Top Banner
EFFICIENT VIDEO STEGANOGRAPHY USING SCRAMBLING ENCRYPTION TO MAINTAIN PRIVACY S.Sumathi1, R. Dharshini2, R. Harini2, K. Suchitra2, R. Vinodhini2 1Assistant professor, Velammal engineering college 2 UG student, Velammal engineering college AbstractEncryption have been used for secure communication for many years. Encryption will help people to protect valuable information in better way as technology becomes faster and more efficient. Steganography helps to protect private communication that has become necessity in today’s hacking world. By and large sharing of data happens as content, picture, sound and video.Steganography uses image, text, video and audio to hide secret information. In this paper, we have analyzed only video Steganography. In video Steganography secret information is enveloped inside a video to make it safe from hackers. The video is converted to frames by Split and Merge algorithm and the frame is encrypted by Scrambling Encryption based on bitxor and then decrypted. A hardware key is generated in 16F877a pic controller to enhance security. The secret data can be retrieved by entering the hardware key. Index TermsVideo Steganography, Data security, keys, AES key generation, scrambling encryption 1. INTRODUCTION: The execution of steganography framework is relying upon two components installing effectiveness and inserting payload.. Embedding efficiency means the amount of data that can be hidden in the cover file. Embedding payload means capacity of steganography system,in which the data can be hidden with less distortion. Here the video act as a cover media in which secret data is embedded. Secret message is the data which we are going to hide in the original video. Each image is generated in the form of keys. A key is a value or a number. Encryption and decryption process both requires hardware key. Hardware key acts like a pin which is used for authentication before encryption and Decryption. Hardware key is a three digit pin consisting of 8 bits. Stego Data is the data obtained after embedding the secret information.In video steganography, video signals are utilized to conceal mystery data.In this strategy, AVI record is utilized as transporter. Video outlines are as pictures, and subsequently picture steganography is utilized on video outlines. AES key generation plays a major role here. The previous works reflects.[1] a low embedding payload due to the fact the choice of blocks for the embedding technique ought to meet sure situations.[2] This method has a low embedding capability due to the fact simplest the luminance of the intra frame blocks that meet the 3 conditions are selected for hiding statistics. This method [3] presented a real-time watermarking approach within the H.264/AVC codec, this approach achieves a low degradation of the video quality because of the distinction between the original code and the substitute code is very small (at most 1 bit is altered out of the 8- bits of the selected movement vector. According to [14], our suggested method has a high embedding capacity. It [16] also proposed any other approach the usage of Wavelet Domain primarily based at the KLT Tracking Algorithm, This proposed set of rules desires some further change for robustness towards some video processing attacks and synthetic assaults.This method provided a steganographic set of rules for comfy records hiding. [15] In this paper, least full-size bit approach is used for facts hiding. But LSB method isn't relaxed approach for information hiding. Video Steganography Using LSB Matching Revisited Algorithm technique and it had Lack of safety and low embedding price 2. RELATED WORK: Diverse techniques have been developed to increase the security in data transfer. Opulent techniques have been explained to increase the security level of the information [1–3]. It [4] presented a reconstruction loop for hiding data of different (inter and intra) frames for video codec. In this method, the information is encrypted in the Left Side Band (LSB) of QDCT coefficients. The non-zero coefficients are used for encrypting the information by using the assigned threshold. In this algorithm, the secret information can be extracted easily. Numerous stenographic techniques in Discrete Wavelet Transform are represented in [5]. In this, the user can choose any cover image which results in the encrypted image. It [1] proposed an encrypting algorithm using a High Efficiency Video Coding (HEVC), which uses both DCT (Discrete Cosine Transform) and DST (Discrete Sine Transform) methods. Using HEVC intra frames are used to encrypt the message without passing the error of distortion drift to the adjacent blocks. The three directional patterns of error propagation for International Journal of Applied Engineering Research ISSN 0973-4562 Volume 14, Number 6, 2019 (Special Issue) © Research India Publications. http://www.ripublication.com Page 120 of 124
5

EFFICIENT VIDEO STEGANOGRAPHY USING SCRAMBLING …ripublication.com/ijaerspl2019/ijaerv14n6spl_26.pdf · a) Select stego video and convert it into frames by means of dividing the

