SlideShare a Scribd company logo
1 of 7
Download to read offline
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 5, Ver. I (Sep - Oct .2015), PP 14-20
www.iosrjournals.org
DOI: 10.9790/2834-10511420 www.iosrjournals.org 14 | Page
Design of Random Scan Algorithm in Video Steganography for
Security Purposes
Sahil Gupta1
, Jyoti Saxena2
and Sukhjinder Singh3
1, 2, 3
Department of ECE, GianiZail SinghPTU campus, Bathinda-151001, Punjab (India)
Abstract: Steganography is defined as the process of hiding information in a multimedia carrier. In this paper,
video is taken as a carrier to hide information. To achieve Undetectability and robustness of the hidden data,
Random Scan approach is used. To make the data more secure encryption is done on the data before hiding.
Experimental results show that MSE, PSNR are better forMLSB technique whereas Correlation factor is better
for Random scan technique.
Keywords: Modified Least Significant bit (MLSB), Mean Square Error (MSE), Peak Signal to Noise Ratio
(PSNR), Correlation.
I. Introduction
Internet is the fastest medium for communication but it faces many security related problems like
hacking, copyright, eavesdropping etc.There are various techniques for security of data likecryptography and
steganography. Cryptography is a technique which is used to secure the secrecy of communication. There are
many different methods to encrypt and decrypt the data in order to keep the message secret. Unfortunately, it is
not enough to keep the content of a message secret, at the same time it is also important to keep the existence of
message secret. The technique in which the existence of hidden message is kept secret is called as steganography
[1].
Steganography (literally meaning coveredwriting) dates back to ancient Greece, where common
practices consisted of etching messages in wooden tablets and covering them with wax, and tattooing a shared
messenger’s head, letting his hair grow back , then sharing it again when he arrived at his contact point [2].
Steganography is the art of hiding message into cover objects such as images, text, videos [3].Images
had been mostly used media for data hiding. But now a day, video steganography is used for hiding data in a
more secure hiding way than in images as data capacity of video is more than images. A Steganography system
consists of three elements: cover object (which hides the secret message), the secret message and the stego object
(which is the cover object with message embedded inside it) [4].
The paper is organized as follows; section II starts with literature Survey, section III gives the
Experimental setup in which block diagram and algorithm with examples is explained. Section IV illustrates the
results in which MSE, PSNR and Correlation factor ofRandom scan technique is compared with Modified LSB
technique. The conclusion and scope of future work is discussed in section V.
Fig. 1 Block Diagram of Steganography
Figure 1 shows the fundamental block diagram of Steganography. In Steganography cover file and
secret data is read. Then encryption algorithm is applied on secret data followed byhiding algorithm applied
onencrypted data to hide in cover object. After thatstego object is transmitted.At receiver side recovery algorithm
is applied on stego object for extracting secret data.
Design of Random Scan Algorithm in Video Steganography for Security Purposes
DOI: 10.9790/2834-10511420 www.iosrjournals.org 15 | Page
II. Literature Survey
In the literature, various steganography techniques for digital images have been proposed. However, the
digital videos, one of the most suitable cover for data hiding was less considered.
SamidhaSet.al [5], discussed various image steganography techniques based on spatial domain. Spatial
domaintechniques are based on physical location of pixels in an image. Generally 8 bit gray level or color images
can be used as a cover to hide data. Random bits from these bytes are used to replace the secret data bits.
Bhautmageet.al[6], presented new technique for data embedding and extraction for AVI (audio video
