SlideShare a Scribd company logo
1 of 5
Download to read offline
E-ISSN: 2321–9637
Volume 2, Issue 1, January 2014
International Journal of Research in Advent Technology
Available Online at: http://www.ijrat.org
A REVIEW OF VIDEO STEGANOGRAPHY
METHODS
Richa Khare1
, Dr. Kuldeep Raghuwanshi2
1
M.Tech. IV SEM (CSE)
2
HOD of CSE Dept
1,2
Oriental College of Sc & Tech Bhopal
1
richa.khare28@gmail.com, 2
drkuldeepraghuwanshi@oriental.ac.in
ABSTRACT:
Steganography is the art and science of sending covert messages such that the existence and nature of
such a message is only known by the sender and intended recipient. Steganography has been practiced for
thousands of years, but in the last two decades Steganography has been introduced to digital media.
Attacks, misuse or unauthorized access of information is of great concern today which makes the
protection of documents through digital media is a priority problem. It is the art of hiding message inside
a multimedia block. Data hiding can be done in different medias like text, images and audio valid data or
not. This urges the researcher’s to devise new data hiding techniques through Steganography principle to
protect and secure the data of vital significance. This paper we focus simple review Steganography
methods.
Keywords: Steganography, Data hiding, NN (Neural Network).
1. INTRODUCTION
Steganography is the art and science of writing hidden messages in such a way that no one, apart from the
sender and intended recipient, suspects the existence of the message, a form of security through obscurity [9].
The word Steganography is of Greek origin and means “concealed writing” from the Greek words steganos
meaning “covered or protected”, and graphing meaning “to write”. Steganography is the technique of hiding the
message in a chosen carrier such that no one except the intended recipient is aware of its existence [1]. Block
diagram of Steganography mechanism is shown in Figure 1.
Figure1. Block diagram of Steganography scheme
Here a secret data is being embedded inside a cover image to produce the stego image. A key is often needed
in the embedding process. The proper stego key is used by the sender for the embedding procedure. The same
key is used by the recipient to extract the stego cover image in order to view the secret data. The stego image
should look almost identical to the cover image.
A Steganography system, in general, is expected to meet three key requirements, namely, imperceptibility of
embedding, accurate recovery of embedded information, and large payload (payload is the number of bits that
E-ISSN: 2321–9637
Volume 2, Issue 1, January 2014
International Journal of Research in Advent Technology
Available Online at: http://www.ijrat.org
448
get delivered to the end user at the destination) [1]. In a pure Steganography framework, the technique for
embedding the message should be unidentified to anyone other than the sender and the receiver. An effective
Steganography should posses the following characteristics:
Secrecy: Extraction of hidden data from the host medium should not be possible without the knowledge of the
proper secret key used in the extracting procedure.
Imperceptibility: After embedding the data in the medium, it should be imperceptible from the original
medium.
High capacity: The maximum length of the hidden message that can be embedded can be as long as possible.
Resistance: The hidden data should be able to survive when the host medium has been manipulated, for
example lossy compression scheme.
Accurate extraction: The extraction of the hidden data from the medium should be accurate and reliable.
There are mainly three basic data embedding techniques for images in practice, namely Least Significant Bit
(LSB) Method, Masking and filtering and Transform based [11]. The primitive method is embedding in LSB.
Although there are several disadvantages to this approach, the relative easiness to implement it makes it a
popular method. In this method we embed information in the LSB of pixels colours. The changes of LSB may
not be noticeable because of the imperfect sensitivity of the human eyes. On an average, only half of the bits in
an image will need to be modified to embed a secret message using the maximal cover size. While using a 24-bit
image gives a relatively large amount of space to hide messages, it is also possible to use an 8-bit image as a
cover source. Because of the smaller space and different properties, 8-bit images require a more careful
approach. Where 24-bit images use three bytes to represent a pixel, an 8-bit image uses only one. Changing the
LSB of that byte will result in a visible change of colour, as another colour in the available palette will be
displayed. Therefore, the cover image needs to be selected more carefully and preferably be in gray scale, as the
human eye will not detect the difference between different gray values as easy as with different colours [11].
Masking and filtering techniques, usually restricted to 24 bits or gray scale images, take a different approach
to embedding a message. These methods are effectively similar to paper watermarks, creating markings in an
image. This can be achieved, for example, by modifying the luminance of parts of the image. While masking
does change the visible properties of an image, it can be done in such a way that the human eye will not notice
the difference. Since masking uses visible aspects of the image, it is more robust than LSB modification with
respect to compression, cropping and different kinds of image processing. The information is not hidden at the
noise level but is in the visible part of the image which makes it more suitable than LSB modifications in case a
lossy compression algorithm like JPEG is being used [11]. In transform based data embedding, the cover image
is transformed into another domain. Then the data is embedded in the transform coefficients. This method is
