You are on page 1of 26

Data Hiding in Motion Vectors Of Compressed Video

Guided By:
Prof. D R. Bhamare

Presented By:
1) Harshit A. Patadia 2) Priyanka Patil 3) Sonali

Steganography
Hiding a Secret data in Digital Images without affecting the quality of Medium. This image is called as StegoImage. Steganography, Cryptography &Watermarking all are same concept only but some small differences should be there.

Original Image

Stego image

Steganography Vs Cryptography
In both concepts we are going to transmit some secret information using one Cover Medium. In steganography we are going to hide secret message in image without changing the quality of original, So no one understand some one is sending confidential information in this image like that But in Cryptography method we are going to change the data text format to Cipher text. So any one can understand some secret process is going like that but they cant retrieve.

Goal Of Steganography
1) The main goal of steganography is to communicate securely in a completely undetectable manner and to avoid drawing suspicion to the transmission of a hidden data. 2) It is not to keep others from knowing the hidden information, but it is to keep others from thinking that the information even exists. Accuracy

Consistency
Minimize false-positives

Example
George obtains oranges daily yet eights are rubbish!

Good year ! Eorge btains ranges:- cover object George obtains oranges daily..-stego object

Good year ! :-embedded message

STEGANOGRAPHY
Security systems

Cryptography

Information hiding

Steganography

Watermarking

Linguistic Steganography

Technical steganography

Robust

Fragile

Digital images

Video

Audio

Text

Imperceptible

Visible

Finger print systems

Objectives
Optimize the high hiding capacity & imperceptibility Design the Optimum Pixel Adjustment algorithm to hide the data with minimized embedding error Hiding the data in spectral domain Avoid the Overflow & Underflow of embedding data

BLOCK DIAGRAM

FRAME SEPERATION

Frame processing is the first step in the background subtraction algorithm, the purpose of this step is to prepare the modified video frames by removing noise and unwanted objects in the frame in order to increase the amount of information gained from the frame and the sensitivity of the algorithm. Preprocessing is a process of collecting simple image processing tasks that change the raw input video info a format. This can be processed by subsequent steps. Preprocessing of the video is necessary to improve the detection of moving objects. Another key issue in preprocessing is the data format used by the particular background subtraction algorithm. Most of the algorithm handles luminance intensity, which is one scalar value per each pixel, however, color image, in either RGB or HSV color space, is becoming more popular in the background subtraction algorithms.

Proposed Methods
LSB Embedding Algorithm LSB Embedding in Spatial Domain LSB Embedding in Transform Domain

Embedding data, which is to be hidden, into an image requires two files.


The first is an innocent looking image that will hold the hidden information, called the cover image.

The second file is the message the information to be hidden


To data insertion.

LSB Embedding Algorithm


Image Pixel Value = (1,1) = 241 & (1,2) = 140 Secret Data A (ASCII) value = 65 241 = 11110001, 140 = 10001100 65 = 01000001

LSB Initialization
In 11110001 1111 MSB 0001 LSB

To initialize this 4 bits to 0000 we have to do bit and operation to embed the A secret data we have to do bit or operation.

Continued.
So using this algorithm we can hide half the secret data bits in first pixel next half of the bits we can hide in second Pixel. In extraction Part we have to do same thing in reverse process. Ex: To make it last 4 bits zero bitand with 240 Now (1,1) = 1111 0000, & (1,2) = 1000 0000 secret data 65 = 01000001

After Embedding (1,1) = 1111 0100 & (1,2) = 1000 0001

LSB Embedding in Spatial Domain


The basic idea in LSB is the direct replacement of LSBs of noisy or unused bits of the cover image with the secret message bits. Till now LSB is the most preferred technique used for data hiding because it

is simple to implement offers high hiding capacity, and provides a very easy
way to control stego-image quality. It has low robustness to modifications made to the stego-image such as low

pass filtering and compression and also low imperceptibility.

LSB Embedding in Transform Domain


The secret message is embedded into the high frequency coefficients of the wavelet transform while leaving the low frequency coefficients sub band unaltered. In an adaptive (varying) hiding capacity function is employed to determine how many bits of the secret message is to be embedded in each of the wavelet coefficients. The advantages of transform domain techniques over spatial domain techniques are their high ability to tolerate noises and some signal processing operations but on the other hand they are computationally complex and hence slower

Drawbacks of Transform domain


Low hiding capacity and Complex computations Embedding error will be there(Overflow & Underflow)

ADVANTAGES OF LSB INSERTION


1) A major advantage of the LSB algorithm is it is quick and easy. 2) There has also been steganography software developed which work around LSB color alterations via palette manipulation.

3) LSB insertion also works well with gray-scale images.

Types of Compression
Lossless Compression
Data can be completely recovered after decompression Recovered data is equal to original Applications: Medical imagery,

Lossy Compression
Data cannot be completely recovered after decompression Some information is lost for ever

Compression ratio is more than lossless comp


Applications: commercial distribution (DVD)

GUI

Performance Analysis
Performance measurement for image distortion is well known as peak signal to noise ratio (PSNR). To establish an objective criterion for digital image quality, a parameter named PSNR (Peak Signal to Noise Ratio) is defined as follows The performance in terms of capacity and PSNR (in dB) is defined as per Equations follows,

PSNR 10log10 (255 / MSE )


2

Result Overview

While Reconstructing the frames and make it video PSNR is more than 40 db , so the it gives more better image quality and security as per need.

Advantages
It is used in the way of hiding not the Information but the password to reach that Information. Difficult to detect .Only receiver can detect. Can be applied differently in digital image, audio & video file. It can be done faster with the large no. of software's.

Disadvantages
Huge number of data equal to huge file size, so some one can suspect about it. In sending and receiving information can be leaked. The confidentiality of information is maintained by the algorithms, and if the algorithms are known then its all over. If this technique is gone in the wrong hands like hackers, terrorist ,criminals then this can be very much dangerous for all.

Applications
1. Teleconference or video phone
Very low delay (1/10 second is a standard)

2. Live Broad cast Video


Modest delay is tolerable(second is normal) Error tolerance is needed

3. Video-in-a-can (DVD, Video on Demand)


Random access to compressed data is desired

Encoding can take a lot time

4. Decoding must always be at least the frame rate.

Conclusion
Steganography is not implemented in wider ways but it can be the best security tool. The system combines an secret data hiding technique using the optimum pixel adjustment to increase the hiding capacity of the system compared to other systems.

You might also like