Video Stegnography Using LSB Substitution Method

Embed Size (px)

Citation preview

  • 8/10/2019 Video Stegnography Using LSB Substitution Method

    1/7

    1

    INTRODUCTION

    In simple words, Video Steganography can be defined as the art and science of invisible

    communication. This is accomplished through hiding information in other information, thus

    hiding the existence of the communicated information. Almost all digital file formats can be used

    for Video steganography, but the formats that are more suitable are those with a high degree of

    redundancy. Redundancy can be defined as the bits of an object that provide accuracy far greater

    than necessary for the objects use and display. The redundant bits of an object are those bits that

    can be altered without the alteration being detected easily. Video and audio files especially

    comply with this requirement, while research has also uncovered other file formats that can be

    used for information hiding. Videos are the most popular cover objects for Video steganography.

    In the domain of digital videos many different video file format exist, most of them for specific

    applications. For these different video file formats, different Video steganographic algorithms

    exist. Among all these file formats, the avi file format is the most popular video file format on

    the Internet, because of the small size of the video.

    Video Steganography:Video Steganography is the science of hiding information. Whereas the

    goal of cryptography is to make data unreadable by a third party, the goal of video

    steganography is to hide the data from a third party. In this article, I will discuss what video

    steganography is, what purposes it serves.

    The following formula provides a very generic description of the pieces of the video

    steganographic process:

    Cover medium + hidden data + stego key = stego medium

    In this context, the cover medium is the file in which we will hide the hidden data, which may

    also be encrypted using the stego key. The resultant file is the stego medium (which will, of

    course. be the same type of file as the cover medium). The cover mediums (and, thus, the stego

    medium) are typically video or audio files. In this article, I will focus on video files and will,

    therefore, refer to the cover video and stego video. The simplest approach to hiding data within a

    video file is called least significant bit (LSB) insertion. In this method, we can take the binary

    representation of the hidden data and overwrite the LSB of each byte within the cover video. If

  • 8/10/2019 Video Stegnography Using LSB Substitution Method

    2/7

  • 8/10/2019 Video Stegnography Using LSB Substitution Method

    3/7

    3

    Receiver Side

    Fig 2: Steganography on receiver side.

    PROBLEM FORMULATION

    1) Many Video Steganography techniques have been proposed earlier but they were not secure

    enough and can be temporarily tampered with so the task was not fulfilled.

    2) Video Steganography alone could not provide better results as technique used for videosteganography with LSB was not good enough.

    3) Results of previous PSNR obtained were poor and unsatisfactory.

    START

    Load Stego Video

    Apply LSB on Stego

    Image Obtained

    Original video obtained

    END

  • 8/10/2019 Video Stegnography Using LSB Substitution Method

    4/7

    4

    OBJECTIVES

    1) To use Video Steganography with 5LSB thus providing high security.

    2) To make more versatile even if video is tampered with our hidden message doesn't get lostand thus our purpose is fulfilled.

    3) To improve PSNR results of Video Steganography.

    METHODOLOGY

    Phase1: I develop a code for video steganography i . e . embedding purpose of the message for

    the hiding process using LSB technique.I will select a particular frame and this frame act as a cover media. In this, I embed the secretmessage into the cover media so that it cannot be detected by casual observer. For embedding. Iwill use LSB technique, this is performed on the least significant bits of the cover media.

    Phase2: The end result is the stego video.

    Phase3:After that at receiver side again I will remove again using LSB technique & find out thehidden data. Thus finally I will recover my secret message.

    Phase4: I will then finally verify my result by developing code for MSE and PSNR.

    FACILITIES REQUIRED FOR PROPOSED WORK

    MATLAB

    Matlab (Matrix laboratory) is a numerical computing environment. It is fourth generation

    programming language. MATLAB is developed by Mathworks; MATLAB allows matrixmanipulations, plotting of functions and data, implementation of algorithms, creation of user

    interfaces, and interfacing with programs written in other languages, including C, C++, and

    Java.

    The MATLAB application is built around the MATLAB language. The simplest way to execute

    MATLAB code is to type it in the command window, which is one of the elements of

  • 8/10/2019 Video Stegnography Using LSB Substitution Method

    5/7

    5

    MATLAB desktop. When code is entered in the command window, MATLAB can be used as

    an interactive mathematical shell. Sequences of commands can be saved in a text file,

    typically using the MATLAB editor, as a script or encapsulated into a function, extending the

    commands available.

    Tool Used

    Image Processing Tool.