highly robust and complex. The major transformations used are DCT and DWT. DCT is used in JPEG
compression algorithm to transform successive 8_8 pixel blocks of the image, into 64 DCT coefficients each.
After calculating the coefficients, the quantizing operation is performed. Although a modification of a single
DCT will affect all 64 image pixels, the LSB of the quantized DCT coefficient can be used to embed
information. When information is hidden in video, the program or person embedding the information will
usually use the DCT method. DCT works by slightly changing the coefficients of each of the images in the
video, only so much that it is not noticeable by the human eye. Data embedding in videos is similar to that of
data embedding in images, apart from information is hidden in each frame of the video. When only a small
E-ISSN: 2321–9637
Volume 2, Issue 1, January 2014
International Journal of Research in Advent Technology
Available Online at: http://www.ijrat.org
449
amount of information is hidden in a video, generally it is not noticeable. However, when more information is
hidden, it will be more noticeable. DWT is based on sub-band coding and is found to yield a fast computation of
Wavelet Transform. It is easy to implement and reduces the computation time and resources required.
A 2-D DWT transforms an image into four sub bands: LL, LH, HL and HH where L and H stand for Low and
High. The LL sub band contains the average information and the other three sub-bands give the finer details of
the image. Even if the three sub-bands LH, HL, HH are made zero, the LL alone can give the average image (an
image of lower quality, with no finer details). We can embed the message image in two LSB planes of LH, HL
and HH sub bands. Data is embedded in LL sub-band to avoid compression losses. Human Visual System
(HVS) model points out different insensitivities among different level sub bands.
There are some other classification is also available, Digital steganography methods can be classified in
three distinct modes: injection, substitution and for the third I coin the term propagation (otherwise known as
“generating a new file”). The first two, and often the third type utilize specific bit locations as the covert channel
for communications. And most utilize a stego-key, which provides control for the hiding and recovery processes,
preventing or restricting detection by those who are not aware of the key, or do not have access to it.
a. Injection steganography works as might be expected, in that the payload or embedded data is placed inside
the original (unaltered) host cover-text, cover-image, cover-audio or cover-program file. Doing so increases the
host file size, and the process must be done in such a manner as to prevent the end-processing or presentation
application (word processing program, picture viewer, music player, etc.), from revealing the presence of the
embedded data within the cover. Most file types are susceptible to injection steganography. The file resulting
from this process, or any other steganographic methodology is often referred to as the stego-text, stegoimage
(audio, etc.) file, or more generically, a stego-object.
b. Substitution steganography replaces what is viewed as an insignificant part of the cover file, but also must
survive when processed by any “native” application such as those listed above. The substituted portion of an
executable cover file could be a program module or segment of executable code that is rarely or never used.
This method (sometimes referred to as “bit-twiddling” or “bit-tweaking”) can result in file degradation such as
aberrations in video or still images, audible noise in sound files or in the case of executables, processing errors.
c. Propagation Steganography most often utilizes a generation engine which when fed the payload produces
an output file. (It is possible to do it manually using a lookup table when the stego-object will be text). The
content of this file, sometimes referred to as a “mimic”, may appear as a freeform graphic, a music file, a
verbose text document, a fractal image or some other form. When reprocessed by the generation engine, with
few exceptions, a given payload will yield the same stego-object file. There is no host file or cover-object
involved in this method.
The advantage of Steganography, over cryptography alone, is that messages do not attract attention to
themselves. Plainly visible encrypted messages, no matter how unbreakable will arouse suspicion, and may in
themselves be incriminating in countries where encryption is illegal. Therefore, whereas cryptography protects
the contents of a message, Steganography can be said to protect both messages and communicating parties.
Techniques provide an interesting challenge for digital forensic investigations.
2. NEURAL NETWORK IN STEGANOGRAPHY
The term neural network was traditionally used to refer to a network or circuit of biological neurons. The
modern usage of the term often refers to artificial neural networks, which are composed of artificial neurons or
E-ISSN: 2321–9637
Volume 2, Issue 1, January 2014
International Journal of Research in Advent Technology
Available Online at: http://www.ijrat.org
450
nodes. Artificial Neural Networks may either be used to gain an understanding of biological neural networks, or
for solving artificial intelligence problems without necessarily creating a model of a real biological system.
Artificial Neural Networks have been applied successfully to speech recognition, image analysis and adaptive
control, in order to construct software agents or autonomous robots.
There is (or should be!) interest from the counterterrorism and law-enforcement communities in measures
that can be used to detect the existence of hidden data. This is steganalysis [3]. A single feature may provide
only scant indication of the presence of Steganography, or, several features may on their face conflict in their
