SlideShare a Scribd company logo
1 of 38
DATA HIDING USING
IMAGE INTERPOLATION
INTRODUCTION
Interpolation is the process of determining the
values of a function at positions lying between
its samples.
 It achieves this process by fitting a continuous
function through the discrete input samples.
 This permits input values to be evaluated at
arbitrary positions in the input, not just those
defined at the sample points.
Image interpolation occurs in all digital photos at
some stage whether this be in bayer
demosaicing or in photo enlargement.
It happens anytime you resize or remap (distort)
your image from one pixel grid to another.
 Image resizing is necessary when you need to
increase or decrease the total number of pixels,
whereas remapping can occur under a wider
variety of scenarios: correcting for lens distortion,
changing perspective, and rotating an image.
CONCEPT
Interpolation works by using known data to
estimate values at unknown points.
 For example: if you wanted to know the
temperature at noon, but only measured it at 11AM
and 1PM, you could estimate its value by
performing a linear interpolation:
If you had an additional measurement at 11:30AM,
you could see that the bulk of the temperature rise
occurred before noon, and could use this
additional data point to perform a quadratic
interpolation:
IMAGE RESIZE EXAMPLE
Original
183%
2d interpolation
before after No
interpolation
Unlike air temperature fluctuations and the ideal
gradient above, pixel values can change far more
abruptly from one location to the next.
 As with the temperature example, the more you
know about the surrounding pixels, the better the
interpolation will become.
IMAGE ROTATION EXAMPLE
Interpolation also occurs each time you rotate or
distort an image.
The previous example was misleading because it is
one which interpolators are particularly good at.
This next example shows how image detail can be
lost quite rapidly:
ORIGINAL
45° rotation
90°
Rotation
(Lossless)
2 X 45°
Rotatio
ns
6 X 15°
Rotations
The 90° rotation is lossless because no pixel ever has
to be repositioned onto the border between two
pixels (and therefore divided).
Note how most of the detail is lost in just the first
rotation, although the image continues to
deteriorate with successive rotations.
 The above results use what is called a "bicubic"
algorithm, and show significant deterioration. .
TYPES OF INTERPOLATION ALGORITHMS
Common interpolation algorithms can be grouped
into two categories:
adaptive and non-adaptive.
Adaptive methods change depending on what
they are interpolating (sharp edges vs. smooth
texture).
 whereas non-adaptive methods treat all pixels
equally.
Non-adaptive algorithms include: nearest neighbor,
bilinear, bicubic, spline, sinc, lanczos and others.
Depending on their complexity, these use
anywhere from 0 to 256 (or more) adjacent pixels
when interpolating.
The more adjacent pixels they include, the more
accurate they can become, but this comes at the
expense of much longer processing time.
Adaptive algorithms include many proprietary
algorithms in licensed software such as:
Qimage, PhotoZoom Pro, Genuine Fractals and
others. Many of these apply a different version of
their algorithm (on a pixel-by-pixel basis).
NEAREST NEIGHBOR INTERPOLATION
Nearest neighbor is the most basic and requires the
least processing time of all the interpolation
algorithms because it only considers one pixel —
the closest one to the interpolated point.
This has the effect of simply making each pixel
bigger. It suffers from aliasing effects on enlarging or
reducing images.
BILINEAR INTERPOLATION
Bilinear interpolation considers the closest 2x2
neighborhood of known pixel values surrounding
the unknown pixel.
 It then takes a weighted average of these 4 pixels
to arrive at its final interpolated value. This results in
much smoother looking images than nearest
neighbor.
But blurr & it requires 3-4 times higher computation.
The above diagram is for a case when all known pixel
distances are equal, so the interpolated value is simply
their sum divided by four.
BICUBIC INTERPOLATION
Bicubic goes one step beyond bilinear by
considering the closest 4x4 neighborhood of known
pixels — for a total of 16 pixels.
 Since these are at various distances from the
unknown pixel, closer pixels are given a higher
weighting in the calculation.
Bicubic produces noticeably sharper images than
the previous two methods, and is perhaps the ideal
combination of processing time and output quality.
For this reason it is a standard in many image
editing programs (including Adobe Photoshop),
printer drivers and in-camera interpolation.
Example bicubic :
NEIGHBOR MEAN INTERPOLATION
Proposed by jung and yoo in 2009.
It uses neighboring pixel values to calculate the
mean and then the calculated mean value is
inserted in to a pixel that has not been allocated
yet.
Complexity is high when number of referenced
pixel is higher.
On the pixel p(i,j) the output pixel p’(i,j) is defined
as:
where p(i,j) denotes the pixel in original image and
m,n=0,1..127 and K is Scaling factor usually assigned
2.












