Top Banner
LAZY WAVELET TRANSFORM BASED STEGANOGRAPHY IN VIDEO KRISHNA C (4) RESHMA S (33) RESHMA SUNNY (34) SHAJANA K BASHEER (44) S8 ECE B PROJECT GUIDE : NIMMY M PHILIP Lazy wavelet transform based steganograhy in video 1
28
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript

ALGORITHM

LAZY WAVELET TRANSFORM BASED STEGANOGRAPHY IN VIDEO KRISHNA C (4)RESHMA S (33)RESHMA SUNNY (34)SHAJANA K BASHEER (44)S8 ECE B

PROJECT GUIDE : NIMMY M PHILIP

Lazy wavelet transform based steganograhy in video1CONTENTS1. INTRODUCTION

2. LITERATURE SURVEY

3. BLOCK DIAGRAM4. METHODOLOGY a. SOFTWARE DESCRIPTION b. FLOW CHART

5. RESULTS

6. APPLICATIONS

7. CONCLUSION

8. FUTURE SCOPE

9. REFERENCES

Lazy wavelet transform based steganograhy in video2INTRODUCTIONInformation hiding utmost importance in todays worldData easily available in digital formatUnauthorised copying on the riseTwo disciplines of information hiding:SteganographyDigital Watermarking

Digital Watermarking:process of hiding digital information in a carrier signal. To verify authenticity. Maybe embedded in audio, video, text etc.Lazy wavelet transform based steganograhy in video3Steganography: Data maybe hidden in image, audio or video.Media used for hiding cover.Hidden data text, image, audio, video etc.Hidden message imperceptible to viewers.Message encrypted hidden in the cover Our project deals with Steganography of video files into video file.

Lazy wavelet transform based steganograhy in video4LITERATURE SURVEY1. An Overview of Steganography[2] Shawn D. Dickman Steganography is a useful tool that allows transmission of information over an communication channel.

It comes from Greek language, Stegos meaning hidden, and Graphia writing.

Modifications to the data in the cover file must have insignificant or no impact to the final presentation.

Least significant bit of each sample- less impact to the graphical representation of the data.

Lazy wavelet transform based steganograhy in video55 Using a 24-bit image, a bit of each of the red, green and blue colour components can be used, since they are each represented by a byte. A grid for 3 pixels of a 24-bit image can be as follows:

(00101101 00011100 11011100)(10100110 11000100 00001100)(11010010 10101101 01100011)

When the number 200 (11001000-binary), is embedded into the LSB of this part of the image, the resulting grid is : (00101101 00011101 11011100)(10100110 11000101 00001100)(11010010 10101100 01100011)

Lazy wavelet transform based steganograhy in video62. Integer Wavelet Transforms using the Lifting Scheme[3]

Conventional wavelet transform does not guarantee the reversibility.

Lifting scheme is an algorithm to calculate wavelet transforms in an efficient way.

Three steps

1. Lazy wavelet transform 2. Dual lifting 3. Primal lifting

Lazy wavelet transform based steganograhy in video7Lifting scheme can be modified easily to a transform that maps integers to integers-hence reversible

Input image divided into non-overlapping subbands and embeds a secret data into the high frequency wavelet coefficients.

Lazy wavelet transform based steganograhy in video8

3. Overview: Main Fundamentals for Steganography [4]

Steganography Types 1. Pure steganography : no stego key

2. Secret key steganography : stego key is exchanged prior to communication.

3. Public key steganography : a public key and a private key is used.

Lazy wavelet transform based steganograhy in video9Characterization of steganography systems 1. Capacity : Total number of bits hidden and successfully recovered by the Stego system

2. Robustness : Ability of the embedded data to remain intact if the stego-system undergoes transformation

3. Invisibility : Concept based on the properties of the human visual system. Average human subject is unable to distinguish between carriers that do contain hidden information and those that do not.

4. Security : Embedded algorithm is secure if the embedded information is not subject to removal after being discovered by the attackerLazy wavelet transform based steganograhy in video10Steganography V/s CryptographySteganographyCover message + secret message + key

Does not alter structure of secret message.

Prevents the discovery of existence of communication.

Little known technology.CryptographySecret message + key

Alters structure of secret message.

Prevents discovery of contents of communication.

Common technology.