diagnosis. What is needed is a method of combining multiple features into a single conclusion of “stego” or
“innocent”. For this we utilize a pattern recognition system called an artificial neural network (ANN).
Developing an ANN is a two-stage process. First the network is trained by feeding it the features from a large
pool of images, some of which are known to contain stego, and some that are known to not contain stego.
Based on the training, the neural net determines computational rules that can then be applied to the features
of an image of unknown character. One particular merit of an artificial neural network is that it is adaptive—as
additional data is provided to the system it refines its prediction function. In this way the pattern recognizer can
respond to evolution in the data. For example, if small modifications are made to an existing steganographic
algorithm, the software will be able to adapt. Liu Shaohui et al adopted neural network approach for finding the
features which has significant effect on data hiding process [5].
3. RELATED WORK
a. Neural network has the super capability to approximation any nonlinear functions. We first extract features
of image embedded information, then input them into neural network to get output. Manikopoulos et al. [2]
discussed an algorithm that utilises the probability density function (PDF) to generate discriminator features fed
into a neural network system which detects hidden data in this domain. A group of scientists at Iowa State
University are focusing on the development of an innovative application which they call ‘‘Artificial Neural
Network Technology for Steganography (ANNTS)’’ aimed at detecting all present Steganography techniques
including DCT, DWT and DFT.
b. Adoption of Neural Network Approach in Maher EI Arbi et al. suggested video watermarking based on
neural network [7]. They propose a novel digital video watermarking scheme based on multi resolution motion
estimation and artificial neural network. A multi resolution motion estimation algorithm was adopted to
preferentially allocate the watermark to coefficients containing motion. In addition, embedding and extraction of
the watermark were based on the relationship between a wavelet coefficient and its neighbour’s. A neural
network was given to memorize the relationships between coefficients in a 3x3 block of the image.
Experimental results showed that embedding watermark where picture content is moving is less perceptible.
Further, it showed that the scheme was robust against common video processing attacks.
c. Guohua Wu el al. [5], suggested Counter propagation Neural Network (CNN) based method for fast audio
digital watermark. By making use of the capabilities of memorization and fault tolerance in CPN, watermark is
memorized in the nerve cells of CPN. In addition, they adopt a kind of architecture with an adaptive number of
parallel CPN to treat with each audio frame and the corresponding watermark bit. Comparing with other
traditional methods by using CPN, it was largely improve the efficiency for watermark embedding and
correctness for extracting, namely the speed of whole algorithm. The extensive experimental results showed
that, we can detect the watermark exactly under most of attacks. This method efficaciously trade off both the
E-ISSN: 2321–9637
Volume 2, Issue 1, January 2014
International Journal of Research in Advent Technology
Available Online at: http://www.ijrat.org
451
robustness and inaudibility of the audio digital watermark.
4. CONCLUSION
There are many techniques for Video Steganography. We only discussed here Neural Networks based Methods.
Because today AI Based computer are used very rapidly in various fields, and NN techniques are used widely.
The performance of various methods can be further improved with the use Neural Networks Methods.
Similarly, we can also use error back propagation algorithm to improve video Steganography performance of
today new era of computer Techniques which is mostly based on Artificial Intelligence.
5. REFERENCES
[1]. “Video Steganography by LSB Substitution Using Different Polynomial Equations”, International Journal Of Computational
Engineering Research (ijceronline.com) Vol. 2 Issue. 5
[2]. C. Manikopoulos, S. Yun-Qing, S. Sui, Z. Zheng, N. Zhicheng, Z. Dekun, “Detection of Block DCT-based Steganography in
Gray-scale Images”, Proceedings of the IEEE Workshop on Multimedia Signal Processing, 9–11 December 2002, pp. 355–
358.
[3]. Chuan-Yu Chang et al, “Using a Full Counterpropagation Neural Network for Image Watermarking”, International Computer
Symposium, Dec. 15-17, 2004, Taipei, Taiwan.
[4]. Clifford Bergman, Jennifer Davidson, “An Artificial Neural Network for Wavelet Steganalysis”, Final Report to Midwest Forensics
Resource Center.
[5]. Guohua Wu, Xiaodong Zhou, “A Fast Audio Digital Watermark Method Based on Counter-propagation Neural Networks”,
International Conference on Computer Science and Software Engineering, 2008, pp. 583-586
[6]. Liu Shaohui et al, “Neural Network Based Steganalysis in Still Images”, ICME 2003, pp. 509-512.
[7]. Maher El’ Arbi et al, “Video Watermarking Based On Neural Networks”, ICME 2006, pp. 1577-1580.
[8]. M. Natarajan, Gayas Makhdumi., “Safeguarding the Digital Contents: Digital Watermarking”, DESIDOC Journal of Library &
Information Technology, 29, No. 3, May 2009, pp. 29-35.
[9]. Sanjeev kumar , Balasubramanian Raman And Manoj Thakur, “Real Coded Genetic algorithm Based Stereo Image Watermarking”,
International Journal of Secure Digital Information Age, 1, No.1, June 2009
[10]. Yu et al, “Digital Watermarking Based on Neural Networks for Color Images”, Elsevier Signal Processing, 81 (2001).
[11]. “Advanced Video Steganography Algorithm” International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-
9622 www.ijera.com Vol. 3, Issue 1, January -February 2013, pp.1641-1644.