interleave) videos in which instead of changing the LSB of the cover file, the LSB and LSB+3 bits are changed
in alternate bytes of the cover file. The secret message is encrypted by using a simple bit exchange method
before the actual embedding process starts. An index is created for the secret information and the index is placed
in a frame of the video itself. With the help of this index, the secret message can be extracted easily, which also
reduce the extraction time.
Dasguptaet.al [7],proposed hash based technique for video steganography. Eight bits of the secret
information is divided into 3, 3, and 2 bits, and thenembedded into the RGB pixel values of the cover frames
respectively. A hash function is used to select the position of insertion in LSB bits.
Kelashet al. [8], proposed algorithm to hide message within part of frame or in whole frame based on
HCV (histogram constant value). The random selection of frame increases security level and to increase
embedding capacity, faded pixel were reduced in each frame.
In this paper motivation is taken from [5, 6, 7 and 8] and proposed a technique for data hiding. In this
technique before hiding, the encryption of data is done in which the negative of data is generated by doing
complement. After that data is made to hide using Random Scan and MLSB Techniques.
III. Experimental Setup
In this work, Random Scan and MLSB techniques are implemented usingMatlab platform.Figure 2
shows the experimental set up of this process in which the secret message is hidden in anyvideo frame as cover.
Cover Video: Video consists of images as well as audio. Hence both images and audio are considered for
steganography.
Frame Extraction: Frame extraction is the process of extracting frames from the video. Video is converted
into frames. From the frames one frame is selected for embedding.
Fig. 2 Experimental setup of Video Steganography
Secret Message: The secret data is in any form like text, audio, image. In the proposed algorithm the
encryption of data is done. For encryption the negative of data is generated.
Embedding Algorithm: For embedding the encrypted data, Random Scan and MLSB technique is applied. In
Random scan technique for hiding bits, 1 to 4 bits are taken from LSB side randomly because as the bit goes
from 4th
to 5th
bit there is large variation in pixels whereas in MLSB technique, data is hidden at 2 LSB
positions only.
Stego Video: After embedding the encrypted data in frame, the reconstruction of video is done and stego
video is generated.
3.1 Algorithm
The step by step algorithm for video steganography is explained below:
Step 1: Read the video file.
Step 2: Extract the frame from video file.
Step 3: Read the secret data
Design of Random Scan Algorithm in Video Steganography for Security Purposes
DOI: 10.9790/2834-10511420 www.iosrjournals.org 16 | Page
Step 4: Encryption Algorithm is applied on secret data.
Step 5: Split the data into 2-2 bits for hiding.
Step 6: The encrypted data is hidden in cover frame using Random Scan and Modified LSB Technique.
Step 7:Compare MSE and PSNR of random scan technique with MLSB technique.
Example
1. Cover Frame Pixels
Table 1 Cover Frame Pixel
Cover data of Ist Row 01011010 01010101 11001100 10111011
Cover data of Second Row 00011100 00111100 11100001 10001000
2. Data value: 10110111
3. After Encryption Data Value: 01001000
4. Stego Frame Pixel values after Modified LSB Technique
Table 2 Stego pixel after MLSB Technique
Cover data of Ist Row 01011010 01010101 11001100 10111011
Encrypted data shifted to 2 LSB 00000000 00000010 00000000 00000001
Data Embedding using replacement 01011000 01010110 11001100 10111001
Bit Variation 2 bit 1 bit No 2 bit
Cover data of 2nd
Row 00011100 00111100 11100001 10001000
5. Stego Frame Pixel Values after apply Random Scan Technique
Table 3Stego pixel after Random Scan Technique
Cover data of ist Row 01011010 01010101 11001100 10111011
Encrypted data shifted to 2 LSB 00000000 00000010 00000000 00000001
