Skin Tone based Secret Data hiding in Images
#1

Skin Tone based Secret Data hiding in Images


Presented by:
B.Rajendraprasad
A.Dhileepan
V.Jayaprakash

[attachment=10449]
abstract
 Here secret data is embedded within skin region of image that will provide an excellent secure location for data hiding. For this skin tone detection is performed using HSV (Hue, Saturation and Value) color space. Additionally secret data embedding is performed using frequency domain approach - DWT (Discrete Wavelet Transform), DWT outperforms than DCT (Discrete Cosine Transform). Secret data is hidden in one of the high frequency sub-band of DWT by tracing skin pixels in that sub-band. Different steps of data hiding are applied by cropping an image interactively. Cropping results into an enhanced security than hiding data without cropping i.e. in whole image, so cropped region works as a key at decoding side. This study shows that by adopting an object oriented steganography mechanism, in the sense that, we track skin tone objects in image, we get a higher security. And also satisfactory PSNR (Peak- Signal-to-Noise Ratio) is obtained.
problem statement
Cryptography
 Cryptology prior to the modern age was almost synonymous with encryption, the conversion of information from a readable state to apparent nonsense.
 The sender retained the ability to decrypt the information and therefore avoid unwanted persons being able to read it.
problem description
The drawbacks of cryptography are frequently overlooked as well.
In medium of cryptography the encrypted form is visually see by every one. so they known the cryptography is done by there.
These unnatural messages usually attract some unintended observers’ attention
introduction
Biometrics comprises methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits.
In computer science, in particular, biometrics is used as a form of identity access management and access control.
basic theory
Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity.
The advantage of steganography, over cryptography alone, is that messages do not attract attention to themselves.
research issue
Steganographic techniques
Multimedia Security
Usage in modern printers
Alleged use by intelligence services
objective
Implementing a Steganography based Biometric feature (Skin Tone)
Embedding the data in frequency domain of image
Improving the security of hiding data
Embedding Block Diagram
Extraction Block Diagram
content
Skin Color Tone Detection
Discrete Wavelet Transform (DWT)
Embedding Process
Extraction Process
Performance of the proposed method
Skin Color Tone Detection
 The simplest way to decide whether a pixel is skin color or not is to explicitly define a boundary.
 RGB matrix of the given color image can be converted into different color spaces to yield distinguishable regions of skin or near skin tone.
 Mainly two kinds of color spaces are exploited in the literature of biometrics which are
 HSV (Hue, Saturation and Value)
 YCbCr (Yellow, Chromatic Blue, Chromatic red)
 Color space used for skin detection in this work is HSV.
 Any color image of RGB color space can be easily converted into HSV color space.
 We found that human flesh can be an approximation from a sector out of a hexagon with the constraints:
 Smin= 0.23, Smax =0.68, Hmin =0 and Hmax=50
HSV COLOR SPACE
Instinctive color characteristics such as tint, shade and tone (or family, purity and intensity) form the basis of HSV model.
The colors are defined within a hexcone, with the coordinate system being cylindrical.
The value of hue H varies from 0 to 360º.
The process for the transformation from RGB to HSV can be briefed as follows.
 [file,path] = uigetfile('*.jpg','*.png','Pick an Image File');
 a = imread(file);
 a=imresize(a,[256 256]);
 subplot(2,2,1);imshow(a,[]);

 [r c p] = size(a);
 HSV=rgb2hsv(a);
 subplot(2,2,2);imshow(HSV);
 HSV(:,:,1) = HSV(:,:,1)*360;
 h = HSV(:,:,1);
 s = HSV(:,:,2);
 v = HSV(:,:,3);
 [r c p]=size(a);
 d=zeros(r,c);
 for i=1:r;
 for j=1:c;
 if ((h(i,j)<.25)&((s(i,j)<0.68)& (s(i,j)>0.10)))
 d(i,j)=1;
 end
 end
 end
 d = medfilt2(d,[3 3]);
 subplot(2,2,3);
 imshow(d);
 title('Mask image');
 helpdlg('Skin detection is done');
OUTPUT
Reply
#2
pls give some more details about this topic
Reply
#3
Hi refer this page more details on Skin Tone based Secret Data hiding in Images

http://seminarsprojects.in/attachment.php?aid=10449
Reply
#4
can u send a detailed report about skin tone base secret data hiding in images....
Reply
#5