otherwise)/3,)1,('),1('1)-j1,-(p(i
n2j1,m2iifj))/2,,1(ip'j)1,-(i(p'
1n2jm,2iif))/2,1j(i,p'1)-j(i,(p'
n2jm,2iifj),p(i,
j)(i,p'
jipjip
The proposed neighbor mean interpolation
46 112
210 90
46 79 112
128 84 101
210 150 90
84)/312879(46(1,1)p'
128210)/2(46(1,0)p'
79112)/246((0,1)p'
46p(0,0)(0,0)p'




interpolation












otherwise)/3,)1,('),1('1)-j1,-(p(i
n2j1,m2iifj))/2,,1(ip'j)1,-(i(p'
1n2jm,2iif))/2,1j(i,p'1)-j(i,(p'
n2jm,2iifj),p(i,
j)(i,p'
jipjip
Neighbor Mean Interpolation
the neighbor mean interpolation is similar to bilinear interpolation,
but this method has less blurring and greater image resolution.
DATA HIDING
 Data hiding conceals the existence of secret data
while cryptography protects the contents of message.
 Message may be scattered randomly throughout
cover image or straight inserted.
 Methods : LSB insertion, Masking, Filtering,
Transformations , Reversible data hiding
PROPOSED DATA HIDING METHOD
This method utilizes the resulting images(cover) of
the neighbor mean interpolation method.
The sequence of data hiding can be zig-zag ,left to
right and upper to down direction.
Before Secret data is embedded the host image is
partitioned in to four-pixel, non overlapping,
consecutive blocks by zig–zag scanning as shown
below :
For every four non-overlapping consecutive pixel
values i.e., p(i,j) p(i+1,j) p(i,j+1) and p(i+1,j+1), the
corresponding stego image pixel values are p’(i,j)
p’(i+1,j) p’(i,j+1) and p’(i+1,j+1) respectively.
Here we have embed data in to three pixel except
for p(i,j) pixel.
STEPS INVOLVED IN DATA HIDING :
1. First we get a scaling up image by using neighbor
mean interpolation method.
Then for every four non overlapping consecutive
pixel values a difference value d is calculated as:
 d = p’(K . x +β, K .y +δ ) − p’(K .x , K .y)
Where 0≤x, y≤127 β, δ value is 0 or 1, respectively.
The number of bits, say n, which can be embedded
in this pixel, is calculated by
N = ln|d|.
A sub stream with n bits in the embedding data is
selected and converted to integer value b. Then, a
stego image pixel p′’(i,j) is computed as follows.
p’’(i,j) = p’(i,j) + b.
DATA EXTRACTION PROCESS :
1. In the extraction process the stego image is also
partitioned in to 2 x 2 non overlapping
consecutive blocks
2. Then b is calculated as follows :
Where x,y=0,1,..127 and k is defined as two .
. After the secret data is extracted we can convert
value of b to be a binary form and concatenate to
the secret bit stream.
Proposed data hiding method :
EXAMPLE :
46 112
210 90
46 79 112
128 84 101
210 150 90
84)/312879(46(1,1)p'
128210)/2(46(1,0)p'
79112)/246((0,1)p'
46p(0,0)(0,0)p'




interpolation












otherwise)/3,)1,('),1('1)-j1,-(p(i
n2j1,m2iifj))/2,,1(ip'j)1,-(i(p'
1n2jm,2iif))/2,1j(i,p'1)-j(i,(p'
n2jm,2iifj),p(i,
j)(i,p'
jipjip
Neighbor Mean Interpolation
EMBEDDING OF SECRET BIT :
46 79 112
128 84 101
210 150 90
46 98 112
150 89 101
210 150 90
 
 
 


















538log
682log
533log
384684
8246128
3346-79
d
2
2
2
n
Embed secret bit
Cover image Stego image









5)00101(
22)010110(
19(10011)
b
2
2
2
89584(1,1)p'
15022128(1,0)p'
981979(0,1)p'



20001011001101011BitsSecret 
d = p’(K . x +β, K .y +δ ) − p’(K .x , K .y)
 
 
 








2
2
2
)00101(5210)/3112(4689
)010110(22210)/2(46150
)10011(19112)/2(46-98
b
 
 
 


















538log
682log
533log
384684
8246128
3346-79
d
2
2
2
n
46 98 112
150 89 101
210 150 90
46 79 112
128 84 101
210 150 90
Stego image Cover image
Recover
Extract
20001011001101011BitsSecret 
RECOVERY OF SECRET DATA
IMPROVED DATA HIDING METHOD
Proposed in 2011 seventh international conference
on Intelligent information hiding and multimedia
signal processing.
The weakness of jung and yoo’s method is that
pixel extended from the original image have to be
recomputed before extracting the secret data.
The algorithm of the new proposed method is as
follows :
1. Utilize the neighbor mean interpolation to create
a cover image.
2. Divide the cover image from left to right, top to
down, to form 2x2 non-overlapping blocks.
3. In each block, pixels p(i,j), p(i,j+1), p(i+1,j) and
p(i+1,j+1) are renamed as p0, p1, p2, p3, respectively.
Then, we made these four pixels into three groups(p0,
p1), (p0, p2), and (p0, p3).The differences di =pi-p0,
i=1, 2, 3. The capacity ni of the pixel pairs are
computed by eq :
4 Selecting the number of bits from the secret bit
stream and then convert it to decimal form b. the
new difference is computed by
5. The corresponding pixel are
computed by equation :
6.Repeat steps 3-5 in predefined order, top to down
and left to right, until all secret data is embedded or
blocks are exhausted.
EXTRACTING THE DATA :
Apply the hiding algorithm step 2 and 3 to the
stego image we can get new difference and
number of bits embedded with in the
pixel.
Then the secret data can be extracted using the
eq.
According to the number of bits embedded
the extracted secret data b can be translated to
the binary digit which became a part of the secret
data stream.
REFERENCES :
•http://en.wikipedia.org/wiki/Information_hiding
•http://www.sciencedirect.com/science/article/pii/S092548908000846
•http:// http://en.wikipedia.org/wiki/Bicubic_interpolation
•http:// http://en.wikipedia.org/wiki/image_interpolation
•http://en.wikipedia.org/wiki/Image_processing
Data hiding using image interpolation

