You are on page 1of 7

1

INTRODUCTION

In simple words, Video Steganography can be defined as the art and science of invisible
communication. This is accomplished through hiding information in other information, thus
hiding the existence of the communicated information. Almost all digital file formats can be used
for Video steganography, but the formats that are more suitable are those with a high degree of
redundancy. Redundancy can be defined as the bits of an object that provide accuracy far greater
than necessary for the objects use and display. The redundant bits of an object are those bits that
can be altered without the alteration being detected easily. Video and audio files especially
comply with this requirement, while research has also uncovered other file formats that can be
used for information hiding. Videos are the most popular cover objects for Video steganography.
In the domain of digital videos many different video file format exist, most of them for specific
applications. For these different video file formats, different Video steganographic algorithms
exist. Among all these file formats, the avi file format is the most popular video file format on
the Internet, because of the small size of the video.

Video Steganography: Video Steganography is the science of hiding information. Whereas the
goal of cryptography is to make data unreadable by a third party, the goal of video
steganography is to hide the data from a third party. In this article, I will discuss what video
steganography is, what purposes it serves.
The following formula provides a very generic description of the pieces of the video
steganographic process:
Cover medium + hidden data + stego key = stego medium
In this context, the cover medium is the file in which we will hide the hidden data, which may
also be encrypted using the stego key. The resultant file is the stego medium (which will, of
course. be the same type of file as the cover medium). The cover mediums (and, thus, the stego
medium) are typically video or audio files. In this article, I will focus on video files and will,
therefore, refer to the cover video and stego video. The simplest approach to hiding data within a
video file is called least significant bit (LSB) insertion. In this method, we can take the binary
representation of the hidden data and overwrite the LSB of each byte within the cover video. If
2

we are using 24-bit color, the amount of change will be minimal and indiscernible to the human
eye.

FLOW CHART

Sender Side


















Fig 1: Steganography on the sender side





START
Load Cover Video

Load Secret Text
Apply LSB Technique
Stego Video Obtained
END
3

Receiver Side


















Fig 2: Steganography on receiver side.

PROBLEM FORMULATION

1) Many Video Steganography techniques have been proposed earlier but they were not secure
enough and can be temporarily tampered with so the task was not fulfilled.

2) Video Steganography alone could not provide better results as technique used for video
steganography with LSB was not good enough.

3) Results of previous PSNR obtained were poor and unsatisfactory.




START
Load Stego Video

Apply LSB on Stego
Image Obtained
Original video obtained
END
4

OBJECTIVES


1) To use Video Steganography with 5LSB thus providing high security.

2) To make more versatile even if video is tampered with our hidden message doesn't get lost
and thus our purpose is fulfilled.

3) To improve PSNR results of Video Steganography.



METHODOLOGY


Phase1: I develop a code for video steganography i . e . embedding purpose of the message for
the hiding process using LSB technique.
I will select a particular frame and this frame act as a cover media. In this, I embed the secret
message into the cover media so that it cannot be detected by casual observer. For embedding. I
will use LSB technique, this is performed on the least significant bits of the cover media.

Phase2: The end result is the stego video.

Phase3: After that at receiver side again I will remove again using LSB technique & find out the
hidden data. Thus finally I will recover my secret message.

Phase4: I will then finally verify my result by developing code for MSE and PSNR.



FACILITIES REQUIRED FOR PROPOSED WORK


MATLAB


Matlab (Matrix laboratory) is a numerical computing environment. It is fourth generation
programming language. MATLAB is developed by Mathworks; MATLAB allows matrix
manipulations, plotting of functions and data, implementation of algorithms, creation of user
interfaces, and interfacing with programs written in other languages, including C, C++, and
Java.
The MATLAB application is built around the MATLAB language. The simplest way to execute
MATLAB code is to type it in the command window, which is one of the elements of
5

MATLAB desktop. When code is entered in the command window, MATLAB can be used as
an interactive mathematical shell. Sequences of commands can be saved in a text file,
typically using the MATLAB editor, as a script or encapsulated into a function, extending the
commands available.

Tool Used
Image Processing Tool.