Data Embedding using EXOR 01011010 01010111 11001100 10111010
Bit Variation No 2 bit No 1 bit
Cover data of 2nd
Row 00011100 00111100 11100001 10001000
3.2 Performance Metrics
To measure the imperceptibility of steganography several metrics are used.The metrics indicate how
similar or different the stego image is from cover image.The following metrics are used:
1. Mean Square Error (MSE) is computed by performing byte by byte comparison of the cover image and
stego image. The Computation formula is expressed as[4]
MSE =
1
M∗N
Fij − Gij 2N
1
M
1 (1)
M: numbers of rows of cover image
N: number of column of Cover Image
Fij: Pixel value from cover image
Gij: Pixel value from Stego Image
Higher value of MSE indicates dissimilarity between Cover image and Stego image.
2. Peak signal to noise ratio (PSNR) measures in decibels the quality of the stego image compared with the
cover image. The higher the PSNR better the quality. PSNR is computedusing the following equation.
PSNR = 20 log10 255 − 10 log10 MSE (2)
3. Correlation Factor: Correlation factor is one of the performance parameters. Correlation factor ‘r’ is the
measure of extent and direction of linear combination of two random variables. If two variables are closely
related, the correlation factor is close to the value 1. On the other hand, if the factor is close to 0, two variables
are not related.
Design of Random Scan Algorithm in Video Steganography for Security Purposes
DOI: 10.9790/2834-10511420 www.iosrjournals.org 17 | Page
r =
Xi−Xm (Yi−Ym )i
(Xi−Xmi )2 (Yi−Ym )2
i
(3)
Where
Xi - Pixel intensity of original image
Xm- Mean value of original image intensity
Yi- Pixel intensity of encrypted image
Ym - Mean value of encrypted image intensity
IV. Results and Discussion
In this paper, Random Scan and MLSB Techniquesare implemented in MATLAB 2013. The
experiment is carried out on two different video files namely (visiontraffic.avi) and (atrium.avi) which is used as
a cover file and six images are used as secret data.
Cover media file
In this process visiontraffic.avi and atrium.avi video having resolution of 360*640 has been used as a cover
media. Figure 3 shows the frame extraction from visiontraffic.avi and atrium.avi video.
Fig. 3 Frame Extraction from visiontraffic.avi and atrium.avi
The features of these cover file have been shown in table 4.
Table 4 Cover video
S. No Cover video file information
Name of
video file
Resolution
(W*H)
Frames/sec Total
frames
1. Visiontraffi
c.avi
360*640 29 531
2. atrium.avi 360*640 30 431
4.1 Secret data
In this process image taken from MATLAB data base has been used as secret data which is to be
hidden in cover media.
Scene_right Parkinglot_right Vision team1
Vipstereo_halwayLeft Stopsigntest Yellowstone_right
Fig.4 Secret data images
Design of Random Scan Algorithm in Video Steganography for Security Purposes
DOI: 10.9790/2834-10511420 www.iosrjournals.org 18 | Page
The features of these secret images have been shown in table 5
Table 5 Secret Data
S.No Secret data image information
Name of image Size Format
1. Scene_right 284*512 Png
2. Vipstereo_halwayLeft 300*400 Png
3. Parkinglot_right 480*640 Png
4. Yellowstone_right 480*640 Png
5. Stopsigntest 368*653 Jpg
6. Vision team1 582*800 Jpg
Stego Video
The secret imageis embedded in cover video with the help of two techniques namely:
 Random Scan method
 Modified LSB method
This is the stego frame generated after hiding parkinglot_right image in visiontraffic.avi video using Random
scan technique.
Fig. 5Stego Frame after hiding parkinglot_right image in cover Frame
Similar stego frames can be generated after hiding othersecret images in cover files.
For Steganography, the Correlation factor should be 1 for ideal Case so that there is no dissimilarity in
stego image as compared to cover image.
The MSE, PSNR and Correlation factor of Random Scan technique is compared with Modified LSB
technique in table 6 and table 7 for visiontraffic and atrium video respectively.
Table 6 Comparison of MSE, PSNR and Correlation values (visiontraffic.avi)
Secret image Results obtained using