May 01, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: EFFICIENT VIDEO STEGANOGRAPHY USING SCRAMBLING …ripublication.com/ijaerspl2019/ijaerv14n6spl_26.pdf · a) Select stego video and convert it into frames by means of dividing the

EFFICIENT VIDEO STEGANOGRAPHY USING SCRAMBLING

ENCRYPTION TO MAINTAIN PRIVACY

S.Sumathi1, R. Dharshini2, R. Harini2, K. Suchitra2, R. Vinodhini2

1Assistant professor, Velammal engineering college

2 UG student, Velammal engineering college

Abstract— Encryption have been used for secure communication for many years. Encryption will help people to protect valuable information in better way as technology becomes faster and more efficient. Steganography helps to protect private communication that has become necessity in today’s hacking world. By and large sharing of data happens as content, picture, sound and video.Steganography uses image, text, video and audio to hide secret information. In this paper, we have analyzed only video Steganography. In video Steganography secret information is enveloped inside a video to make it safe from hackers. The video is converted to frames by Split and Merge algorithm and the frame is encrypted by Scrambling Encryption based on bitxor and then decrypted. A hardware key is generated in 16F877a pic controller to enhance security. The secret data can be retrieved by entering the hardware key.

Index Terms—Video Steganography, Data security, keys, AES key generation, scrambling encryption

1. INTRODUCTION: The execution of steganography framework is relying upon two components installing effectiveness and inserting payload.. Embedding efficiency means the amount of data that can be hidden in the cover file. Embedding payload means capacity of steganography system,in which the data can be hidden with less distortion. Here the video act as a cover media in which secret data is embedded. Secret message is the data which we are going to hide in the original video. Each image is generated in the form of keys. A key is a value or a number. Encryption and decryption process both requires hardware key. Hardware key acts like a pin which is used for authentication before encryption and Decryption. Hardware key is a three digit pin consisting of 8 bits. Stego Data is the data obtained after embedding the secret information.In video steganography, video signals are utilized to conceal mystery data.In this strategy, AVI record is utilized as transporter. Video outlines are as pictures, and subsequently picture steganography is utilized on video outlines. AES key generation plays a major role here. The previous works reflects.[1] a low embedding payload due to the fact the choice of blocks for the embedding technique ought to meet sure situations.[2] This method has a low embedding capability due to the fact simplest the luminance of the intra frame blocks that meet the 3 conditions are selected for hiding statistics. This method [3] presented a real-time watermarking approach within the H.264/AVC codec, this approach achieves a low degradation of the video quality because of the distinction between the original code and the substitute code is very small (at most 1 bit is altered out of the 8-bits of the selected movement vector. According to [14], our suggested method has a high embedding capacity. It [16] also proposed any other approach the

usage of Wavelet Domain primarily based at the KLT Tracking Algorithm, This proposed set of rules desires some further change for robustness towards some video processing attacks and synthetic assaults.This method provided a steganographic set of rules for comfy records hiding. [15] In this paper, least full-size bit approach is used for facts hiding. But LSB method isn't relaxed approach for information hiding. Video Steganography Using LSB Matching Revisited Algorithm technique and it had Lack of safety and low embedding price

2. RELATED WORK:

Diverse techniques have been developed to increase the security in data transfer. Opulent techniques have been explained to increase the security level of the information [1–3]. It [4] presented a reconstruction loop for hiding data of different (inter and intra) frames for video codec. In this method, the information is encrypted in the Left Side Band (LSB) of QDCT coefficients. The non-zero coefficients are used for encrypting the information by using the assigned threshold. In this algorithm, the secret information can be extracted easily.

Numerous stenographic techniques in Discrete Wavelet Transform are represented in [5]. In this, the user can choose any cover image which results in the encrypted image. It [1] proposed an encrypting algorithm using a High Efficiency Video Coding (HEVC), which uses both DCT (Discrete Cosine Transform) and DST (Discrete Sine Transform) methods. Using HEVC intra frames are used to encrypt the message without passing the error of distortion drift to the adjacent blocks. The three directional patterns of error propagation for

International Journal of Applied Engineering Research ISSN 0973-4562 Volume 14, Number 6, 2019 (Special Issue) © Research India Publications. http://www.ripublication.com

Page 120 of 124

Page 2: EFFICIENT VIDEO STEGANOGRAPHY USING SCRAMBLING …ripublication.com/ijaerspl2019/ijaerv14n6spl_26.pdf · a) Select stego video and convert it into frames by means of dividing the

encrypting data, having vertical, horizontal, and diagonal is due to the combination modes of the adjacent blocks. A group of pixels has been protected by a range of intra prediction modes of each of the error propagation patterns.