More Related Content

What's hot

On Text Realization Image Steganography
On Text Realization Image SteganographyOn Text Realization Image Steganography
On Text Realization Image SteganographyCSCJournals
 
Reversible data hiding using histogram shifting method
Reversible data hiding using histogram shifting methodReversible data hiding using histogram shifting method
Reversible data hiding using histogram shifting methodHimanshu Bal
 
37 c 551 - reduced changes in the carrier of steganography algorithm
37 c 551 - reduced changes in the carrier of steganography algorithm37 c 551 - reduced changes in the carrier of steganography algorithm
37 c 551 - reduced changes in the carrier of steganography algorithmMohammed Kharma
 
Using SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageUsing SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageCSCJournals
 
(Sample) image encryption
(Sample) image encryption(Sample) image encryption
(Sample) image encryptionAnsabArshad
 
akashreport
akashreportakashreport
akashreportAkash Goel
 
Advanced image processing notes ankita_dubey
Advanced image processing notes ankita_dubeyAdvanced image processing notes ankita_dubey
Advanced image processing notes ankita_dubeyAnkita Dubey
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesEswar Publications
 
“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.Pradeep Vishwakarma
 
Image steganography
Image steganographyImage steganography
Image steganographyvaidya_sanyu
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Dr. Amarjeet Singh
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.Pradeep Vishwakarma
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
 
A Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital ImagesA Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital Imagesijsrd.com
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryptionAashish R
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 

What's hot (20)

On Text Realization Image Steganography
On Text Realization Image SteganographyOn Text Realization Image Steganography
On Text Realization Image Steganography
 
Reversible data hiding using histogram shifting method
Reversible data hiding using histogram shifting methodReversible data hiding using histogram shifting method
Reversible data hiding using histogram shifting method
 
37 c 551 - reduced changes in the carrier of steganography algorithm
37 c 551 - reduced changes in the carrier of steganography algorithm37 c 551 - reduced changes in the carrier of steganography algorithm
37 c 551 - reduced changes in the carrier of steganography algorithm
 
Using SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageUsing SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG Image
 
(Sample) image encryption
(Sample) image encryption(Sample) image encryption
(Sample) image encryption
 
akashreport
akashreportakashreport
akashreport
 
Advanced image processing notes ankita_dubey
Advanced image processing notes ankita_dubeyAdvanced image processing notes ankita_dubey
Advanced image processing notes ankita_dubey
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Ijetcas14 527
Ijetcas14 527Ijetcas14 527
Ijetcas14 527
 
Stegonoraphy
StegonoraphyStegonoraphy
Stegonoraphy
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography Techniques
 
G0210032039
G0210032039G0210032039
G0210032039
 
“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.
 
Image steganography
Image steganographyImage steganography
Image steganography
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
 
A Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital ImagesA Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital Images
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 

Viewers also liked

Paper id 25201451
Paper id 25201451Paper id 25201451
Paper id 25201451IJRAT
 
Paper id 252014139
Paper id 252014139Paper id 252014139
Paper id 252014139IJRAT
 
Paper id 24201464
Paper id 24201464Paper id 24201464
Paper id 24201464IJRAT
 
Paper id 28201444
Paper id 28201444Paper id 28201444
Paper id 28201444IJRAT
 
Paper id 21201457
Paper id 21201457Paper id 21201457
Paper id 21201457IJRAT
 
Paper id 26201476
Paper id 26201476Paper id 26201476
Paper id 26201476IJRAT
 
Paper id 252014137
Paper id 252014137Paper id 252014137
Paper id 252014137IJRAT
 
Paper id 24201486
Paper id 24201486Paper id 24201486
Paper id 24201486IJRAT
 
Paper id 24201458
Paper id 24201458Paper id 24201458
Paper id 24201458IJRAT
 
Paper id 27201447
Paper id 27201447Paper id 27201447
Paper id 27201447IJRAT
 
Paper id 24201463
Paper id 24201463Paper id 24201463
Paper id 24201463IJRAT
 
Paper id 23201417
Paper id 23201417Paper id 23201417
Paper id 23201417IJRAT
 
Paper id 26201429
Paper id 26201429Paper id 26201429
Paper id 26201429IJRAT
 
Paper id 212014103
Paper id 212014103Paper id 212014103
Paper id 212014103IJRAT
 
Paper id 24201445
Paper id 24201445Paper id 24201445
Paper id 24201445IJRAT
 
Paper id 212014136
Paper id 212014136Paper id 212014136
Paper id 212014136IJRAT
 
Paper id 25201444
Paper id 25201444Paper id 25201444
Paper id 25201444IJRAT
 
Paper id 24201471
Paper id 24201471Paper id 24201471
Paper id 24201471IJRAT
 
Paper id 25201446
Paper id 25201446Paper id 25201446
Paper id 25201446IJRAT
 
Paper id 24201478
Paper id 24201478Paper id 24201478
Paper id 24201478IJRAT
 

Viewers also liked (20)