More Related Content

What's hot

Real-time object detection coz YOLO!
Real-time object detection coz YOLO!Real-time object detection coz YOLO!
Real-time object detection coz YOLO!J On The Beach
 
Intro to scan conversion
Intro to scan conversionIntro to scan conversion
Intro to scan conversionMohd Arif
 
Object detection presentation
Object detection presentationObject detection presentation
Object detection presentationAshwinBicholiya
 
AGE AND GENDER DETECTION.pptx
AGE AND GENDER DETECTION.pptxAGE AND GENDER DETECTION.pptx
AGE AND GENDER DETECTION.pptxssuserb4a9ba
 
Intensity Transformation
Intensity TransformationIntensity Transformation
Intensity TransformationAmnaakhaan
 
Visible surface detection in computer graphic
Visible surface detection in computer graphicVisible surface detection in computer graphic
Visible surface detection in computer graphicanku2266
 
morphological image processing
morphological image processingmorphological image processing
morphological image processingAnubhav Kumar
 
Object Detection Methods using Deep Learning
Object Detection Methods using Deep LearningObject Detection Methods using Deep Learning
Object Detection Methods using Deep LearningSungjoon Choi
 
Introduction to object detection
Introduction to object detectionIntroduction to object detection
Introduction to object detectionBrodmann17
 
Deep learning for image video processing
Deep learning for image video processingDeep learning for image video processing
Deep learning for image video processingYu Huang
 
Digital Image Processing: Image Segmentation
Digital Image Processing: Image SegmentationDigital Image Processing: Image Segmentation
Digital Image Processing: Image SegmentationMostafa G. M. Mostafa
 
Neural Radiance Fields & Neural Rendering.pdf
Neural Radiance Fields & Neural Rendering.pdfNeural Radiance Fields & Neural Rendering.pdf
Neural Radiance Fields & Neural Rendering.pdfNavneetPaul2
 
5 spatial filtering p1
5 spatial filtering p15 spatial filtering p1
5 spatial filtering p1Gichelle Amon
 

What's hot (20)

Illumination Models & Shading
Illumination Models & ShadingIllumination Models & Shading
Illumination Models & Shading
 
Real-time object detection coz YOLO!
Real-time object detection coz YOLO!Real-time object detection coz YOLO!
Real-time object detection coz YOLO!
 
Intro to scan conversion
Intro to scan conversionIntro to scan conversion
Intro to scan conversion
 
Object detection presentation
Object detection presentationObject detection presentation
Object detection presentation
 
AGE AND GENDER DETECTION.pptx
AGE AND GENDER DETECTION.pptxAGE AND GENDER DETECTION.pptx
AGE AND GENDER DETECTION.pptx
 
Intensity Transformation
Intensity TransformationIntensity Transformation
Intensity Transformation
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 
Spatial domain and filtering
Spatial domain and filteringSpatial domain and filtering
Spatial domain and filtering
 
Visible surface detection in computer graphic
Visible surface detection in computer graphicVisible surface detection in computer graphic
Visible surface detection in computer graphic
 
cnn ppt.pptx
cnn ppt.pptxcnn ppt.pptx
cnn ppt.pptx
 
morphological image processing
morphological image processingmorphological image processing
morphological image processing
 
Global illumination
Global illuminationGlobal illumination
Global illumination
 
Object detection
Object detectionObject detection
Object detection
 
Object Detection Methods using Deep Learning
Object Detection Methods using Deep LearningObject Detection Methods using Deep Learning
Object Detection Methods using Deep Learning
 
Introduction to object detection
Introduction to object detectionIntroduction to object detection
Introduction to object detection
 
Deep learning for image video processing
Deep learning for image video processingDeep learning for image video processing
Deep learning for image video processing
 
Digital Image Processing: Image Segmentation
Digital Image Processing: Image SegmentationDigital Image Processing: Image Segmentation
Digital Image Processing: Image Segmentation
 
Neural Radiance Fields & Neural Rendering.pdf
Neural Radiance Fields & Neural Rendering.pdfNeural Radiance Fields & Neural Rendering.pdf
Neural Radiance Fields & Neural Rendering.pdf
 
5 spatial filtering p1
5 spatial filtering p15 spatial filtering p1
5 spatial filtering p1
 