It has [8] combined the complexity of current video steganographic algorithms with the trailing coefficients produced in the process of quantization of H.264 encoding standard. In that algorithm, DCT transform on the frame is first conducted and then the trailing coefficients are obtained for each quantized DCT blocks, last embedded by changing its values. The outcome indicates that, this algorithm has little influence on video quality and has a few changes to the DCT coefficients after embedding, and has large capacity of steganography, and has high robustness. Above all, the information security has been protected.

This method [7] has introduced thedual steganographyconcept, which is the process of using Steganography and Cryptography. In this concept, the original video has been secured from the unauthorised person. The original video has been inserted inside the other video. Both the videos are converted into frames first. Then the individual frames of original video are sampled with the frames of another video. The output frames are combined to get the encrypted video, after the sampling process has been completed. Here, we use only the steganography process, in which we encrypt any information in one of the frames of the video.

This technique [6] has proposed a similar method for data encryption using video steganography and PCF method. The main purpose of this paper is the efficient data transfer and to maintain the secrecy of the data that is to be transmitted. Using Patch wise Code Formation techniques, the video file is encrypted within another

video file. The advantage of this process is that, it provides robustness, better video quality and authentication ability. Still this process lacks hardware authentication such that the hidden data can be easily extracted.

This paper [5] presented video steganography using wavelet domain. Here, a video file consists of I-frame, P-frame, and B-frame. An Iframe, or intra frame, is decoded independently without referencing other frames. P-frames and B-frames are responsible for capturing the motion. Group of Pictures or GOP consists of number of I-, P- and B- frames. A GOP starts with an I-frame whose length (number of frames between two I- frames, excluding the second I-frame) varies depending on the codec used. Since I-frames are not lost during compression or any kind of signal processing operations, they are selected for embedding. Appropriate pixels of the I-frames and the audio frames are used for embedding without affecting the perceptual features of the video. Frame loss is made by making the redundant copies of secret information. The secret images are hidden by image frames and the secret audio signals are hidden by the audio frames.

3. METHODOLOGY:

The proposed scheme entails main techniques: encoding technique and deciphering procedure. The key generated is checked for authentication. The serial port interface is used to connect the hardware to the software. Here, the serial port used is RS332. Then, the video is converted into frames and any one of the frame is randomly selected for encryption. The original information is encrypted in the frame and the encrypted video is produced using the split and merge algorithm. The decryption is done to extract the key.

Fig. 1. Block diagram of video steganography using scrambled encryption

16F877A

Microcontroller

(AES) Key

generation

Serial port

interface

Key data

acquisition Video

Frames

Key

extraction

Video

Scrambled

encryption

Encrypted

video

Scrambled

decryption

International Journal of Applied Engineering Research ISSN 0973-4562 Volume 14, Number 6, 2019 (Special Issue) © Research India Publications. http://www.ripublication.com

Page 121 of 124

Page 3: EFFICIENT VIDEO STEGANOGRAPHY USING SCRAMBLING …ripublication.com/ijaerspl2019/ijaerv14n6spl_26.pdf · a) Select stego video and convert it into frames by means of dividing the

i. Scrambling with XOR Operation

The set of rules first decomposes the authentic image (the image to be encrypted) into 8 binary bit planes using binary bit aircraft decomposition. To alternate bit values, each bit plane is then finished the XOR operation with a security key bit plane, for my part. A scrambling set of rules is used to trade all bit locations. After n iterations of the XOR and scrambling procedures combines all bit- planes to gain the encrypted image.

ii. Extraction Algorithm

The extraction process is carried out at receiver side inorder to obtain the secret message. The following steps are accompanied for appearing extraction process [11].

a) Select stego video and convert it into frames by means of dividing the video into random frames on the basis of time or length.

b) Extract secret key, decided on body addresses and message length from the first frame of video.

c)Enter secret key for transmission and then compare it with originally stored key to go for the matching of generated key.If person is unauthorized then video clip will get corrupted after 4 tries and broken via leaving no secret data at the back of it.

d)Now, extract secret message via appearing reverse procedure of embedding set of rules the use of 1LSB substitution mechanism.

e) Decrypt the extracted message.

f) Show very last secret message as output.

g) Go out.

iii. XOR Encryption.