Paper id 25201451
Paper id 25201451Paper id 25201451
Paper id 25201451
 
Paper id 252014139
Paper id 252014139Paper id 252014139
Paper id 252014139
 
Paper id 24201464
Paper id 24201464Paper id 24201464
Paper id 24201464
 
Paper id 28201444
Paper id 28201444Paper id 28201444
Paper id 28201444
 
Paper id 21201457
Paper id 21201457Paper id 21201457
Paper id 21201457
 
Paper id 26201476
Paper id 26201476Paper id 26201476
Paper id 26201476
 
Paper id 252014137
Paper id 252014137Paper id 252014137
Paper id 252014137
 
Paper id 24201486
Paper id 24201486Paper id 24201486
Paper id 24201486
 
Paper id 24201458
Paper id 24201458Paper id 24201458
Paper id 24201458
 
Paper id 27201447
Paper id 27201447Paper id 27201447
Paper id 27201447
 
Paper id 24201463
Paper id 24201463Paper id 24201463
Paper id 24201463
 
Paper id 23201417
Paper id 23201417Paper id 23201417
Paper id 23201417
 
Paper id 26201429
Paper id 26201429Paper id 26201429
Paper id 26201429
 
Paper id 212014103
Paper id 212014103Paper id 212014103
Paper id 212014103
 
Paper id 24201445
Paper id 24201445Paper id 24201445
Paper id 24201445
 
Paper id 212014136
Paper id 212014136Paper id 212014136
Paper id 212014136
 
Paper id 25201444
Paper id 25201444Paper id 25201444
Paper id 25201444
 
Paper id 24201471
Paper id 24201471Paper id 24201471
Paper id 24201471
 
Paper id 25201446
Paper id 25201446Paper id 25201446
Paper id 25201446
 
Paper id 24201478
Paper id 24201478Paper id 24201478
Paper id 24201478
 

Similar to Paper id 212014145

A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image SteganographyEditor IJCATR
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.comIJERD Editor
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.comIJERD Editor
 
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD Editor
 
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...IRJET Journal
 
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodDrubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodIOSRJECE
 
review.pptx
review.pptxreview.pptx
review.pptxTechNest1
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET Journal
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project ReportVijayMaheshwari12
 
IJREAMV03I022640.pdf
IJREAMV03I022640.pdfIJREAMV03I022640.pdf
IJREAMV03I022640.pdfssusere02009
 
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyIRJET Journal
 
B03208016
B03208016B03208016
B03208016inventy
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryptionvaishali kataria
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryptionvaishali kataria
 

Similar to Paper id 212014145 (20)

A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image Steganography
 
Ijariie1132
Ijariie1132Ijariie1132
Ijariie1132
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
 
Sub1584
Sub1584Sub1584
Sub1584
 
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
 
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodDrubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
 
review.pptx
review.pptxreview.pptx
review.pptx
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
 
G017444651
G017444651G017444651
G017444651
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project Report
 
IJREAMV03I022640.pdf
IJREAMV03I022640.pdfIJREAMV03I022640.pdf
IJREAMV03I022640.pdf
 
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta Steganography
 
Bp34412415
Bp34412415Bp34412415
Bp34412415
 
O017429398
O017429398O017429398
O017429398
 
B03208016
B03208016B03208016
B03208016
 
REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE ENCRYPTIO...
REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE ENCRYPTIO...REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE ENCRYPTIO...
REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE ENCRYPTIO...
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
 

More from IJRAT

96202108
9620210896202108
96202108IJRAT
 
97202107
9720210797202107
97202107IJRAT
 
93202101
9320210193202101
93202101IJRAT
 
92202102
9220210292202102
92202102IJRAT
 
91202104
9120210491202104
91202104IJRAT
 
87202003
8720200387202003
87202003IJRAT
 
87202001
8720200187202001
87202001IJRAT
 
86202013
8620201386202013
86202013IJRAT
 
86202008
8620200886202008
86202008IJRAT
 
86202005
8620200586202005
86202005IJRAT
 
86202004
8620200486202004
86202004IJRAT
 
85202026
8520202685202026
85202026IJRAT
 
711201940
711201940711201940
711201940IJRAT
 
711201939
711201939711201939
711201939IJRAT
 
711201935
711201935711201935
711201935IJRAT
 
711201927
711201927711201927
711201927IJRAT
 
711201905
711201905711201905
711201905IJRAT
 
710201947
710201947710201947
710201947IJRAT
 
712201907
712201907712201907
712201907IJRAT
 
712201903
712201903712201903
712201903IJRAT
 

More from IJRAT (20)

96202108
9620210896202108
96202108
 
97202107
9720210797202107
97202107
 
93202101
9320210193202101
93202101
 
92202102
9220210292202102
92202102
 
91202104
9120210491202104
91202104
 
87202003
8720200387202003
87202003
 
87202001
8720200187202001
87202001
 
86202013
8620201386202013
86202013
 
86202008
8620200886202008
86202008
 
86202005
8620200586202005
86202005
 
86202004
8620200486202004
86202004
 
85202026
8520202685202026
85202026
 
711201940
711201940711201940
711201940
 
711201939
711201939711201939
711201939
 
711201935
711201935711201935
711201935
 
711201927
711201927711201927
711201927
 
711201905
711201905711201905
711201905
 
710201947
710201947710201947
710201947
 
712201907
712201907712201907
712201907
 
712201903
712201903712201903
712201903
 

Recently uploaded

CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Study on Air-Water & Water-Water Heat Exchange in a Finned ï»żTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ï»żTube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned ï»żTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ï»żTube ExchangerAnamika Sarkar
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 