Computer Vision
Computer VisionComputer Vision
Computer Vision
 

Viewers also liked

Image Interpolation Techniques with Optical and Digital Zoom Concepts
Image Interpolation Techniques with Optical and Digital Zoom ConceptsImage Interpolation Techniques with Optical and Digital Zoom Concepts
Image Interpolation Techniques with Optical and Digital Zoom Conceptsmmjalbiaty
 
Image interpolation
Image interpolationImage interpolation
Image interpolationKokuiSai
 
Interpolation and extrapolation
Interpolation and extrapolationInterpolation and extrapolation
Interpolation and extrapolationAswin Pv
 
Image Interpolation Techniques with Optical and Digital Zoom Concepts -semina...
Image Interpolation Techniques with Optical and Digital Zoom Concepts -semina...Image Interpolation Techniques with Optical and Digital Zoom Concepts -semina...
Image Interpolation Techniques with Optical and Digital Zoom Concepts -semina...mmjalbiaty
 
Effective Pixel Interpolation for Image Super Resolution
Effective Pixel Interpolation for Image Super ResolutionEffective Pixel Interpolation for Image Super Resolution
Effective Pixel Interpolation for Image Super ResolutionIOSR Journals
 
A Survey on Video Watermarking Technologies based on Copyright Protection and...
A Survey on Video Watermarking Technologies based on Copyright Protection and...A Survey on Video Watermarking Technologies based on Copyright Protection and...
A Survey on Video Watermarking Technologies based on Copyright Protection and...Editor IJCATR
 
A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...
A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...
A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...Shalu Singh
 
iNEDI - Accuracy Improvements and Artifacts Removal in Edge Based Image Inter...
iNEDI - Accuracy Improvements and Artifacts Removal in Edge Based Image Inter...iNEDI - Accuracy Improvements and Artifacts Removal in Edge Based Image Inter...
iNEDI - Accuracy Improvements and Artifacts Removal in Edge Based Image Inter...Tecnick.com LTD
 
Digital Image Watermarking
Digital Image WatermarkingDigital Image Watermarking
Digital Image WatermarkingPralin Pavithran
 
Interpolation 2013
Interpolation 2013Interpolation 2013
Interpolation 2013Atiqa khan
 
Report medical image processing image slice interpolation and noise removal i...
Report medical image processing image slice interpolation and noise removal i...Report medical image processing image slice interpolation and noise removal i...
Report medical image processing image slice interpolation and noise removal i...Shashank
 
Digital image watermarking
Digital image watermarkingDigital image watermarking
Digital image watermarkingJasni Zain
 
Reversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionReversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionPapitha Velumani
 
Data Hiding Techniques
Data Hiding TechniquesData Hiding Techniques
Data Hiding Techniquesprashant3535
 
Interpolation
InterpolationInterpolation
Interpolationmbhuiya6
 
Binary to grey code conversion
Binary to grey code conversionBinary to grey code conversion
Binary to grey code conversionSunny
 
Digital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesDigital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesPrashant Singh
 
Image processing fundamentals
Image processing fundamentalsImage processing fundamentals
Image processing fundamentalsA B Shinde
 

Viewers also liked (20)

Image Interpolation Techniques with Optical and Digital Zoom Concepts
Image Interpolation Techniques with Optical and Digital Zoom ConceptsImage Interpolation Techniques with Optical and Digital Zoom Concepts
Image Interpolation Techniques with Optical and Digital Zoom Concepts
 
Image interpolation
Image interpolationImage interpolation
Image interpolation
 
Image Interpolation
Image InterpolationImage Interpolation
Image Interpolation
 
Interpolation and extrapolation
Interpolation and extrapolationInterpolation and extrapolation
Interpolation and extrapolation
 
Image Interpolation Techniques with Optical and Digital Zoom Concepts -semina...
Image Interpolation Techniques with Optical and Digital Zoom Concepts -semina...Image Interpolation Techniques with Optical and Digital Zoom Concepts -semina...
Image Interpolation Techniques with Optical and Digital Zoom Concepts -semina...
 
Effective Pixel Interpolation for Image Super Resolution
Effective Pixel Interpolation for Image Super ResolutionEffective Pixel Interpolation for Image Super Resolution
Effective Pixel Interpolation for Image Super Resolution
 
A Survey on Video Watermarking Technologies based on Copyright Protection and...
A Survey on Video Watermarking Technologies based on Copyright Protection and...A Survey on Video Watermarking Technologies based on Copyright Protection and...
A Survey on Video Watermarking Technologies based on Copyright Protection and...
 
A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...
A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...
A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...
 
iNEDI - Accuracy Improvements and Artifacts Removal in Edge Based Image Inter...
iNEDI - Accuracy Improvements and Artifacts Removal in Edge Based Image Inter...iNEDI - Accuracy Improvements and Artifacts Removal in Edge Based Image Inter...
iNEDI - Accuracy Improvements and Artifacts Removal in Edge Based Image Inter...
 
Digital Image Watermarking
Digital Image WatermarkingDigital Image Watermarking
Digital Image Watermarking
 
Interpolation 2013
Interpolation 2013Interpolation 2013
Interpolation 2013
 
Digital Image Fundamentals - II
Digital Image Fundamentals - IIDigital Image Fundamentals - II
Digital Image Fundamentals - II
 
Report medical image processing image slice interpolation and noise removal i...
Report medical image processing image slice interpolation and noise removal i...Report medical image processing image slice interpolation and noise removal i...
Report medical image processing image slice interpolation and noise removal i...
 
