View
83
Download
1
Embed Size (px)
Citation preview
SECRET DATA HIDING IN ENCRYPTED
COMPRESSED VIDEO BITSTREAMS FOR PRIVACY
INFO PROTECTION
presented by,
Pradeep Rajagopalan
Easwari Engineering College, Anna University
Chennai
Introduction
Need For Video Encryption or steganography: The primary need for this type of encryption is to send a secret
message from one place to another without getting hacked.
Video encryption is more secured than image encryption
because its difficult to find on which frame the secret data is
hidden
Applications: Copyright Protection
Medical and Surveillance systems
Multimedia Security
Proposed Model
In this paper, A novel scheme of data hiding in the compressed
version of H.264/AVC videos is presented, which includes
three parts:
• H.264/AVC video encoding and secret message encryption.
• Data embedding
• Data extraction
The content owner encrypts the original H.264/AVC video
stream using standard stream ciphers with encryption keys to
produce an encrypted video stream
After the compression process the encoded bit streams are
going to encrypted using chaos encryption method.
Proposed Model
Then, the data-hider (e.g., a cloud server) can embed the additional
data into the encrypted video stream by using bit wrapping method,
without knowing the original video content.
At the receiver end, the hidden data extraction can be accomplished
either in encrypted or in decrypted version.
Secret Message Encryption
In this section, We will see how a Secret Message is
encrypted.
Symmetric-key algorithms are a class
of algorithms for cryptography that use the
same cryptographic keys for both encryption
of plaintext and decryption of ciphertext.
In this paper I have used Chaotic Encryption technique
which is an example of Symmetric Keying .
Secret Message Encryption
Chaos Encryption:
This method is one of the advanced encryption standard to
encrypt the message for secure transmission.
It encrypts the original secret message’s ASCII values with
encryption key value generated from chaotic sequence with
threshold function by bitxor operation
Here logistic map is used for generation of chaotic map sequence.
It is very useful to transmit the secret message through insecure
channel securely which prevents data hacking.
Secret Message Encryption Flow
Secret message
Initiate Constant factors (u,x)
Chaotic Sequence Generation
Threshold function
Bit XOR
Encrypted Secret
message
Xn+1 = u*x(1-x)
(I/255)< Xn+1 < (I+1)/255
Eij = Pij (bitxor) I
H.264 Coding
H.264 coder is based on multiscale 2D DWT and exploits the
self-similarity across scales by using set partitioning.
After transformation, the coefficients are ordered into a tree
structure, called spatial orientation tree (SOT).
The SOT is defined by each wavelet coefficient (parent) in a
certain decomposition scale has either no child (i.e., tree
leave) or four children in the next finer scale and the
coefficients in the low-frequency subband are the tree roots.
The coefficients are quantized by partitioning them into
different set likes significant information and insignificant
informations and performs the priority based transmission.
Continues…
• The algorithm is based on 3 concepts
Ordered bit plane progressive transmission.
Set sorting algorithm.
Spatial orientation trees
In a practical implementation the significance
information is stored in three ordered lists
LIS-list of insignificant sets
LIP-list of insignificant pixels
LSP-list of significant pixels
Set Partitioning Sorting Algorithm
The sorting algorithm divides the set of pixels
into partitioning subsets Tm and performs the
significance test by using the function
Sn(T) =
1, max{ (i, j) € T | |Ci, j| > 2n }
0, otherwise
• n is the # of pass
Examples
Encoder---First Pass
6
4 -3
-2 0
26
7-7
13 10
6 4
4 -4
2 -2
InitializationChose T0 = 2└log226┘= 16; (n = 4)LIP = { } LSP = { }LIS = { }
1. Process LSPSn(0,0) 26 ≥ T0, we transmit 1; 26 > 0, we transmit 0;Then move (0,0) to LSP and magnitude will be checked (+ve=0;-ve=1),therefore Sn(0,0)=1 0.Sn(0,1), Sn(1,0), Sn(1,1) are insignificant, transmit three 0;
2. Process LISSn( D(0,1) ) 13, 10, 6, 4 < T0, we transmit 0;Sn( D(1,1) ), Sn( D(1,0) ) are insignificant, transmit two 0;
3. Needn’t to process LSP (because LSP = NULL)4. Update:
The transmitted bit stream 10000000 (8 bits)LIP = { (0,1), (1,0), (1,1) }LIS = { D(0,1), D(1,0), D(1,1) }LSP = { (0,0) }
Data Embedding
Adaptive LSB Embedding:
A 8-bit gray scale image matrix consisting m × n pixels and a
secret message consisting of k bits.