XOR Encryption is a symmetric key based encryption approach which allows to encrypt the secret facts into another unreadable format to guard it from intruders and from unauthorized customers [5]. It gives one- tier safety to non-public data. A few logical and Boolean operations are shaped on mystery facts for converting it into some other form. We’re using following function to encrypt the information using XOR Boolean expression. These expressions are extra relaxed than fashionable operations which includes addition, subtraction.

Encypted_Msg = XOR (Secret_Data_Bits, Key)

iv. Embedding Algorithm

The following steps are followed for hiding the data behind video.

a) Select cover video (.avi) and enter secret message (.txt) or select an image or an audio clip.

b) Enter3 digit Secret_Key for authorization proposes.

c)Convert video into frames and extract random frames from extracted frames on the basis of secret key (i.e.1234567890)

Where, frame1 to frame10 are ten irregular capacities for extricating 10 arbitrary casings for concealing the secret message.

d) Encrypt secret message using XOR encryption formula where EM is encrypted message.

EM = bitxor (Secret_msg_bit, Secret_Key)

e) Conceal secret key, chose outline locations and message length in the main casing of video clip.

f) Embed encrypted secret bits behind selected frames.

4. FUNCTIONAL COMPONENTS:

Here we use 16F877A microcontroller. The 16F877A is a 40 pin DIP pinout and it has many internal peripherals. It has a sufficiently extensive programming memory (vast as far as sensor and control ventures) 8k words and 368 Bytes of RAM. The 40 pins make it less demanding to utilize the peripherals as the capacities are spread out over the pins. Key is produced utilizing the push catches, which is shown in the LCD screen. The LCD used is 16x2, which is generally used in all electronic projects. The serial port used here RS332 to interface the controller and the hardware. RS232 interface has been utilized to send or getting directions from a PC to a microcontroller, send investigate data from a microcontroller to a terminal, download new firmware to the microcontroller and numerous different things.

5. RESULTS AND DISSCUSION:

The video is converted into frames using split and merge algorithm and the frames are shown in the figure 2. The image to be encrypted is shown in figure 3. Any one frame is randomly selected, as shown in the figure 4, for encryption. For encrypting an image, the image is scrambled. The encrypted image is shown in the figure 5. The decryption process takes place only when the hardware key is valid. The decrypted image is shown in the figure 6. For encrypting a video, the video is converted into frames and the exact process as mentioned above takes place. For encrypting a text information, the text document is taken in .txt format, as shown in the figure 7, and encrypted using Bit XOR algorithm. The scrambled and decrypted text are shown in the figures 8 and 9 respectively. The simulation results are shown below.

International Journal of Applied Engineering Research ISSN 0973-4562 Volume 14, Number 6, 2019 (Special Issue) © Research India Publications. http://www.ripublication.com

Page 122 of 124

Page 4: EFFICIENT VIDEO STEGANOGRAPHY USING SCRAMBLING …ripublication.com/ijaerspl2019/ijaerv14n6spl_26.pdf · a) Select stego video and convert it into frames by means of dividing the

Fig. 2. The video is converted into frames

Fig. 3. Original image

Fig. 4. Frame chosen for hiding.

Fig. 6. Decrypted image

Fig. 7. Original text

Fig. 8. Scrambled image

Fig. 5. Encrypted image

Fig. 9.Decrypted text

CONCLUSION:

We are hiding image ,audio and text into video file successfully and also decode the video file using the xor encryption. This method is very easy, safe, secure and strong method for hiding secret information. This is extended into any other such as .mov, .mp4. Flv to hide image behind video and also different format of images can be hide behind video such as .jpeg, .png etc. Very few papers are found where both image and audio are buried in the video. Experimental results indicate that it has little impact on the videos visual invisibility, and the capacity of steganography is improved, and it has high robustness. So, our research has significant value on information security.