Digital image watermarking
Digital image watermarkingDigital image watermarking
Digital image watermarking
 
Reversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionReversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryption
 
Data Hiding Techniques
Data Hiding TechniquesData Hiding Techniques
Data Hiding Techniques
 
Interpolation
InterpolationInterpolation
Interpolation
 
Binary to grey code conversion
Binary to grey code conversionBinary to grey code conversion
Binary to grey code conversion
 
Digital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesDigital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) Images
 
Image processing fundamentals
Image processing fundamentalsImage processing fundamentals
Image processing fundamentals
 

Similar to Data hiding using image interpolation

Digital image forgery detection
Digital image forgery detectionDigital image forgery detection
Digital image forgery detectionAB Rizvi
 
Performance analysis of high resolution images using interpolation techniques...
Performance analysis of high resolution images using interpolation techniques...Performance analysis of high resolution images using interpolation techniques...
Performance analysis of high resolution images using interpolation techniques...sipij
 
Reversible image data hiding with contrast enhancement
Reversible image data hiding with contrast enhancementReversible image data hiding with contrast enhancement
Reversible image data hiding with contrast enhancementredpel dot com
 
ee8220_project_W2013_v5
ee8220_project_W2013_v5ee8220_project_W2013_v5
ee8220_project_W2013_v5Farhad Gholami
 
Denoising Process Based on Arbitrarily Shaped Windows
Denoising Process Based on Arbitrarily Shaped WindowsDenoising Process Based on Arbitrarily Shaped Windows
Denoising Process Based on Arbitrarily Shaped WindowsCSCJournals
 
Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement
Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement  Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement
Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement ijsc
 
Performance analysis of transformation and bogdonov chaotic substitution base...
Performance analysis of transformation and bogdonov chaotic substitution base...Performance analysis of transformation and bogdonov chaotic substitution base...
Performance analysis of transformation and bogdonov chaotic substitution base...IJECEIAES
 
Translation Invariance (TI) based Novel Approach for better De-noising of Dig...
Translation Invariance (TI) based Novel Approach for better De-noising of Dig...Translation Invariance (TI) based Novel Approach for better De-noising of Dig...
Translation Invariance (TI) based Novel Approach for better De-noising of Dig...IRJET Journal
 
Multimedia image compression standards
Multimedia image compression standardsMultimedia image compression standards
Multimedia image compression standardsMazin Alwaaly
 
SinGAN for Image Denoising
SinGAN for Image DenoisingSinGAN for Image Denoising
SinGAN for Image DenoisingKhalilBergaoui
 
Image Denoising by using Modified SGHP Algorithm
Image Denoising by using Modified SGHP Algorithm Image Denoising by using Modified SGHP Algorithm
Image Denoising by using Modified SGHP Algorithm IJECEIAES
 
ANALYSIS OF IMAGE ENHANCEMENT TECHNIQUES USING MATLAB
ANALYSIS OF IMAGE ENHANCEMENT TECHNIQUES USING MATLABANALYSIS OF IMAGE ENHANCEMENT TECHNIQUES USING MATLAB
ANALYSIS OF IMAGE ENHANCEMENT TECHNIQUES USING MATLABJim Jimenez
 
A PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKING
A PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKINGA PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKING
A PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKINGIRJET Journal
 
Contrast enhancement using various statistical operations and neighborhood pr...
Contrast enhancement using various statistical operations and neighborhood pr...Contrast enhancement using various statistical operations and neighborhood pr...
Contrast enhancement using various statistical operations and neighborhood pr...sipij
 
Interpolation Technique using Non Linear Partial Differential Equation with E...
Interpolation Technique using Non Linear Partial Differential Equation with E...Interpolation Technique using Non Linear Partial Differential Equation with E...
Interpolation Technique using Non Linear Partial Differential Equation with E...CSCJournals
 

Similar to Data hiding using image interpolation (20)

Digital image forgery detection
Digital image forgery detectionDigital image forgery detection
Digital image forgery detection
 
Performance analysis of high resolution images using interpolation techniques...
Performance analysis of high resolution images using interpolation techniques...Performance analysis of high resolution images using interpolation techniques...
Performance analysis of high resolution images using interpolation techniques...
 
Reversible image data hiding with contrast enhancement
Reversible image data hiding with contrast enhancementReversible image data hiding with contrast enhancement
Reversible image data hiding with contrast enhancement
 
Digital.cc
Digital.ccDigital.cc
Digital.cc
 
ee8220_project_W2013_v5
ee8220_project_W2013_v5ee8220_project_W2013_v5
ee8220_project_W2013_v5
 
Denoising Process Based on Arbitrarily Shaped Windows
Denoising Process Based on Arbitrarily Shaped WindowsDenoising Process Based on Arbitrarily Shaped Windows
Denoising Process Based on Arbitrarily Shaped Windows
 
Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement
Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement  Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement
Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement
 
Performance analysis of transformation and bogdonov chaotic substitution base...
Performance analysis of transformation and bogdonov chaotic substitution base...Performance analysis of transformation and bogdonov chaotic substitution base...
Performance analysis of transformation and bogdonov chaotic substitution base...
 
