Top Banner
A Novel Video Stegonography based on Non Uniform Rectangular Partition Presented By:
23

A Novel Video Stegonography Based on Non Uniform Rectangular Partition

Nov 12, 2014

Download

Documents

Shashank Singh


Steganography is the science of hiding secret message inside another larger and harmless looking message. This is one notch above regular cryptography; which just obscures the original message. Steganography tries to conceal the fact that there is a message in the first place. Steganographic message often appears to be something else than the original (secret) message, like a picture, sound, larger text, etc.[8]
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: A Novel Video Stegonography Based on Non Uniform Rectangular Partition

A Novel Video Stegonography based on Non Uniform Rectangular Partition

Presented By:

Page 2: A Novel Video Stegonography Based on Non Uniform Rectangular Partition

This paper proposes a novel Video Steganography which can hide an

uncompressed secret video stream in a host video stream with almost the same size

Each frame of the secret video will be Non-uniform rectangular partitioned and the

partitioned codes obtained can be an encrypted version of the original frame.

These codes will be hidden in the Least 4 Significant Bits of each frames of the

host video.

Experimental results showed that this algorithm can hide a same-size video in the

host video without obvious distortion in the host video.

Abstract

Page 3: A Novel Video Stegonography Based on Non Uniform Rectangular Partition

Literature survey is the most important step in software development process.

Before developing the tool it is necessary to determine the time factor, economy n

company strength.

Once these things r satisfied, ten next steps are to determine which operating

system and language can be used for developing the tool.

Literature Survey

Page 4: A Novel Video Stegonography Based on Non Uniform Rectangular Partition

AN OVERVIEW OF IMAGE STEGANOGRAPHY 

Steganography is the art of hiding the fact that communication is taking place, by

hiding information in other information.

Many different carrier file formats can be used, but digital images are the most

popular because of their frequency on the Internet.

For example, some applications may require absolute invisibility of the secret

information, while others require a larger secret message to be hidden.

This paper intends to give an overview of image steganography, its uses and

techniques.

Cont

Page 5: A Novel Video Stegonography Based on Non Uniform Rectangular Partition

On The Limits of Steganography

In this paper, we clarify what steganography is and what it can do.

We contrast it with the related disciplines of cryptography and traffic security, present a

unified terminology agreed at the first international workshop on the subject.

We then present a number of attacks, some new, on such information hiding schemes.

Finally, we show that public key information hiding systems exist, and are not

necessarily constrained to the case where the warden is passive.

Cont

Page 6: A Novel Video Stegonography Based on Non Uniform Rectangular Partition

Data hiding in digital images and raw video have wide literature.

In case the data is extracted, it will be encrypted. But still there is a chance that the

intruder can break the code.

However, we find that in most existing approaches, the choice of embedding

positions within a cover image

Mainly depends on a pseudorandom number generator without considering the

relationship between the image content itself and the size of the secret message.

Existing System

Page 7: A Novel Video Stegonography Based on Non Uniform Rectangular Partition

Proposed System

1. The method proposed in this paper is one kind of domain method which tries to get a

data-hiding capacity without causing obvious distortion in the host video stream

2. Therefore a video stream can be embedded into the host video stream after encoding

the secret video by applying the non-uniform rectangular partition.

3. The coding process can be controlled by some key parameters which can be treated as

the encryption key and this can increase the difficulty from being steg analyzed.

Page 8: A Novel Video Stegonography Based on Non Uniform Rectangular Partition

Software Requirement

Operating System : Windows XP

Software : Java,Jdk 1.6

Protocol : TCP/IP

IDE : Eclipse

 

System Requirement

Page 9: A Novel Video Stegonography Based on Non Uniform Rectangular Partition

Processor : Pentium-IV Or Latest

Speed : 1.1GHz

RAM : 512MB

Hard Disk : 40GB

General : Keyboard, Monitor, Mouse

Hardware Requirement

Page 10: A Novel Video Stegonography Based on Non Uniform Rectangular Partition

Encryption module

Protection and Detection mode:

Encoding and Decoding Image Steganography

Data hiding through image:

Video Steganography based on image Steganography

Modules Description

Page 11: A Novel Video Stegonography Based on Non Uniform Rectangular Partition

Allows trusted users to access sensitive information while traversing untrusted

networks, it is highly useful for users

The services and users are limited in their tunnel traffic

Encryption module

Page 12: A Novel Video Stegonography Based on Non Uniform Rectangular Partition

Easy testing of new rules in a live environment without disrupting the current

security policy is supported.

Rule sets are applied by deploying them in Protection mode to enforce secure

behavior, permit or deny traffic and seal web application parameters against

modification

Rule sets are tested by deploying them in Detection mode to evaluate them against

traffic and log actions without enforcing them.

Protection and Detection mode

Page 13: A Novel Video Stegonography Based on Non Uniform Rectangular Partition

We have chosen this stage because its contents are processed internally during the

image encoding/ decoding which makes it hard to be detected by image

steganalysis methods .

The data bits of the message are hidden in some of the image whose magnitude is

above a predefined threshold.

A single bit is hidden in the least significant bit of the larger component of each

image.

Encoding and Decoding Image Steganography

Page 14: A Novel Video Stegonography Based on Non Uniform Rectangular Partition

Finally, Admin encrypt the key and embed in the image send to the newly

registered member who is the authenticated.

After receiving the key to the authenticated he has only the permission to take the

key when extract the image.

Data hiding through image

Page 15: A Novel Video Stegonography Based on Non Uniform Rectangular Partition

We extend the image hidden technique to video one. Here we simply consider the

steganography in the uncompressed video.

That means we try to hide a key in video with almost the same size.

The main idea is that we treat each frame of the videos as the images and apply the

image steganography for each frame with some necessary mechanism.

Video Steganography based on image Steganography

Page 16: A Novel Video Stegonography Based on Non Uniform Rectangular Partition
Page 17: A Novel Video Stegonography Based on Non Uniform Rectangular Partition

Data Flow Diagram

Page 18: A Novel Video Stegonography Based on Non Uniform Rectangular Partition
Page 19: A Novel Video Stegonography Based on Non Uniform Rectangular Partition

DFD Level 0

Page 20: A Novel Video Stegonography Based on Non Uniform Rectangular Partition
Page 21: A Novel Video Stegonography Based on Non Uniform Rectangular Partition

Activity Diagram

Page 22: A Novel Video Stegonography Based on Non Uniform Rectangular Partition

Class Diagram

Page 23: A Novel Video Stegonography Based on Non Uniform Rectangular Partition

USECASE DIAGRAM