    TIME PLAN

    1 August-15 August Research on project

    15 August-30 September Learning on MATLAB1 October-20 October Design and Implementation

    21 October -30 October Result Analysis

    APPLICATIONS OF STEGANOGRAPHY

    The interest is increasing day by day in the digital steganography. Stegnography becomes more

    important due to the exponential growth and secret communication of potential computer userson the internet. Intruders can acquire the information from the system and they can reveal the

    information to others or can read or modify the information that needs to be secure, so for this

    type of security stenography is useful.

    Steganography can be used for wide range of applications such as:

    1) Steganography is mainly used for securing the confidential information or data during

    transmission and storage. For example, one can hide a secret message in an audio file and

    transfer to another party through email instead of sending the message in the textual format.

    2) In Defence organizations, for the safety of secret data.

    3) In medical imaging, for embedding patients details within image provides protection of

    information and reduces the transmission time and cost.

    4) In online voting system for securing the online election.

  • 8/10/2019 Video Stegnography Using LSB Substitution Method

    6/7

    6

    5) In Military communications systems, for increasing use of traffic security technique, instead

    of concealing the contents of a message using encryption, conceal its sender or its receiver or its

    very existence.

    REFERENCES

    [1] N. Provos, Defending Against Statistical Steganography, Proc 10th USENEX Security

    Symposium 2005.

    [2] N. Provos and P. Honeyman, Hide and Seek: An introduction to Steganography, IEEESecurity & Privacy Journal 2003.

    [3] Tao Zhang,Yan Zhang,Xijan Ping, Detection of LSB steganographybased on image

    smoothness,IEEE ICME 2006,Pp.1377-1380.

    [4] Katzenbeisser and Petitcolas, Information Hiding Techniques for Stenography and Digitalwatermaking Artech House, Norwood, MA. 2000.

    [5] Arup kumar Bhaumik, Minkya Choi, Data hiding in video, IEEE International journal of

    data base an application, Vol.2, No.2 June 2009.pp.9-15.

    [6] S.Lyu and H. Farid, Steganography using higher order video statistics, IEEE Trans. Inf.

    Forens. Secur. 2006.

    [7] Venkatraman, s, Abraham, A. & Paprzycki M. Significance of Steganography on DataSecurity , Proceedings of the International Conference on Information Technology: Coding and

    computing, 2004,vol.9,pp. 1212-1219.

    [8] Fridrich, J. Goljan M., and Hogea, D; New Methodology for breaking stenographicTechniques for JPEGs. Electronic Imaging 2003,vol.8,pp. 3456-3462.

    [9] http:/ aakash.ece.ucsb.edu./data hiding/stegdemo.aspx.Ucsb data hiding online

    demonstration. Released on Mar .09, 2005.

    [10] Mitsugu Iwanmoto and Hirosuke Yamamoto, The Optimal n-out-of-n Visual Secret

    Sharing Scheme for GrayScale Videos, IEICE Trans. Fundamentals, vol.E85- A, No.10,October 2002, pp. 2238-2247.

    [11] Doron Shaked, Nur Arad, Andrew Fitzhugh, Irwin Sobel, Color Diffusion: Error Diffusionfor Color Halftones, HP Laboratories Israel, May 1999, vol.6, pp. 345-356.

    [12] Zhou, G.R.Arce, and G.Di Crescenzo, Halftone Visual Cryptography, IEEE Tans. On

    Video Processing, vol.15, No.8, August 2006, pp. 2441-2453.

  • 8/10/2019 Video Stegnography Using LSB Substitution Method

    7/7

    7

    [13] M.Naor and A.Shamir, Visual Cryptography, in Proceedings of Eurocrypt 1994, lecture

    notes in computer science, 1994, vol.950, pp. 1-12.

    [14] Robert Ulichney, The void-and-cluster method for dither array generation, IS&T/SPIE

    Symposium on Electronic Imaging and Science, San Jose, CA, 1993, vol.1913, pp.332-343.

    [15] E.R.Verheul and H.C.A. Van Tilborg, Constructions and properties of k out of n visual

    secret sharing scheme, Designs, Codes, and Cryptography, vol.1, no.2, 1997, pp.179-196.

    [16] Debnath Bhattacharyya, P. Das, S. Mukherjee, D. Ganguly, S.K. Bandyopadhyay, Tai-hoonKim, A Secured Technique for Image Data Hiding, Communications in Computer and

    Information Science, Springer, June, 2009, Vol. 29, pp. 151-159.