Ijetcas14 372
Ijetcas14 372Ijetcas14 372
Ijetcas14 372
 
Segmentation
SegmentationSegmentation
Segmentation
 
Translation Invariance (TI) based Novel Approach for better De-noising of Dig...
Translation Invariance (TI) based Novel Approach for better De-noising of Dig...Translation Invariance (TI) based Novel Approach for better De-noising of Dig...
Translation Invariance (TI) based Novel Approach for better De-noising of Dig...
 
Log polar coordinates
Log polar coordinatesLog polar coordinates
Log polar coordinates
 
Multimedia image compression standards
Multimedia image compression standardsMultimedia image compression standards
Multimedia image compression standards
 
SinGAN for Image Denoising
SinGAN for Image DenoisingSinGAN for Image Denoising
SinGAN for Image Denoising
 
Image Denoising by using Modified SGHP Algorithm
Image Denoising by using Modified SGHP Algorithm Image Denoising by using Modified SGHP Algorithm
Image Denoising by using Modified SGHP Algorithm
 
B070306010
B070306010B070306010
B070306010
 
ANALYSIS OF IMAGE ENHANCEMENT TECHNIQUES USING MATLAB
ANALYSIS OF IMAGE ENHANCEMENT TECHNIQUES USING MATLABANALYSIS OF IMAGE ENHANCEMENT TECHNIQUES USING MATLAB
ANALYSIS OF IMAGE ENHANCEMENT TECHNIQUES USING MATLAB
 
A PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKING
A PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKINGA PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKING
A PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKING
 
Contrast enhancement using various statistical operations and neighborhood pr...
Contrast enhancement using various statistical operations and neighborhood pr...Contrast enhancement using various statistical operations and neighborhood pr...
Contrast enhancement using various statistical operations and neighborhood pr...
 
Interpolation Technique using Non Linear Partial Differential Equation with E...
Interpolation Technique using Non Linear Partial Differential Equation with E...Interpolation Technique using Non Linear Partial Differential Equation with E...
Interpolation Technique using Non Linear Partial Differential Equation with E...
 

More from Vikrant Arya

Variable , Array , Dictionary of swift -IOS Development - a hub for beginner
Variable , Array , Dictionary of swift -IOS Development - a hub for beginnerVariable , Array , Dictionary of swift -IOS Development - a hub for beginner
Variable , Array , Dictionary of swift -IOS Development - a hub for beginnerVikrant Arya
 
Hello World Program in xcode ,IOS Development using swift
Hello World Program in xcode ,IOS Development using swiftHello World Program in xcode ,IOS Development using swift
Hello World Program in xcode ,IOS Development using swiftVikrant Arya
 
Resume Building By Sudhir Agarwal
Resume Building By Sudhir AgarwalResume Building By Sudhir Agarwal
Resume Building By Sudhir AgarwalVikrant Arya
 
Recommendation system
Recommendation system Recommendation system
Recommendation system Vikrant Arya
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectionVikrant Arya
 
Fast and secure protocol (fasp)
Fast and secure protocol (fasp)Fast and secure protocol (fasp)
Fast and secure protocol (fasp)Vikrant Arya
 

More from Vikrant Arya (6)

Variable , Array , Dictionary of swift -IOS Development - a hub for beginner
Variable , Array , Dictionary of swift -IOS Development - a hub for beginnerVariable , Array , Dictionary of swift -IOS Development - a hub for beginner
Variable , Array , Dictionary of swift -IOS Development - a hub for beginner
 
Hello World Program in xcode ,IOS Development using swift
Hello World Program in xcode ,IOS Development using swiftHello World Program in xcode ,IOS Development using swift
Hello World Program in xcode ,IOS Development using swift
 
Resume Building By Sudhir Agarwal
Resume Building By Sudhir AgarwalResume Building By Sudhir Agarwal
Resume Building By Sudhir Agarwal
 
Recommendation system
Recommendation system Recommendation system
Recommendation system
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Fast and secure protocol (fasp)
Fast and secure protocol (fasp)Fast and secure protocol (fasp)
Fast and secure protocol (fasp)
 

Recently uploaded

THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgsaravananr517913
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdfCaalaaAbdulkerim
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfChristianCDAM
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxsiddharthjain2303
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Autonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.pptAutonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.pptbibisarnayak0
 
BSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxBSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxNiranjanYadav41
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Erbil Polytechnic University
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the weldingMuhammadUzairLiaqat
 
Crystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptxCrystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptxachiever3003
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptMadan Karki
 

Recently uploaded (20)

THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdf
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdf
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Autonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.pptAutonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.ppt
 
BSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxBSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptx
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the welding
 
Crystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptxCrystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptx
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
 