Random Scan
Results obtained
using MLSB
MSE PSNR Corre
lation
MSE PSNR Correl
ation
Parkinglot_right
4.87 43.25 .998 .370 47.76 .992
Scene_right 5.63 42.49 .998 .405 47.72 .992
Vision team1 5.53 42.59 .998 .383 47.74 .992
Vipstereo_halwayLeft 5.28 42.85 .998 .365 47.76 .992
Yellowstone_right 5.17 42.95 .998 .390 47.74 .992
Stopsigntest 5.27 42.85 .998 .437 47.69 .992
Table 7 Comparison of MSE, PSNR and Correlation values (atrium.avi)
Secret image Results obtained using
Random Scan
Results obtained
using MLSB
MSE PSNR Corre
lation
MSE PSNR Corre
lation
Parkinglot_right 4.86 43.26 .999 .378 47.76 .987
Scene_right 5.70 42.42 .999 .405 47.72 .987
Vision team1 5.53 42.59 .999 .383 47.74 .987
Vipstereo_halwayLeft 5.38 42.74 .999 .365 47.76 .987
Yellowstone_right 5.17 42.95 .999 .390 47.74 .987
Stopsigntest 5.29 42.83 .999 .437 47.69 .987
Design of Random Scan Algorithm in Video Steganography for Security Purposes
DOI: 10.9790/2834-10511420 www.iosrjournals.org 19 | Page
Fig.6Comparison of MSE, PSNR and Correlation factor using Random Scan and MLSB technique for
Visiontraffic video
Fig. 7Comparison of MSE, PSNR and Correlation factor using Random Scan and MLSB technique for
atrium video
Figure 6 and 7shows thatMSE using MLSB technique has less value as comparison to Random Scan
technique. Becausethere is very small change in pixel value using MLSB technique, whereas PSNR using MLSB
technique is more than Random scan technique. But Correlation factor using Random Scan Technique is better
than MLSB Technique. Therefore Random scan technique is preferable over MLSB technique as per security
concern.
V. Conclusion
In this work video is used as a carrier to embed secret message. In this technique the negative of secret
image is made to hide in cover frame. So it is difficult to extract the original image from cover frame
becausePixels are hidden at Random locations in cover frame pixels.Also even if an unknown person extracts
the image from cover frame they get the negative of secret image.The figure 6 and 7 shows that the MLSB
technique has better MSE and PSNR as compared to Random scan technique, but Correlation factor is better for
Random scan technique. In Futuremore emphasis will be given on frequency domain due to better PSNR and
MSE value as compared to spatial domain.
Design of Random Scan Algorithm in Video Steganography for Security Purposes
DOI: 10.9790/2834-10511420 www.iosrjournals.org 20 | Page
References
[1] S.D. Thepade and S.S. Chavan, Cosine, Walsh and Slant Wavelet Transforms for Robust Image Steganography, Tenth International
Conference on Wireless and Optical Communications Networks (WOCN), 2013, 1-5.
[2] K.S.Jenifer, G. Yogaraj and K. Rajalakshmi, 2014, approach for Video Steganography to embed Images, International Journal of
Computer Science and Information Technologies, 5(1), 2014, 319-322.
[3] R.G Bal, P.Ezhilarasu,An Efficient Safe and Secured Video Steganography Using Shadow Derivation, International Journal of
Innovative Research in Computer and Communication Engineering, 2, 2014, 3251-3258.
[4] I. Premi and S. Kaur,Random Scan Algorithm for image steganography inScilab for security purposes, International Journal of
Advanced Research in Computer and Communication Engineering, 3(12), 2014, 8876-8879.
[5] D. Samidha and D. Agrawal, Random Image Steganography in Spatial Domain, International Conference on Emerging Trends in
VLSI, Embedded System, Nano Electronics and Telecommunication System, 2013, 1-3.
[6] P. Bhautmage, A.J kumar and A. Dahatonde, Advanced Video Steganography Algorithm, International Journal of Engineering
Research, 3(1) 2013, 1641-1644.
[7] K. Dasgupta, J.K Mandal and P. Dutta,Hash Based Least Significant Bit Technique for Video Steganography, International Journal
of Security, Privacy and Trust Management, 1(2), 2012, 1-11.
[8] H.M. Kelash, O.F.A Wahab, O.A. Elshakankiry and H. S. El-sayed,Utilization of SteganographicTechniques in Video Sequences,
International Journal of Computing and Network Technology, 2(1), 2014,17-24.