Lazy wavelet transform based streganograhy in video11BLOCK DIAGRAMLazy wavelet transform based steganograhy in video12

Cover video : Video used for hiding secret video (large size)

Secret video : Secret message to be transmitted (small size)

Lazy Wavelet Transform : Covert each frame in spatial domain into frequency domain (Generate four subbands)

LSB substitution : Replace each LSB of cover video with secret video data.

Inverse lazy wavelet transform : Combine four subbands and covert each frame in frequency domain into spatial domain.

Embedded Video : Cover video + Secret video

Lazy wavelet transform based streganograhy in video13METHODOLOGYA) SOFTWARE DESCRIPTIONSoftware used: MATLAB.

MATLAB:Fourth generation programming language.Developed by MathWorks. High performance language for technical computing. Allows interfacing of programs written in other programming languages like C, C++, Java etc.

Lazy wavelet transform based steganograhy in video14Wide variety of inbuilt functions. -VideoReader : Read video - rgb2gray : Covert RGB image to Gray scale image - lwt2 : Do lazy wavelet transformation

User-defined functions can also be used.Some user-defined functions used in our programStegno: Performing steganography on subbands of video frames.Datahiding: hiding data into LSB of the selected sub band.Destegno: for extracting the hidden video file.Dataextract: for extracting data from LSB of sub band.

Lazy wavelet transform based steganograhy in video15 B) FLOW CHARTLazy wavelet transform based steganograhy in video16Lazy wavelet transform based steganograhy in video17

Lazy wavelet transform based steganograhy in video18

RESULTS 1. LWT OUTPUT

Lazy wavelet transform based steganograhy in video19 2. COMPARISON Histogram before hiding

Histogram after hiding

Lazy wavelet transform based steganograhy in video20

First frame before hidingFirst frame after hidingLazy wavelet transform based steganograhy in video21

3. PSNR Peak signal to noise ratio of First frame after hiding: 87.0820 dB

Lazy wavelet transform based steganograhy in video22APPLICATIONS Confidential communication and secret data storing Protection of data alterationAccess control system for digital content distribution Media Database systems

Fields of applicationDefense and intelligence MedicalOn-line banking On-line transactionTo stop music piracyOther financial and commercial purposes

Lazy wavelet transform based steganograhy in video23CONCLUSIONLazy wavelet transform based steganograhy in video24 The project provides a new method for video steganography

The method considers the visual part of the video as a set of images or frames in which the secure data which is encrypted is actually stored.

Steganography in our current digital age can be attributed to the desire of individuals to hide communication through a medium rife with potential listener.This increased interest is evidenced in the sheer number of available tools to provide easy steganographic techniques to the end user.

In areas where cryptography and strong encryption are being outlawed, steganography used to circumvent such policies and pass messages.

The battle between cryptographers and cryptanalysis, security experts and hackers, steganography and Steganalysis will continually develop new techniques to counter each other.

Lazy wavelet transform based steganograhy in video25FUTURE SCOPELazy wavelet transform based steganograhy in video26Voice over Internet protocol (VoIP) used for steganography owing to its difficulty in detecting hidden information in VoIP streams.

Steganography is capable of mitigating piracy by aiding copyright marking.

Digital camera manufacturers could implement steganographic features as a part of camera firmware to annotate pictures with the photographer's copyright information.

26Lazy wavelet transform based steganograhy in video27The other areas that could conceivably be employed to hide messages are:

Holography technology.

Infrared (e.g. programmable IR hand controls for computers Pagers).

Colored glasses that filter all but intended wavelengths to make hidden messages visible.

Ink, magnetic, thermochromic, photochromic.

DNA message hiding.

REFERENCES[1]Lazy Wavelet Transform Based Steganography in Video Khushman Patel,Kul Kauwid Rora, Kamini Singh,Shekhar Verma Dept of CSE, IIIT Allahabad, Allahabad (U.P.),2014[2] An overview of image steganography T. Morkel 1, J.H.P. Eloff 2, M.S. Olivier 3,Information and Computer Security Architecture (ICSA) Research Group Department of Computer Science University of Pretoria, South Africa[3] Integer Wavelet Transforms using the Lifting SchemeGeert uytterhoeven dirk roose adhemar bultheel Department of Computer Science Katholieke University[4] Overview: Main Fundamentals for Steganography Zaidoon Kh. AL-Ani, A.A.Zaidan, B.B.Zaidan and Hamdan.O.Alanazi Journal of computing, volume 2, issue 3, march 2010, issn 2151-9617

Lazy wavelet transform based steganograhy in video28