REFERENCES:

[1] P.-C. Chang, K.-L. Chung, J.-J. Chen, C.-H. Lin, and T.-J. Lin, "A DCT/DST-based error propagation-free data hiding algorithm for HEVC intra-coded frames," Journal of Visual Communication and Image

[2] R. WANG, L. HU, and D. XU, "A Watermarking Algorithm Based on the CABAC Entropy Coding for H.264/AVC," J. Comput. Inform. Syst., vol. 7, no. 6, pp. 2132–2141, 2011.

[3] X. Ma, Z. Li, H. Tu, and B. Zhang, "A data hiding algorithm for H. 264/AVC video streams without intra-

International Journal of Applied Engineering Research ISSN 0973-4562 Volume 14, Number 6, 2019 (Special Issue) © Research India Publications. http://www.ripublication.com

Page 123 of 124

Page 5: EFFICIENT VIDEO STEGANOGRAPHY USING SCRAMBLING …ripublication.com/ijaerspl2019/ijaerv14n6spl_26.pdf · a) Select stego video and convert it into frames by means of dividing the

frame distortion drift," IEEE Transactions on Circuits and Systems for Video Technology, vol. 20, pp. 1320-1330, 2010.

[4] Z. Shahid, M. Chaumont, and W. Puech, "Considering the reconstruction loop for data hiding of intra-and inter-frames of H. 264/AVC," Signal, Image and Video Processing, vol. 7, pp. 75-93, 2013.

[5] Hemalatha. S, U. Dinesh Acharya, Shamathmika, "MP4 Video Steganography in Wavelet Domain".

[6] K. Rajalakshmi, Dr. K. Mahesh, "Video steganography based on embedding the video using PCF technique"

[7] P. Selvagirija, E. Ramya, "Dual Steganography for Hiding Text in Video by Linked List Method"

[8] Zhang et al, "Video Steganography Algorithm Based on Trailing Coefficients".

[9] Khalili, M., Asatryan, D.: ‘Colour spaces effects on improved discrete wavelet transform-based digital image watermarking using Arnold transform map’, IET Signal Process., 2013, 7, pp. 177–187 [10] Wu, L., Zhang, J., Deng, W., et al.: ‘Arnold transformation algorithm and anti-Arnold transformation algorithm’. IEEE 1st Int. Conf. Information Science and Engineering, December 2009, pp. 1164–1167 [11] Po-Yueh Chen*and Hung-Ju Lin, “A DWT Based Approach for Image Steganography”, International Journal of Applied Science and Engineering, pp. 275-290, vol.- 4,Issue- 3, 2006 [12] Chan, C. K. and Cheng, L. M. 2003. Hiding data in image by simple LSB substitution. Pattern Recognition, 37: 469-474. [13] Ganesan, P., Bhavani, P.: ‘A high secure and robust image steganography using dual wavelet and blending model’, J. Comput. Sci., 2013, 9, (3), pp. 277–284 [14] L. Tse-Hua and A. H. Tewfik, "A novel high-capacity data-embedding system," IEEE Transactions on Image Processing, vol. 15, pp. 2431-2440, 2006. [15] Gopal Krishna Pandey1, Mrs. Sameena Zafar2. A Secure Data Hiding Technique Using Video Steganography . [16] Ramadhan Mstafa J, Khaled Elleithy M. A High Payload Video Steganography Algorithm in DWT Domain Based on BCH Codes (15, 11)

. [17] Anmol Kulkarni D, Esti Bansal, Hole Rajashree B, Jadhav Rasika R, Lakshmi Madhuri. Improved Data Security Using Video Steganography. [18] Shyamala A, Raghu K. A DWT-BCH code based Video Steganography by employing Variable bit length Algorithm [19]Shanthakumari R, Dr. Malliga S. Video Steganography Using LSB Matching Revisited Algorithm. [20] Ramadhan Mstafa J, Khaled Elleithy M. A Highly Secure Video Steganography using Hamming Code (7, 4)

International Journal of Applied Engineering Research ISSN 0973-4562 Volume 14, Number 6, 2019 (Special Issue) © Research India Publications. http://www.ripublication.com

Page 124 of 124