More Related Content

What's hot

A Comparitive Analysis Of Steganography Techniques
A Comparitive Analysis Of Steganography TechniquesA Comparitive Analysis Of Steganography Techniques
A Comparitive Analysis Of Steganography Techniquestheijes
 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...IJCSIS Research Publications
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET Journal
 
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET-  	  Hybrid Approach to Text & Image Steganography using AES and LSB Te...IRJET-  	  Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...IRJET Journal
 
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Bikash Chandra Prusty
 
An LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic TechniquesAn LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic TechniquesIJERA Editor
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
 
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET Journal
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...ijsptm
 
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...IOSR Journals
 
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET Journal
 
analysis on concealing information within non secret data
analysis on concealing information within non secret dataanalysis on concealing information within non secret data
analysis on concealing information within non secret dataVema Reddy
 
An improved color image encryption algorithm with pixel permutation and bit s...
An improved color image encryption algorithm with pixel permutation and bit s...An improved color image encryption algorithm with pixel permutation and bit s...
An improved color image encryption algorithm with pixel permutation and bit s...eSAT Journals
 
An improved color image encryption algorithm with
An improved color image encryption algorithm withAn improved color image encryption algorithm with
An improved color image encryption algorithm witheSAT Publishing House
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Dr. Amarjeet Singh
 

What's hot (19)

H43064650
H43064650H43064650
H43064650
 
A Comparitive Analysis Of Steganography Techniques
A Comparitive Analysis Of Steganography TechniquesA Comparitive Analysis Of Steganography Techniques
A Comparitive Analysis Of Steganography Techniques
 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
 
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET-  	  Hybrid Approach to Text & Image Steganography using AES and LSB Te...IRJET-  	  Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
 
Digital Steganography in Computer Forensics
 Digital Steganography in Computer Forensics Digital Steganography in Computer Forensics
Digital Steganography in Computer Forensics
 
K0815660
K0815660K0815660
K0815660
 
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
 
An LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic TechniquesAn LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic Techniques
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
 
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...
 
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
 
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data Security
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
analysis on concealing information within non secret data
analysis on concealing information within non secret dataanalysis on concealing information within non secret data
analysis on concealing information within non secret data
 
An improved color image encryption algorithm with pixel permutation and bit s...
An improved color image encryption algorithm with pixel permutation and bit s...An improved color image encryption algorithm with pixel permutation and bit s...
An improved color image encryption algorithm with pixel permutation and bit s...
 
An improved color image encryption algorithm with
An improved color image encryption algorithm withAn improved color image encryption algorithm with
An improved color image encryption algorithm with
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
 

Viewers also liked

The Three Fates: Weaving Research Into a Product’s Destiny
The Three Fates: Weaving Research Into a Product’s DestinyThe Three Fates: Weaving Research Into a Product’s Destiny
The Three Fates: Weaving Research Into a Product’s Destinysusiesimondaniels
 
Búsqueda avanzada en google
Búsqueda avanzada en googleBúsqueda avanzada en google
Búsqueda avanzada en googleJhamy Pineda
 
Guía de construcción sostenible
Guía de construcción sostenibleGuía de construcción sostenible
Guía de construcción sostenibleMADERALDIA
 

Viewers also liked (8)

Valla publicitaria de mario nueva
Valla publicitaria de mario nuevaValla publicitaria de mario nueva
Valla publicitaria de mario nueva
 
The Three Fates: Weaving Research Into a Product’s Destiny
The Three Fates: Weaving Research Into a Product’s DestinyThe Three Fates: Weaving Research Into a Product’s Destiny
The Three Fates: Weaving Research Into a Product’s Destiny
 
Rambla
RamblaRambla
Rambla
 
K010316571
K010316571K010316571
K010316571
 
K017126670
K017126670K017126670
K017126670
 
Búsqueda avanzada en google
Búsqueda avanzada en googleBúsqueda avanzada en google
Búsqueda avanzada en google
 