TIME PLAN

1 August-15 August Research on project
15 August-30 September Learning on MATLAB
1 October-20 October Design and Implementation
21 October -30 October Result Analysis


APPLICATIONS OF STEGANOGRAPHY

The interest is increasing day by day in the digital steganography. Stegnography becomes more
important due to the exponential growth and secret communication of potential computer users
on the internet. Intruders can acquire the information from the system and they can reveal the
information to others or can read or modify the information that needs to be secure, so for this
type of security stenography is useful.
Steganography can be used for wide range of applications such as:
1) Steganography is mainly used for securing the confidential information or data during
transmission and storage. For example, one can hide a secret message in an audio file and
transfer to another party through email instead of sending the message in the textual format.
2) In Defence organizations, for the safety of secret data.
3) In medical imaging, for embedding patients details within image provides protection of
information and reduces the transmission time and cost.
4) In online voting system for securing the online election.
6

5) In Military communications systems, for increasing use of traffic security technique, instead
of concealing the contents of a message using encryption, conceal its sender or its receiver or its
very existence.

REFERENCES


[1] N. Provos, Defending Against Statistical Steganography, Proc 10th USENEX Security
Symposium 2005.

[2] N. Provos and P. Honeyman, Hide and Seek: An introduction to Steganography, IEEE
Security & Privacy Journal 2003.

[3] Tao Zhang,Yan Zhang,Xijan Ping, Detection of LSB steganographybased on image
smoothness,IEEE ICME 2006,Pp.1377-1380.

[4] Katzenbeisser and Petitcolas, Information Hiding Techniques for Stenography and Digital
watermaking Artech House, Norwood, MA. 2000.

[5] Arup kumar Bhaumik, Minkya Choi, Data hiding in video, IEEE International journal of
data base an application, Vol.2, No.2 June 2009.pp.9-15.

[6] S.Lyu and H. Farid, Steganography using higher order video statistics, IEEE Trans. Inf.
Forens. Secur. 2006.

[7] Venkatraman, s, Abraham, A. & Paprzycki M. Significance of Steganography on Data
Security , Proceedings of the International Conference on Information Technology: Coding and
computing, 2004,vol.9,pp. 1212-1219.

[8] Fridrich, J. Goljan M., and Hogea, D; New Methodology for breaking stenographic
Techniques for JPEGs. Electronic Imaging 2003,vol.8,pp. 3456-3462.

[9] http:/ aakash.ece.ucsb.edu./data hiding/stegdemo.aspx.Ucsb data hiding online
demonstration. Released on Mar .09, 2005.

[10] Mitsugu Iwanmoto and Hirosuke Yamamoto, The Optimal n-out-of-n Visual Secret
Sharing Scheme for GrayScale Videos, IEICE Trans. Fundamentals, vol.E85- A, No.10,
October 2002, pp. 2238-2247.

[11] Doron Shaked, Nur Arad, Andrew Fitzhugh, Irwin Sobel, Color Diffusion: Error Diffusion
for Color Halftones, HP Laboratories Israel, May 1999, vol.6, pp. 345-356.

[12] Zhou, G.R.Arce, and G.Di Crescenzo, Halftone Visual Cryptography, IEEE Tans. On
Video Processing, vol.15, No.8, August 2006, pp. 2441-2453.
7


[13] M.Naor and A.Shamir, Visual Cryptography, in Proceedings of Eurocrypt 1994, lecture
notes in computer science, 1994, vol.950, pp. 1-12.

[14] Robert Ulichney, The void-and-cluster method for dither array generation, IS&T/SPIE
Symposium on Electronic Imaging and Science, San Jose, CA, 1993, vol.1913, pp.332-343.

[15] E.R.Verheul and H.C.A. Van Tilborg, Constructions and properties of k out of n visual
secret sharing scheme, Designs, Codes, and Cryptography, vol.1, no.2, 1997, pp.179-196.

[16] Debnath Bhattacharyya, P. Das, S. Mukherjee, D. Ganguly, S.K. Bandyopadhyay, Tai-hoon
Kim, A Secured Technique for Image Data Hiding, Communications in Computer and
Information Science, Springer, June, 2009, Vol. 29, pp. 151-159.

You might also like