey
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...
Data Hiding Using Reversibly Designed Difference-Pair Method
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...
A comparative case study on the various techniques of reversible data hiding
P017329498
An Architectural Approach of Data Hiding In Images Using Mobile Communication
K041068072
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDING
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDING

More from IEEEFINALYEARPROJECTS (20)

DOCX
An access point based fec mechanism for video transmission over wireless la ns
DOCX
Towards differential query services in cost efficient clouds
DOCX
Spoc a secure and privacy preserving opportunistic computing framework for mo...
DOCX
Secure and efficient data transmission for cluster based wireless sensor netw...
DOCX
Privacy preserving back propagation neural network learning over arbitrarily ...
DOCX
Non cooperative location privacy
DOCX
Harnessing the cloud for securely outsourcing large
DOCX
Geo community-based broadcasting for data dissemination in mobile social netw...
DOCX
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
DOCX
Dynamic resource allocation using virtual machines for cloud computing enviro...
DOCX
A secure protocol for spontaneous wireless ad hoc networks creation
DOCX
Utility privacy tradeoff in databases an information-theoretic approach
DOCX
Two tales of privacy in online social networks
DOCX
Spatial approximate string search
DOCX
Sort a self organizing trust model for peer-to-peer systems
DOCX
Security analysis of a single sign on mechanism for distributed computer netw...
DOCX
Securing class initialization in java like languages
DOCX
Secure encounter based mobile social networks requirements, designs, and trad...
DOCX
Privacy preserving data sharing with anonymous id assignment
DOCX
Non cooperative location privacy
An access point based fec mechanism for video transmission over wireless la ns
Towards differential query services in cost efficient clouds
Spoc a secure and privacy preserving opportunistic computing framework for mo...
Secure and efficient data transmission for cluster based wireless sensor netw...
Privacy preserving back propagation neural network learning over arbitrarily ...
Non cooperative location privacy
Harnessing the cloud for securely outsourcing large
Geo community-based broadcasting for data dissemination in mobile social netw...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Dynamic resource allocation using virtual machines for cloud computing enviro...
A secure protocol for spontaneous wireless ad hoc networks creation
Utility privacy tradeoff in databases an information-theoretic approach
Two tales of privacy in online social networks
Spatial approximate string search
Sort a self organizing trust model for peer-to-peer systems
Security analysis of a single sign on mechanism for distributed computer netw...
Securing class initialization in java like languages
Secure encounter based mobile social networks requirements, designs, and trad...
Privacy preserving data sharing with anonymous id assignment
Non cooperative location privacy

Recently uploaded (20)

PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
4 layer Arch & Reference Arch of IoT.pdf
PDF
giants, standing on the shoulders of - by Daniel Stenberg
PDF
LMS bot: enhanced learning management systems for improved student learning e...
PPTX
Microsoft User Copilot Training Slide Deck
PDF
Advancing precision in air quality forecasting through machine learning integ...
PDF
Co-training pseudo-labeling for text classification with support vector machi...
PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
PDF
EIS-Webinar-Regulated-Industries-2025-08.pdf
PDF
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
PDF
Connector Corner: Transform Unstructured Documents with Agentic Automation
PDF
Electrocardiogram sequences data analytics and classification using unsupervi...
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
PPTX
Internet of Everything -Basic concepts details
PPTX
Module 1 Introduction to Web Programming .pptx
PDF
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
PDF
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
PDF
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
PDF
Auditboard EB SOX Playbook 2023 edition.
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
Convolutional neural network based encoder-decoder for efficient real-time ob...
4 layer Arch & Reference Arch of IoT.pdf
giants, standing on the shoulders of - by Daniel Stenberg
LMS bot: enhanced learning management systems for improved student learning e...
Microsoft User Copilot Training Slide Deck
Advancing precision in air quality forecasting through machine learning integ...
Co-training pseudo-labeling for text classification with support vector machi...
Early detection and classification of bone marrow changes in lumbar vertebrae...
EIS-Webinar-Regulated-Industries-2025-08.pdf
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
Connector Corner: Transform Unstructured Documents with Agentic Automation
Electrocardiogram sequences data analytics and classification using unsupervi...
Enhancing plagiarism detection using data pre-processing and machine learning...
Internet of Everything -Basic concepts details
Module 1 Introduction to Web Programming .pptx
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
Auditboard EB SOX Playbook 2023 edition.
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf

Reversible data hiding with optimal value transfer

  • 1. Reversible Data Hiding With Optimal Value Transfer ABSTRACT: In reversible data hiding techniques, the values of host data are modified according to some particular rules and the original host content can be perfectly restored after extraction of the hidden data on receiver side. In this paper, the optimal rule of value modification under a payload-distortion criterion is found by using an iterative procedure, and a practical reversible data hiding scheme is proposed. The secret data, as well as the auxiliary information used for content recovery, are carried by the differences between the original pixel-values and the corresponding values estimated from the neighbors. Here, the estimation errors are modified according to the optimal value transfer rule. Also, the host image is divided into a number of pixel subsets and the auxiliary information of a subset is always embedded into the estimation errors in the next subset. A receiver can successfully extract the embedded secret data and recover the original content in the subsets with an inverse order. This way, a good reversible data hiding performance is achieved. EXISTING SYSTEM: GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:[email protected]
  • 2. A data-hider can also employ histogram modification mechanism to realize reversible data hiding. In the host image is divided into blocks sized 4 ×4, 8 ×8, or 16 ×16, and gray values are mapped to a circle. After pseudo-randomly segmenting each block into two sub-regions, rotation of the histograms of the two sub-regions on this circle is used to embed one bit in each block. On the receiving side, the original block can be recovered from a marked image in an inverse process. Payload of this method is low since each block can only carry one bit. Based on this method, a robust lossless data hiding scheme is proposed, which can be used for semi- fragile image authentication. A typical HM method presented for utilizes the zero and peak points of the histogram of an image and slightly modifies the pixel grayscale values to embed data into the image. In binary tree structure is used to eliminate the requirement to communicate pairs of peak and zero points to the recipient, and a histogram shifting technique is adopted to prevent overflow and underflow. The histogram modification mechanism can also be implemented in the difference between sub-sampled images and the prediction error of host pixels and several good prediction approaches have been introduced to improve the performance of reversible data hiding. DISADVANTAGES OF EXISTING SYSTEM:  In these reversible data hiding methods, a spare place can always be made available to accommodate secret data as long as the chosen item is compressible, but the capacities are not very high.  Payload of this method is low since each block can only carry one bit. PROPOSED SYSTEM: In this paper, we will find the optimal rule of value modification under a payload-distortion criterion. By maximizing a target function using iterative algorithm, an optimal value transfer matrix can be obtained. Furthermore, we design a practical reversible data hiding scheme, in which the estimation errors of host pixels are used to accommodate the secret data and their
  • 3. values are modified according to the optimal value transfer matrix. This way, a good payload- distortion performance can be achieved ADVANTAGES OF PROPOSED SYSTEM:  A smarter prediction method is exploited to make the estimation errors closer to zero, a better performance can be achieved, but the computation complexity due to the prediction will be higher.  The payload-distortion performance of the proposed scheme is excellent.  The host image is divided into a number of subsets and the auxiliary information of a subset is always embedded into the estimation errors in the next subset. This way, one can successfully extract the embedded secret data and recover the original content in the subsets with an inverse order. SYSTEM CONFIGURATION:- HARDWARE REQUIREMENTS:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA
  • 4. SOFTWARE REQUIREMENTS: • Operating system : - Windows XP. • Coding Language : C#.Net REFERENCE: Xinpeng Zhang, Member, IEEE “Reversible Data Hiding With Optimal Value Transfer” IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 15, NO. 2, FEBRUARY 2013.