Guía de construcción sostenible
Guía de construcción sostenibleGuía de construcción sostenible
Guía de construcción sostenible
 
E012474655
E012474655E012474655
E012474655
 

Similar to C010511420

Text in Image Hiding using Developed LSB and Random Method
Text in Image Hiding using Developed LSB and  Random Method Text in Image Hiding using Developed LSB and  Random Method
Text in Image Hiding using Developed LSB and Random Method IJECEIAES
 
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...Budi Prasetiyo
 
Secure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and SteganographySecure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and SteganographyIOSR Journals
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesRick Vogel
 
Image Steganography. Image Steganography. Image Steganography
Image Steganography. Image Steganography. Image SteganographyImage Steganography. Image Steganography. Image Steganography
Image Steganography. Image Steganography. Image SteganographyMonica Turner
 
A Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital ImagesA Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital Imagesijsrd.com
 
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD Editor
 
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...IJNSA Journal
 
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBijcsit
 
Information hiding in edge location of video using amalgamate fft and cubic s...
Information hiding in edge location of video using amalgamate fft and cubic s...Information hiding in edge location of video using amalgamate fft and cubic s...
Information hiding in edge location of video using amalgamate fft and cubic s...IAEME Publication
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYEMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYJournal For Research
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueJeff Brooks
 
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...ijsrd.com
 
IRJET- Application of Machine Learning for Data Security
IRJET-  	  Application of Machine Learning for Data SecurityIRJET-  	  Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data SecurityIRJET Journal
 

Similar to C010511420 (20)

Text in Image Hiding using Developed LSB and Random Method
Text in Image Hiding using Developed LSB and  Random Method Text in Image Hiding using Developed LSB and  Random Method
Text in Image Hiding using Developed LSB and Random Method
 
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
 
Secure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and SteganographySecure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and Steganography
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
 
Image Steganography. Image Steganography. Image Steganography
Image Steganography. Image Steganography. Image SteganographyImage Steganography. Image Steganography. Image Steganography
Image Steganography. Image Steganography. Image Steganography
 
A Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital ImagesA Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital Images
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
 
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
 
G017444651
G017444651G017444651
G017444651
 
G0210032039
G0210032039G0210032039
G0210032039
 
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
 
Information hiding in edge location of video using amalgamate fft and cubic s...
Information hiding in edge location of video using amalgamate fft and cubic s...Information hiding in edge location of video using amalgamate fft and cubic s...
Information hiding in edge location of video using amalgamate fft and cubic s...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
O017429398
O017429398O017429398
O017429398
 
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYEMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography Technique
 
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
 
H41034449
H41034449H41034449
H41034449
 
IRJET- Application of Machine Learning for Data Security
IRJET-  	  Application of Machine Learning for Data SecurityIRJET-  	  Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data Security
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 