Data hiding using image interpolation

  • 1. DATA HIDING USING IMAGE INTERPOLATION
  • 2. INTRODUCTION Interpolation is the process of determining the values of a function at positions lying between its samples.  It achieves this process by fitting a continuous function through the discrete input samples.  This permits input values to be evaluated at arbitrary positions in the input, not just those defined at the sample points.
  • 3. Image interpolation occurs in all digital photos at some stage whether this be in bayer demosaicing or in photo enlargement. It happens anytime you resize or remap (distort) your image from one pixel grid to another.  Image resizing is necessary when you need to increase or decrease the total number of pixels, whereas remapping can occur under a wider variety of scenarios: correcting for lens distortion, changing perspective, and rotating an image.
  • 4. CONCEPT Interpolation works by using known data to estimate values at unknown points.  For example: if you wanted to know the temperature at noon, but only measured it at 11AM and 1PM, you could estimate its value by performing a linear interpolation:
  • 5. If you had an additional measurement at 11:30AM, you could see that the bulk of the temperature rise occurred before noon, and could use this additional data point to perform a quadratic interpolation:
  • 6. IMAGE RESIZE EXAMPLE Original 183% 2d interpolation before after No interpolation
  • 7. Unlike air temperature fluctuations and the ideal gradient above, pixel values can change far more abruptly from one location to the next.  As with the temperature example, the more you know about the surrounding pixels, the better the interpolation will become.
  • 8. IMAGE ROTATION EXAMPLE Interpolation also occurs each time you rotate or distort an image. The previous example was misleading because it is one which interpolators are particularly good at. This next example shows how image detail can be lost quite rapidly: ORIGINAL 45° rotation 90° Rotation (Lossless) 2 X 45° Rotatio ns 6 X 15° Rotations
  • 9. The 90° rotation is lossless because no pixel ever has to be repositioned onto the border between two pixels (and therefore divided). Note how most of the detail is lost in just the first rotation, although the image continues to deteriorate with successive rotations.  The above results use what is called a "bicubic" algorithm, and show significant deterioration. .
  • 10. TYPES OF INTERPOLATION ALGORITHMS Common interpolation algorithms can be grouped into two categories: adaptive and non-adaptive. Adaptive methods change depending on what they are interpolating (sharp edges vs. smooth texture).  whereas non-adaptive methods treat all pixels equally.
  • 11. Non-adaptive algorithms include: nearest neighbor, bilinear, bicubic, spline, sinc, lanczos and others. Depending on their complexity, these use anywhere from 0 to 256 (or more) adjacent pixels when interpolating. The more adjacent pixels they include, the more accurate they can become, but this comes at the expense of much longer processing time.
  • 12. Adaptive algorithms include many proprietary algorithms in licensed software such as: Qimage, PhotoZoom Pro, Genuine Fractals and others. Many of these apply a different version of their algorithm (on a pixel-by-pixel basis).
  • 13. NEAREST NEIGHBOR INTERPOLATION Nearest neighbor is the most basic and requires the least processing time of all the interpolation algorithms because it only considers one pixel — the closest one to the interpolated point. This has the effect of simply making each pixel bigger. It suffers from aliasing effects on enlarging or reducing images.
  • 14. BILINEAR INTERPOLATION Bilinear interpolation considers the closest 2x2 neighborhood of known pixel values surrounding the unknown pixel.  It then takes a weighted average of these 4 pixels to arrive at its final interpolated value. This results in much smoother looking images than nearest neighbor. But blurr & it requires 3-4 times higher computation.
  • 15. The above diagram is for a case when all known pixel distances are equal, so the interpolated value is simply their sum divided by four.
  • 16. BICUBIC INTERPOLATION Bicubic goes one step beyond bilinear by considering the closest 4x4 neighborhood of known pixels — for a total of 16 pixels.  Since these are at various distances from the unknown pixel, closer pixels are given a higher weighting in the calculation. Bicubic produces noticeably sharper images than the previous two methods, and is perhaps the ideal combination of processing time and output quality. For this reason it is a standard in many image editing programs (including Adobe Photoshop), printer drivers and in-camera interpolation.
  • 18. NEIGHBOR MEAN INTERPOLATION Proposed by jung and yoo in 2009. It uses neighboring pixel values to calculate the mean and then the calculated mean value is inserted in to a pixel that has not been allocated yet. Complexity is high when number of referenced pixel is higher.