Recently uploaded (20)

CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Study on Air-Water & Water-Water Heat Exchange in a Finned ï»żTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ï»żTube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned ï»żTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ï»żTube Exchanger
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 

Paper id 212014145

  • 1. E-ISSN: 2321–9637 Volume 2, Issue 1, January 2014 International Journal of Research in Advent Technology Available Online at: http://www.ijrat.org A REVIEW OF VIDEO STEGANOGRAPHY METHODS Richa Khare1 , Dr. Kuldeep Raghuwanshi2 1 M.Tech. IV SEM (CSE) 2 HOD of CSE Dept 1,2 Oriental College of Sc & Tech Bhopal 1 richa.khare28@gmail.com, 2 drkuldeepraghuwanshi@oriental.ac.in ABSTRACT: Steganography is the art and science of sending covert messages such that the existence and nature of such a message is only known by the sender and intended recipient. Steganography has been practiced for thousands of years, but in the last two decades Steganography has been introduced to digital media. Attacks, misuse or unauthorized access of information is of great concern today which makes the protection of documents through digital media is a priority problem. It is the art of hiding message inside a multimedia block. Data hiding can be done in different medias like text, images and audio valid data or not. This urges the researcher’s to devise new data hiding techniques through Steganography principle to protect and secure the data of vital significance. This paper we focus simple review Steganography methods. Keywords: Steganography, Data hiding, NN (Neural Network). 1. INTRODUCTION Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity [9]. The word Steganography is of Greek origin and means “concealed writing” from the Greek words steganos meaning “covered or protected”, and graphing meaning “to write”. Steganography is the technique of hiding the message in a chosen carrier such that no one except the intended recipient is aware of its existence [1]. Block diagram of Steganography mechanism is shown in Figure 1. Figure1. Block diagram of Steganography scheme Here a secret data is being embedded inside a cover image to produce the stego image. A key is often needed in the embedding process. The proper stego key is used by the sender for the embedding procedure. The same key is used by the recipient to extract the stego cover image in order to view the secret data. The stego image should look almost identical to the cover image. A Steganography system, in general, is expected to meet three key requirements, namely, imperceptibility of embedding, accurate recovery of embedded information, and large payload (payload is the number of bits that
  • 2. E-ISSN: 2321–9637 Volume 2, Issue 1, January 2014 International Journal of Research in Advent Technology Available Online at: http://www.ijrat.org 448 get delivered to the end user at the destination) [1]. In a pure Steganography framework, the technique for embedding the message should be unidentified to anyone other than the sender and the receiver. An effective Steganography should posses the following characteristics: Secrecy: Extraction of hidden data from the host medium should not be possible without the knowledge of the proper secret key used in the extracting procedure. Imperceptibility: After embedding the data in the medium, it should be imperceptible from the original medium. High capacity: The maximum length of the hidden message that can be embedded can be as long as possible. Resistance: The hidden data should be able to survive when the host medium has been manipulated, for example lossy compression scheme. Accurate extraction: The extraction of the hidden data from the medium should be accurate and reliable. There are mainly three basic data embedding techniques for images in practice, namely Least Significant Bit (LSB) Method, Masking and filtering and Transform based [11]. The primitive method is embedding in LSB. Although there are several disadvantages to this approach, the relative easiness to implement it makes it a popular method. In this method we embed information in the LSB of pixels colours. The changes of LSB may not be noticeable because of the imperfect sensitivity of the human eyes. On an average, only half of the bits in an image will need to be modified to embed a secret message using the maximal cover size. While using a 24-bit image gives a relatively large amount of space to hide messages, it is also possible to use an 8-bit image as a cover source. Because of the smaller space and different properties, 8-bit images require a more careful approach. Where 24-bit images use three bytes to represent a pixel, an 8-bit image uses only one. Changing the LSB of that byte will result in a visible change of colour, as another colour in the available palette will be displayed. Therefore, the cover image needs to be selected more carefully and preferably be in gray scale, as the human eye will not detect the difference between different gray values as easy as with different colours [11]. Masking and filtering techniques, usually restricted to 24 bits or gray scale images, take a different approach to embedding a message. These methods are effectively similar to paper watermarks, creating markings in an image. This can be achieved, for example, by modifying the luminance of parts of the image. While masking does change the visible properties of an image, it can be done in such a way that the human eye will not notice the difference. Since masking uses visible aspects of the image, it is more robust than LSB modification with respect to compression, cropping and different kinds of image processing. The information is not hidden at the noise level but is in the visible part of the image which makes it more suitable than LSB modifications in case a lossy compression algorithm like JPEG is being used [11]. In transform based data