To get more information about the topic "Skin Tone based Secret Data hiding in Images " please refer the page link below
http://studentbank.in/report-skin-tone-b...?pid=52831
Reply
#6
seminar report on skintone based data hiding in images
Reply
#7
d=medfilt2(d,[3 3]);
is not working . showing as a undefined function
Reply
#8
abstract [/b]
 Here secret data is embedded within skin region of image that will provide an excellent secure location for data hiding. For this skin tone detection is performed using HSV (Hue, Saturation and Value) color space. Additionally secret data embedding is performed using frequency domain approach - DWT (Discrete Wavelet Transform), DWT outperforms than DCT (Discrete Cosine Transform). Secret data is hidden in one of the high frequency sub-band of DWT by tracing skin pixels in that sub-band. Different steps of data hiding are applied by cropping an image interactively. Cropping results into an enhanced security than hiding data without cropping i.e. in whole image, so cropped region works as a key at decoding side. This study shows that by adopting an object oriented steganography mechanism, in the sense that, we track skin tone objects in image, we get a higher security. And also satisfactory PSNR (Peak- Signal-to-Noise Ratio) is obtained.
problem statement
Cryptography
 Cryptology prior to the modern age was almost synonymous with encryption, the conversion of information from a readable state to apparent nonsense.
 The sender retained the ability to decrypt the information and therefore avoid unwanted persons being able to read it.
problem description
The drawbacks of cryptography are frequently overlooked as well.
In medium of cryptography the encrypted form is visually see by every one. so they known the cryptography is done by there.
These unnatural messages usually attract some unintended observers’ attention
introduction
Biometrics comprises methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits.
In computer science, in particular, biometrics is used as a form of identity access management and access control.
basic theory
Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity.
The advantage of steganography, over cryptography alone, is that messages do not attract attention to themselves.
research issue
Steganographic techniques
Multimedia Security
Usage in modern printers
Alleged use by intelligence services
objective
Implementing a Steganography based Biometric feature (Skin Tone)
Embedding the data in frequency domain of image
Improving the security of hiding data
Embedding Block Diagram
Extraction Block Diagram
content
Skin Color Tone Detection
Discrete Wavelet Transform (DWT)
Embedding Process
Extraction Process
Performance of the proposed method
Skin Color Tone Detection
 The simplest way to decide whether a pixel is skin color or not is to explicitly define a boundary.
 RGB matrix of the given color image can be converted into different color spaces to yield distinguishable regions of skin or near skin tone.
 Mainly two kinds of color spaces are exploited in the literature of biometrics which are
 HSV (Hue, Saturation and Value)
 YCbCr (Yellow, Chromatic Blue, Chromatic red)
 Color space used for skin detection in this work is HSV.
 Any color image of RGB color space can be easily converted into HSV color space.
 We found that human flesh can be an approximation from a sector out of a hexagon with the constraints:
 Smin= 0.23, Smax =0.68, Hmin =0 and Hmax=50
HSV COLOR SPACE
Instinctive color characteristics such as tint, shade and tone (or family, purity and intensity) form the basis of HSV model.
The colors are defined within a hexcone, with the coordinate system being cylindrical.
The value of hue H varies from 0 to 360º.
The process for the transformation from RGB to HSV can be briefed as follows.
 [file,path] = uigetfile('*.jpg','*.png','Pick an Image File');
 a = imread(file);
 a=imresize(a,[256 256]);
 subplot(2,2,1);imshow(a,[]);

 [r c p] = size(a);
 HSV=rgb2hsv(a);
 subplot(2,2,2);imshow(HSV);
 HSV(:,:,1) = HSV(:,:,1)*360;
 h = HSV(:,:,1);
 s = HSV(:,:,2);
 v = HSV(:,:,3);
 [r c p]=size(a);
 d=zeros(r,c);
 for i=1:r;
 for j=1:c;
 if ((h(i,j)<.25)&((s(i,j)<0.68)& (s(i,j)>0.10)))
 d(i,j)=1;
 end
 end
 end
 d = medfilt2(d,[3 3]);
 subplot(2,2,3);
 imshow(d);
 title('Mask image');
 helpdlg('Skin detection is done');
Reply
#9

To get full information or details of Skin Tone based Secret Data hiding in Images please have a look on the pages

http://studentbank.in/report-skin-tone-b...ges?page=2

http://studentbank.in/report-skin-tone-b...ges?page=3

http://studentbank.in/report-skin-tone-b...-in-images

if you again feel trouble on Skin Tone based Secret Data hiding in Images please reply in that page and ask specific fields in Skin Tone based Secret Data hiding in Images
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: secret ussd number for mtn zambia services, secret data communication through audio for defense application pdf, secret bell mini project, bingo short tone, music tone recagnization and conversion to notes project ieee paper, secret code for apple sales training, download appleu2019s secret employee training,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Block Chain and Data Science jntuworldforum 0 7,961 06-10-2018, 12:15 PM
Last Post: jntuworldforum
  DETECTION OF THE MALARIAL PARASITE INFECTED BLOOD IMAGES BY 3D-ANALYSIS project report tiger 2 2,387 26-09-2016, 10:55 AM
Last Post: ijasti
  ULTRA SONIC TECHNIQUES FOR THE DETECTION OF HIDDEN CORROSION IN AIR CRAFT WING SKIN seminar projects crazy 5 6,073 15-04-2016, 08:04 PM
Last Post: knagpur
  Data Encryption Standard (DES) seminar class 2 9,333 20-02-2016, 01:59 PM
Last Post: seminar report asees
  SEARCH IMAGES BY APPEARANCE seminar projects crazy 4 4,404 25-06-2015, 02:59 PM
Last Post: seminar report asees
  Steganography In Images (Download Seminar Report) Computer Science Clay 16 25,712 08-06-2015, 03:26 PM
Last Post: seminar report asees
Brick XML Data Compression computer science crazy 2 2,379 07-10-2014, 09:26 PM
Last Post: seminar report asees
  Data Security in Local Network using Distributed Firewalls computer science crazy 10 14,788 30-03-2014, 04:40 AM
Last Post: Guest
  GREEN CLOUD -A Data Center Approach computer topic 0 1,530 25-03-2014, 10:13 PM
Last Post: computer topic
  3D-OPTICAL DATA STORAGE TECHNOLOGY computer science crazy 3 8,502 12-09-2013, 08:28 PM
Last Post: Guest

Forum Jump: