Psdot 17 new channel selection rule for jpeg steganography

433 views

Published on

FINAL YEAR IEEE PROJECTS,
EMBEDDED SYSTEMS PROJECTS,
ENGINEERING PROJECTS,
MCA PROJECTS,
ROBOTICS PROJECTS,
ARM PIC BASED PROJECTS, MICRO CONTROLLER PROJECTS Z Technologies, Chennai

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
433
On SlideShare
0
From Embeds
0
Number of Embeds
8
Actions
Shares
0
Downloads
12
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Psdot 17 new channel selection rule for jpeg steganography

  1. 1. NEW CHANNEL SELECTION RULE FOR JPEG STEGANOGRAPHYOBJECTIVE: To improve higher security performance and reducing errors, the mainrole of this project as present a new channel selection rule for JointPhotographic Experts Group Steganography.PROBLEM DIFINITION: The composite signal is subject to video lossy compression to become.The message should survive the video lossy compression and can be identicallyextracted from. This robustness constrain should have low distortion effect onthe reconstructed video as well as low effect on the data size (bit rate). Giventhat can be identically extracted, in this paper; we use two metrics to evaluatedata-hiding algorithms in compressed video which are: 1. Increase in data size: representing the overhead price paid for the embedded data; 2. Drop in the reconstruction quality: this reconstruction is with quality loss than that without data hiding and is denoted by and expressed as the PSNR difference which is as well that of the quantity of the relative error and for P- and B-frame, respectively.ABSTRACT: Z Technologies www.ztech.ininfo@ztech.incall : 91760 91765
  2. 2. This paper deals with data hiding in compressed video. Unlike datahiding in images and raw video which operates on the images themselves in thespatial or transformed domain which are vulnerable to steganalysis, we targetthe motion vectors used to encode and reconstruct both the forward predictive(P)-frame and bidirectional (B)-frames in compressed video. The choice ofcandidate subset of these motion vectors are based on their associated macroblock prediction error, which is different from the approaches based on themotion vector attributes such as the magnitude and phase angle. A greedy adaptive threshold is searched for every frame to achieverobustness while maintaining a low prediction error level. The secret messagebit stream is embedded in the least significant bit of both components of thecandidate motion vectors. The method is implemented and tested for hiding datain natural sequences of multiple groups of pictures and the results are evaluated.The evaluation is based on two criteria: minimum distortion to the reconstructedvideo and minimum overhead on the compressed video size. Based on theaforementioned criteria, the proposed method is found to performwell and iscompared to a motion vector attribute-based method from the literature.EXISTING SYSTEM: The Existing System contained only steganography process for datatransfer without any security prediction. In this system developed new channelselection method for data hiding, but it didn’t use any advanced methods andfactors for data hiding. So that, It produce lot of errors in the timing for imagedecompress.DISADVANTAGES: Z Technologies www.ztech.ininfo@ztech.incall : 91760 91765
  3. 3.  Less Security  High amount of Perturbation Errors  Very difficult for Image DecompressionPROPOSED SYSTEM: In proposed system contain advanced Perturbed Quantization rule fordata hiding. The process of data hiding as follows,  LSB Algorithm  Embedding data, which is to be hidden, into an image requires two files.  The first is an innocent looking image that will hold the hidden information, called the cover image.  The second file is the message – the information to be hiddenADVANTAGES:  Minimal detectable distortion  Higher security performanceALGORITHM USED: 1. LSB (Least Significant Bit) 2. AES (Advanced Encryption Standard)ARCHITECTURE DIAGRAM: Z Technologies www.ztech.ininfo@ztech.incall : 91760 91765
  4. 4. Discrete Cosine Transform Compressed Image File Dividing And Input Image Rounding Matrix Output File Image File Encode Secret Image Bits Entropy EncoderSYSTEM REQUIREMENTS:Hardware requirements: Intel Pentium IV 256/512 MB RAM 1 GB Free disk space or greater 1 GB on Boot Drive 17” XVGA display monitor 1 Network Interface Card (NICSoftware requirements: Z Technologies www.ztech.ininfo@ztech.incall : 91760 91765
  5. 5. MS Windows XP/2000 MS IE Browser 6.0/later MS .Net Framework 4.0 MS Visual Studio.Net 2005 Internet Information Server (IIS) MS SQL Server 2005 Windows Installer 3.1APPLICATIONS: 1. Deductive Agencies 2. Government Secret Code 3. Military Agencies Z Technologies www.ztech.ininfo@ztech.incall : 91760 91765

×