embedding, the cover image is transformed into another domain. Then the data is embedded in the transform coefficients. This method is highly robust and complex. The major transformations used are DCT and DWT. DCT is used in JPEG compression algorithm to transform successive 8_8 pixel blocks of the image, into 64 DCT coefficients each. After calculating the coefficients, the quantizing operation is performed. Although a modification of a single DCT will affect all 64 image pixels, the LSB of the quantized DCT coefficient can be used to embed information. When information is hidden in video, the program or person embedding the information will usually use the DCT method. DCT works by slightly changing the coefficients of each of the images in the video, only so much that it is not noticeable by the human eye. Data embedding in videos is similar to that of data embedding in images, apart from information is hidden in each frame of the video. When only a small
  • 3. E-ISSN: 2321–9637 Volume 2, Issue 1, January 2014 International Journal of Research in Advent Technology Available Online at: http://www.ijrat.org 449 amount of information is hidden in a video, generally it is not noticeable. However, when more information is hidden, it will be more noticeable. DWT is based on sub-band coding and is found to yield a fast computation of Wavelet Transform. It is easy to implement and reduces the computation time and resources required. A 2-D DWT transforms an image into four sub bands: LL, LH, HL and HH where L and H stand for Low and High. The LL sub band contains the average information and the other three sub-bands give the finer details of the image. Even if the three sub-bands LH, HL, HH are made zero, the LL alone can give the average image (an image of lower quality, with no finer details). We can embed the message image in two LSB planes of LH, HL and HH sub bands. Data is embedded in LL sub-band to avoid compression losses. Human Visual System (HVS) model points out different insensitivities among different level sub bands. There are some other classification is also available, Digital steganography methods can be classified in three distinct modes: injection, substitution and for the third I coin the term propagation (otherwise known as “generating a new file”). The first two, and often the third type utilize specific bit locations as the covert channel for communications. And most utilize a stego-key, which provides control for the hiding and recovery processes, preventing or restricting detection by those who are not aware of the key, or do not have access to it. a. Injection steganography works as might be expected, in that the payload or embedded data is placed inside the original (unaltered) host cover-text, cover-image, cover-audio or cover-program file. Doing so increases the host file size, and the process must be done in such a manner as to prevent the end-processing or presentation application (word processing program, picture viewer, music player, etc.), from revealing the presence of the embedded data within the cover. Most file types are susceptible to injection steganography. The file resulting from this process, or any other steganographic methodology is often referred to as the stego-text, stegoimage (audio, etc.) file, or more generically, a stego-object. b. Substitution steganography replaces what is viewed as an insignificant part of the cover file, but also must survive when processed by any “native” application such as those listed above. The substituted portion of an executable cover file could be a program module or segment of executable code that is rarely or never used. This method (sometimes referred to as “bit-twiddling” or “bit-tweaking”) can result in file degradation such as aberrations in video or still images, audible noise in sound files or in the case of executables, processing errors. c. Propagation Steganography most often utilizes a generation engine which when fed the payload produces an output file. (It is possible to do it manually using a lookup table when the stego-object will be text). The content of this file, sometimes referred to as a “mimic”, may appear as a freeform graphic, a music file, a verbose text document, a fractal image or some other form. When reprocessed by the generation engine, with few exceptions, a given payload will yield the same stego-object file. There is no host file or cover-object involved in this method. The advantage of Steganography, over cryptography alone, is that messages do not attract attention to themselves. Plainly visible encrypted messages, no matter how unbreakable will arouse suspicion, and may in themselves be incriminating in countries where encryption is illegal. Therefore, whereas cryptography protects the contents of a message, Steganography can be said to protect both messages and communicating parties. Techniques provide an interesting challenge for digital forensic investigations. 2. NEURAL NETWORK IN STEGANOGRAPHY The term neural network was traditionally used to refer to a network or circuit of biological neurons. The modern usage of the term often refers to artificial neural networks, which are composed of artificial neurons or