The first bit of message is embedded into the LSB of the first
pixel and the second bit of message is embedded into the second
pixel and so on.
The resultant Stego-frame which holds the secret message is also
a 8-bit gray scale image and difference between the cover frame
and the Stego-frame is not visually perceptible.
The quality of the frame, however degrades with the increase in
number of LSBs.
This hiding process will introduce the error between input and
output frame and it is determined by mean square error and Peak
signal to noise ratio determines the image quality.
Algorithm Flow
Decomposed Frame
Select reserved Coefficient from High freq bands
Message bits – 00110110
Coefficient- 00011010
Pay load-3 bits per pixel
Coefficient before embedding
– 00011000
After LSB Replacement,
The coefficient will be
00011001Inverse TransformStego Frame
Secret Data
Data Extraction
At this stage, frame and secret hidden text messages are
extracted from stego encrypted image. The secret data can be
extracted from the embedded image with help of key matrix.
This extraction process is opposite to data embedding, pixel
coefficient and embedding rate are used here to extraction of
data.
Finally, Extracted secret text data is in the form of cipher
text and then convert into plain text using chaos decryption
process.
Adaptive LSBs Extraction
A 8-bit gray scale image matrix consisting m × n pixels and a
secret message consisting of k bits.
The first bit of message is extracted from the LSB of the first
high frequency coefficients and the second some bits of
message is extracted from the second reserves coefficients and
so on.
This process is repeated upto all secret message bits are
retrieved and these bits are grouped into 8bits to form a
character values.
The extraction of desired payload number of bits will be
performed by using logical bitwise operators called ‘bitand’
and ‘bitor’.
Finally all extracted message characters are applied to Chaos
decryption module to decrypt the data.
Secret Message Decryption
Chaos Decryption
This method is one of the advanced encryption standard to
encrypt/decrypt the image for secure transmission.
It decrypts the encrypted secret message ASCII values with
decryption key value generated from chaotic sequence with
threshold function by bitxor operation
Here logistic map is used for generation of chaotic map
sequence.
Secret message Decryption Flow
Encrypted secret message
Initiate Constant factors
Chaotic Sequence Generation
Threshold function
Bit XOR
Decrypted secret message
x = u*x(1-x)
(D/255)< x < (D+1)/255
Dij = Eij(bitxor)D
u = 3.9999x = 0.43125
Performance analysis
The performance of the technique will be
evaluated by,
Mean Square Error
Peak signal to noise Ratio
Correlation coefficient
Parameters:
Correlation Coefficient: It is used to find the similarity
between two different frames with their intensities. It will
be described by,
Cor_coef = [sum(sum(u1.*u2))] /
[sqrt(sum(sum(u1.*u1))*sum(sum(u2.*u2)))];
Where, u1 = F1 – mean of F1, u2 = F2 – mean of F2
F1 – Cover Frame and F2 – Encrypted Frame
Continues….
PSNR (Peak Signal to Noise Ratio)
MSE (Mean Square Error)
Where,
M,N are Number of Rows and Columns
aij – Input Image and bij –Embedded Image
Sample Text Encryption and Recovery
Input Text : hjfkdltige
Cipher Text : Mâejn4'
Decryption Text : hjfkdltige
Performance Metrics:
Mean Square Error: 0.0062
Peak Signal to Noise Ratio: 70.1890 dB
Correlation: -6.8914e-004
Elapsed time: 5.2649 Sec
Advantages
• It avoids the leaks of video content in storage of clouds
• Reduced time consumption process
• It is useful to perceive video tampering
• Better compatible system for people privacy protection
Recap
• The paper presented that protection of Video quality and
hidden data during transmission based on approach of
H.264 encoding and chaotic crypto system with bit
wrapping based data concealment
• h.264 encoding method is used for compress the video
frames effectively and chaos encryption was used as to
protect image contents
• The same method is used at the receivers end in order to
retrive the secret message back.