  • 19. On the pixel p(i,j) the output pixel p’(i,j) is defined as: where p(i,j) denotes the pixel in original image and m,n=0,1..127 and K is Scaling factor usually assigned 2.             otherwise)/3,)1,('),1('1)-j1,-(p(i n2j1,m2iifj))/2,,1(ip'j)1,-(i(p' 1n2jm,2iif))/2,1j(i,p'1)-j(i,(p' n2jm,2iifj),p(i, j)(i,p' jipjip
  • 20. The proposed neighbor mean interpolation
  • 21. 46 112 210 90 46 79 112 128 84 101 210 150 90 84)/312879(46(1,1)p' 128210)/2(46(1,0)p' 79112)/246((0,1)p' 46p(0,0)(0,0)p'     interpolation             otherwise)/3,)1,('),1('1)-j1,-(p(i n2j1,m2iifj))/2,,1(ip'j)1,-(i(p' 1n2jm,2iif))/2,1j(i,p'1)-j(i,(p' n2jm,2iifj),p(i, j)(i,p' jipjip Neighbor Mean Interpolation
  • 22. the neighbor mean interpolation is similar to bilinear interpolation, but this method has less blurring and greater image resolution. DATA HIDING  Data hiding conceals the existence of secret data while cryptography protects the contents of message.  Message may be scattered randomly throughout cover image or straight inserted.  Methods : LSB insertion, Masking, Filtering, Transformations , Reversible data hiding
  • 23. PROPOSED DATA HIDING METHOD This method utilizes the resulting images(cover) of the neighbor mean interpolation method. The sequence of data hiding can be zig-zag ,left to right and upper to down direction.
  • 24. Before Secret data is embedded the host image is partitioned in to four-pixel, non overlapping, consecutive blocks by zig–zag scanning as shown below :
  • 25. For every four non-overlapping consecutive pixel values i.e., p(i,j) p(i+1,j) p(i,j+1) and p(i+1,j+1), the corresponding stego image pixel values are p’(i,j) p’(i+1,j) p’(i,j+1) and p’(i+1,j+1) respectively. Here we have embed data in to three pixel except for p(i,j) pixel. STEPS INVOLVED IN DATA HIDING : 1. First we get a scaling up image by using neighbor mean interpolation method.
  • 26. Then for every four non overlapping consecutive pixel values a difference value d is calculated as:  d = p’(K . x +β, K .y +δ ) − p’(K .x , K .y) Where 0≤x, y≤127 β, δ value is 0 or 1, respectively. The number of bits, say n, which can be embedded in this pixel, is calculated by N = ln|d|.
  • 27. A sub stream with n bits in the embedding data is selected and converted to integer value b. Then, a stego image pixel p′’(i,j) is computed as follows. p’’(i,j) = p’(i,j) + b.
  • 28. DATA EXTRACTION PROCESS : 1. In the extraction process the stego image is also partitioned in to 2 x 2 non overlapping consecutive blocks 2. Then b is calculated as follows : Where x,y=0,1,..127 and k is defined as two .
  • 29. . After the secret data is extracted we can convert value of b to be a binary form and concatenate to the secret bit stream. Proposed data hiding method :
  • 30. EXAMPLE : 46 112 210 90 46 79 112 128 84 101 210 150 90 84)/312879(46(1,1)p' 128210)/2(46(1,0)p' 79112)/246((0,1)p' 46p(0,0)(0,0)p'     interpolation             otherwise)/3,)1,('),1('1)-j1,-(p(i n2j1,m2iifj))/2,,1(ip'j)1,-(i(p' 1n2jm,2iif))/2,1j(i,p'1)-j(i,(p' n2jm,2iifj),p(i, j)(i,p' jipjip Neighbor Mean Interpolation
  • 31. EMBEDDING OF SECRET BIT : 46 79 112 128 84 101 210 150 90 46 98 112 150 89 101 210 150 90                         538log 682log 533log 384684 8246128 3346-79 d 2 2 2 n Embed secret bit Cover image Stego image          5)00101( 22)010110( 19(10011) b 2 2 2 89584(1,1)p' 15022128(1,0)p' 981979(0,1)p'    20001011001101011BitsSecret  d = p’(K . x +β, K .y +δ ) − p’(K .x , K .y)
  • 32.               2 2 2 )00101(5210)/3112(4689 )010110(22210)/2(46150 )10011(19112)/2(46-98 b                         538log 682log 533log 384684 8246128 3346-79 d 2 2 2 n 46 98 112 150 89 101 210 150 90 46 79 112 128 84 101 210 150 90 Stego image Cover image Recover Extract 20001011001101011BitsSecret  RECOVERY OF SECRET DATA
  • 33. IMPROVED DATA HIDING METHOD Proposed in 2011 seventh international conference on Intelligent information hiding and multimedia signal processing. The weakness of jung and yoo’s method is that pixel extended from the original image have to be recomputed before extracting the secret data. The algorithm of the new proposed method is as follows : 1. Utilize the neighbor mean interpolation to create a cover image. 2. Divide the cover image from left to right, top to down, to form 2x2 non-overlapping blocks.
  • 34. 3. In each block, pixels p(i,j), p(i,j+1), p(i+1,j) and p(i+1,j+1) are renamed as p0, p1, p2, p3, respectively. Then, we made these four pixels into three groups(p0, p1), (p0, p2), and (p0, p3).The differences di =pi-p0, i=1, 2, 3. The capacity ni of the pixel pairs are computed by eq : 4 Selecting the number of bits from the secret bit stream and then convert it to decimal form b. the new difference is computed by
  • 35. 5. The corresponding pixel are computed by equation : 6.Repeat steps 3-5 in predefined order, top to down and left to right, until all secret data is embedded or blocks are exhausted.
  • 36. EXTRACTING THE DATA : Apply the hiding algorithm step 2 and 3 to the stego image we can get new difference and number of bits embedded with in the pixel. Then the secret data can be extracted using the eq. According to the number of bits embedded the extracted secret data b can be translated to the binary digit which became a part of the secret data stream.