  • 4. E-ISSN: 2321–9637 Volume 2, Issue 1, January 2014 International Journal of Research in Advent Technology Available Online at: http://www.ijrat.org 450 nodes. Artificial Neural Networks may either be used to gain an understanding of biological neural networks, or for solving artificial intelligence problems without necessarily creating a model of a real biological system. Artificial Neural Networks have been applied successfully to speech recognition, image analysis and adaptive control, in order to construct software agents or autonomous robots. There is (or should be!) interest from the counterterrorism and law-enforcement communities in measures that can be used to detect the existence of hidden data. This is steganalysis [3]. A single feature may provide only scant indication of the presence of Steganography, or, several features may on their face conflict in their diagnosis. What is needed is a method of combining multiple features into a single conclusion of “stego” or “innocent”. For this we utilize a pattern recognition system called an artificial neural network (ANN). Developing an ANN is a two-stage process. First the network is trained by feeding it the features from a large pool of images, some of which are known to contain stego, and some that are known to not contain stego. Based on the training, the neural net determines computational rules that can then be applied to the features of an image of unknown character. One particular merit of an artificial neural network is that it is adaptive—as additional data is provided to the system it refines its prediction function. In this way the pattern recognizer can respond to evolution in the data. For example, if small modifications are made to an existing steganographic algorithm, the software will be able to adapt. Liu Shaohui et al adopted neural network approach for finding the features which has significant effect on data hiding process [5]. 3. RELATED WORK a. Neural network has the super capability to approximation any nonlinear functions. We first extract features of image embedded information, then input them into neural network to get output. Manikopoulos et al. [2] discussed an algorithm that utilises the probability density function (PDF) to generate discriminator features fed into a neural network system which detects hidden data in this domain. A group of scientists at Iowa State University are focusing on the development of an innovative application which they call ‘‘Artificial Neural Network Technology for Steganography (ANNTS)’’ aimed at detecting all present Steganography techniques including DCT, DWT and DFT. b. Adoption of Neural Network Approach in Maher EI Arbi et al. suggested video watermarking based on neural network [7]. They propose a novel digital video watermarking scheme based on multi resolution motion estimation and artificial neural network. A multi resolution motion estimation algorithm was adopted to preferentially allocate the watermark to coefficients containing motion. In addition, embedding and extraction of the watermark were based on the relationship between a wavelet coefficient and its neighbour’s. A neural network was given to memorize the relationships between coefficients in a 3x3 block of the image. Experimental results showed that embedding watermark where picture content is moving is less perceptible. Further, it showed that the scheme was robust against common video processing attacks. c. Guohua Wu el al. [5], suggested Counter propagation Neural Network (CNN) based method for fast audio digital watermark. By making use of the capabilities of memorization and fault tolerance in CPN, watermark is memorized in the nerve cells of CPN. In addition, they adopt a kind of architecture with an adaptive number of parallel CPN to treat with each audio frame and the corresponding watermark bit. Comparing with other traditional methods by using CPN, it was largely improve the efficiency for watermark embedding and correctness for extracting, namely the speed of whole algorithm. The extensive experimental results showed that, we can detect the watermark exactly under most of attacks. This method efficaciously trade off both the
  • 5. E-ISSN: 2321–9637 Volume 2, Issue 1, January 2014 International Journal of Research in Advent Technology Available Online at: http://www.ijrat.org 451 robustness and inaudibility of the audio digital watermark. 4. CONCLUSION There are many techniques for Video Steganography. We only discussed here Neural Networks based Methods. Because today AI Based computer are used very rapidly in various fields, and NN techniques are used widely. The performance of various methods can be further improved with the use Neural Networks Methods. Similarly, we can also use error back propagation algorithm to improve video Steganography performance of today new era of computer Techniques which is mostly based on Artificial Intelligence. 5. REFERENCES [1]. “Video Steganography by LSB Substitution Using Different Polynomial Equations”, International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5 [2]. C. Manikopoulos, S. Yun-Qing, S. Sui, Z. Zheng, N. Zhicheng, Z. Dekun, “Detection of Block DCT-based Steganography in Gray-scale Images”, Proceedings of the IEEE Workshop on Multimedia Signal Processing, 9–11 December 2002, pp. 355– 358. [3]. Chuan-Yu Chang et al, “Using a Full Counterpropagation Neural Network for Image Watermarking”, International Computer Symposium, Dec. 15-17, 2004, Taipei, Taiwan. [4]. Clifford Bergman, Jennifer Davidson, “An Artificial Neural Network for Wavelet Steganalysis”, Final Report to Midwest Forensics Resource Center. [5]. Guohua Wu, Xiaodong Zhou, “A Fast Audio Digital Watermark Method Based on Counter-propagation Neural Networks”, International Conference on Computer Science and Software Engineering, 2008, pp. 583-586 [6]. Liu Shaohui et al, “Neural Network Based Steganalysis in Still Images”, ICME 2003, pp. 509-512. [7]. Maher El’ Arbi et al, “Video Watermarking Based On Neural Networks”, ICME 2006, pp. 1577-1580. [8]. M. Natarajan, Gayas Makhdumi., “Safeguarding the Digital Contents: Digital Watermarking”, DESIDOC Journal of Library & Information Technology, 29, No. 3, May 2009, pp. 29-35. [9]. Sanjeev kumar , Balasubramanian Raman And Manoj Thakur, “Real Coded Genetic algorithm Based Stereo Image Watermarking”, International Journal of Secure Digital Information Age, 1, No.1, June 2009 [10]. Yu et al, “Digital Watermarking Based on Neural Networks for Color Images”, Elsevier Signal Processing, 81 (2001). [11]. “Advanced Video Steganography Algorithm” International Journal of Engineering Research and Applications (IJERA) ISSN: 2248- 9622 www.ijera.com Vol. 3, Issue 1, January -February 2013, pp.1641-1644.