ROBUST VIDEO DATAHIDING USINGFORBIDDEN ZONE DATAHIDING AND SELECTIVEEMBEDDINGUnder the guidance of:Prof. Rekha PatilTeam m...
WHAT IS DATA SECURITY?Protecting a database fromdestructive forces and theunwanted actions ofunauthorized users.INTRODUCTION
DATA SECURITY TECHNOLOGIESDISKENCRYPTIONHARDWARE BASEDMECHANISMS BACKUPSDATAMASKINGDATA ERASUR
DATA HIDINGIt is the process of embedding information into a host medium.FORBIDDEN ZONEIt is defined as the host signal ...
 To achieve efficient data hiding in video sequence. To utilize systematic RA Codes to encode messagebits and frame bits...
 Successfully utilized in video data hidingapplications. Tamper detection in digital videos can beperformed efficiently....
 The necessity for practical higher dimensionaldata hiding codes. Adjusting trade-off between robustness(channelcode) an...
 During video data hiding the quality of the imagecannot be preserved. They cannot survive any format conversion ortrans...
 A new block based data hiding method which makesuse of erasure correction capability of repeataccumulates codes. Uses s...
The goal of the design process is toproduce a model of a system which can beused later to build that system and use thismo...
 Parallel decoders are used to correct de-sync. The video data hiding methods utilize uncompressed videodata where inser...
ARCHITECTURE of proposedsystemEMBEDMESSAGE DATA FILEOUTPUT FILEMASTER FILEENCODEDVIDEOCOMPRESSION AND ENCRYPTIONDECODEUNCO...
ENCODERDECODER
Substitute bytesShift rowsAdd round keyMix columnsSubstitute bytesAdd round keyMix columnsShift keysAdd round keyShift key...
Implementation is the stage of the project when thetheoretical design is turned out into a working system.The implementa...
Frame selection is performed and the selectedframes are processed block-wise.The selection is performed at four stages: F...
Let fcur and fpre denote the current and previousframe indices fcur > T, then skip this frame. If fcur = fpre, then skip...
System flow diagramSystem flowEmbed dataSpread framesActual videoUser give input Msg or data as Data embedded videoinputSp...
results
 New video data hiding framework that makes use of erasurecorrection capability of RA codes and superiority of FZDH. It ...
 Incorporation of human visual system based spatiotemporal adaption of data hiding methodparameters. New multilevel embe...
THANK YOU FORYOURATTENTION !
Robust video data hiding using forbidden zone data hiding and selective embedding
Robust video data hiding using forbidden zone data hiding and selective embedding
Robust video data hiding using forbidden zone data hiding and selective embedding
Robust video data hiding using forbidden zone data hiding and selective embedding
Upcoming SlideShare
Loading in …5
×

Robust video data hiding using forbidden zone data hiding and selective embedding

3,338
-1

Published on

This ppt is on "Robust video data hiding". Includes intro, issues, challenges, motivation, design, implementation, result with snapshots, conclusion and future work.
HOPE THIS HELPS !! :)

Published in: Technology
3 Comments
3 Likes
Statistics
Notes
No Downloads
Views
Total Views
3,338
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
209
Comments
3
Likes
3
Embeds 0
No embeds

No notes for slide

Robust video data hiding using forbidden zone data hiding and selective embedding

  1. 1. ROBUST VIDEO DATAHIDING USINGFORBIDDEN ZONE DATAHIDING AND SELECTIVEEMBEDDINGUnder the guidance of:Prof. Rekha PatilTeam members:Geeta S SavalgiPooja LakhaPooja S Patil
  2. 2. WHAT IS DATA SECURITY?Protecting a database fromdestructive forces and theunwanted actions ofunauthorized users.INTRODUCTION
  3. 3. DATA SECURITY TECHNOLOGIESDISKENCRYPTIONHARDWARE BASEDMECHANISMS BACKUPSDATAMASKINGDATA ERASUR
  4. 4. DATA HIDINGIt is the process of embedding information into a host medium.FORBIDDEN ZONEIt is defined as the host signal range where no alteration is allowedduring data hiding process. SELECTIVE EMBEDDINGHere host signal samples, which will be used in data hiding, aredetermined adaptively. The selection is performed at four stages:Frame selection, frequency band determination, block selection andcoefficient selection.KEY TERMS USED IN PROJECT
  5. 5.  To achieve efficient data hiding in video sequence. To utilize systematic RA Codes to encode messagebits and frame bits. To allow handling de-synchronization betweenembedder and decoder. To achieve certain level of robustness against framedrop, repeat and insertion attacks. To use 3-D interleaving.ISSUES AND CHALLENGES
  6. 6.  Successfully utilized in video data hidingapplications. Tamper detection in digital videos can beperformed efficiently. It is used in fragile applications such asauthentication. It provides excess control, copy control in DVD’s. Widely suitable for broader range of application.APPLICATIONS
  7. 7.  The necessity for practical higher dimensionaldata hiding codes. Adjusting trade-off between robustness(channelcode) and imperceptibility(source) by practicalmeans. Design of end-to-end real-life visual applications.MOTIVATIONS
  8. 8.  During video data hiding the quality of the imagecannot be preserved. They cannot survive any format conversion ortranscoding, without any significant loss of perceptualquality. Efficiently hide data in video and to preserve thequality from the external attacks.PROBLEM STATEMENT
  9. 9.  A new block based data hiding method which makesuse of erasure correction capability of repeataccumulates codes. Uses superiority of forbidden zone for low embeddingdistortion levels. Robust to frame manipulation attacks via framesynchronization markers.SCOPE OF WORK
  10. 10. The goal of the design process is toproduce a model of a system which can beused later to build that system and use thismodel to build the overall system.DESIGN
  11. 11.  Parallel decoders are used to correct de-sync. The video data hiding methods utilize uncompressed videodata where insertions and erasures occur at decoder, causingde-sync. Multiple hronization errors. This scheme is successful only when the number of selectedhost signal samples is much less than the total number ofhost signal samples.EXISTING SYSTEM
  12. 12. ARCHITECTURE of proposedsystemEMBEDMESSAGE DATA FILEOUTPUT FILEMASTER FILEENCODEDVIDEOCOMPRESSION AND ENCRYPTIONDECODEUNCOMPRESSION DECRYPTIONCOMPRESSION ANDENCRYPTION CHECKENCODEDVIDEORECEIVEDDECODED FILEMESSAGE OR DATA FILESENDERRECEIVER
  13. 13. ENCODERDECODER
  14. 14. Substitute bytesShift rowsAdd round keyMix columnsSubstitute bytesAdd round keyMix columnsShift keysAdd round keyShift keysSubstitute bytesAdd round keyAdd round keyInverse mix columnsAdd round keyInverse sub bytesInverse shift rowsInverse mix columnsAdd round keyInverse shift bytesInverse shift rowsAdd round keyInverse shift bytesInverse shift rowsEXPAND KEYW(0,3)KEYRound 9 .Round 10Round 1Round 9ound 1
  15. 15. Implementation is the stage of the project when thetheoretical design is turned out into a working system.The implementation stage involves careful planning,investigation of the existing system and it’s constraints.IMPLEMENTATION
  16. 16. Frame selection is performed and the selectedframes are processed block-wise.The selection is performed at four stages: Frame selection Frequency band determination Block selection Coefficient selectionENCRYPTION MODULE
  17. 17. Let fcur and fpre denote the current and previousframe indices fcur > T, then skip this frame. If fcur = fpre, then skip this frame. Otherwise, process the current frame. fcur< fpre, then the end of the group of frames isreached.DECRYPTION MODULE
  18. 18. System flow diagramSystem flowEmbed dataSpread framesActual videoUser give input Msg or data as Data embedded videoinputSpread a video Encrypted videoDecrypt a video View original data ormsgEncryptionDecryption
  19. 19. results
  20. 20.  New video data hiding framework that makes use of erasurecorrection capability of RA codes and superiority of FZDH. It robust to frame manipulation attacks via framesynchronization markers. Typical system parameter are reported for error-free decoding. The results indicate that the framework can be successfullyutilized in video data hiding applications. User cannot find the original data. It increases the security.Conclusion
  21. 21.  Incorporation of human visual system based spatiotemporal adaption of data hiding methodparameters. New multilevel embedding technique . Increase block size to embed more data. Improve commercialization.FUTURE WORK
  22. 22. THANK YOU FORYOURATTENTION !
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×