Recently uploaded (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

C010511420

  • 1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 5, Ver. I (Sep - Oct .2015), PP 14-20 www.iosrjournals.org DOI: 10.9790/2834-10511420 www.iosrjournals.org 14 | Page Design of Random Scan Algorithm in Video Steganography for Security Purposes Sahil Gupta1 , Jyoti Saxena2 and Sukhjinder Singh3 1, 2, 3 Department of ECE, GianiZail SinghPTU campus, Bathinda-151001, Punjab (India) Abstract: Steganography is defined as the process of hiding information in a multimedia carrier. In this paper, video is taken as a carrier to hide information. To achieve Undetectability and robustness of the hidden data, Random Scan approach is used. To make the data more secure encryption is done on the data before hiding. Experimental results show that MSE, PSNR are better forMLSB technique whereas Correlation factor is better for Random scan technique. Keywords: Modified Least Significant bit (MLSB), Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR), Correlation. I. Introduction Internet is the fastest medium for communication but it faces many security related problems like hacking, copyright, eavesdropping etc.There are various techniques for security of data likecryptography and steganography. Cryptography is a technique which is used to secure the secrecy of communication. There are many different methods to encrypt and decrypt the data in order to keep the message secret. Unfortunately, it is not enough to keep the content of a message secret, at the same time it is also important to keep the existence of message secret. The technique in which the existence of hidden message is kept secret is called as steganography [1]. Steganography (literally meaning coveredwriting) dates back to ancient Greece, where common practices consisted of etching messages in wooden tablets and covering them with wax, and tattooing a shared messenger’s head, letting his hair grow back , then sharing it again when he arrived at his contact point [2]. Steganography is the art of hiding message into cover objects such as images, text, videos [3].Images had been mostly used media for data hiding. But now a day, video steganography is used for hiding data in a more secure hiding way than in images as data capacity of video is more than images. A Steganography system consists of three elements: cover object (which hides the secret message), the secret message and the stego object (which is the cover object with message embedded inside it) [4]. The paper is organized as follows; section II starts with literature Survey, section III gives the Experimental setup in which block diagram and algorithm with examples is explained. Section IV illustrates the results in which MSE, PSNR and Correlation factor ofRandom scan technique is compared with Modified LSB technique. The conclusion and scope of future work is discussed in section V. Fig. 1 Block Diagram of Steganography Figure 1 shows the fundamental block diagram of Steganography. In Steganography cover file and secret data is read. Then encryption algorithm is applied on secret data followed byhiding algorithm applied onencrypted data to hide in cover object. After thatstego object is transmitted.At receiver side recovery algorithm is applied on stego object for extracting secret data.
  • 2. Design of Random Scan Algorithm in Video Steganography for Security Purposes DOI: 10.9790/2834-10511420 www.iosrjournals.org 15 | Page II. Literature Survey In the literature, various steganography techniques for digital images have been proposed. However, the digital videos, one of the most suitable cover for data hiding was less considered. SamidhaSet.al [5], discussed various image steganography techniques based on spatial domain. Spatial domaintechniques are based on physical location of pixels in an image. Generally 8 bit gray level or color images can be used as a cover to hide data. Random bits from these bytes are used to replace the secret data bits. Bhautmageet.al[6], presented new technique for data embedding and extraction for AVI (audio video interleave) videos in which instead of changing the LSB of the cover file, the LSB and LSB+3 bits are changed in alternate bytes of the cover file. The secret message is encrypted by using a simple bit exchange method before the actual embedding process starts. An index is created for the secret information and the index is placed in a frame of the video itself. With the help of this index, the secret message can be extracted easily, which also reduce the extraction time. Dasguptaet.al [7],proposed hash based technique for video steganography. Eight bits of the secret information is divided into 3, 3, and 2 bits, and thenembedded into the RGB pixel values of the cover frames respectively. A hash function is used to select the position of insertion in LSB bits. Kelashet al. [8], proposed algorithm to hide message within part of frame or in whole frame based on HCV (histogram constant value). The random selection of frame increases security level and to increase embedding capacity, faded pixel were reduced in each frame. In this paper motivation is taken from [5, 6, 7 and 8] and proposed a technique for data hiding. In this technique before hiding, the encryption of data is done in which the negative of data is generated by doing complement. After that data is made to hide using Random Scan and MLSB Techniques. III. Experimental Setup In this work, Random Scan and MLSB techniques are implemented usingMatlab platform.Figure 2 shows the experimental set up of this process in which the secret message is hidden in anyvideo frame as cover. Cover Video: Video consists of images as well as audio. Hence both images and audio are considered for steganography. Frame Extraction: Frame extraction is the process of extracting frames from the video. Video is converted into frames. From the frames one frame is selected for embedding. Fig. 2 Experimental setup of Video Steganography Secret Message: The secret data is in any form like text, audio, image. In the proposed algorithm the encryption of data is done. For encryption the negative of data is generated. Embedding Algorithm: For embedding the encrypted data, Random Scan and MLSB technique is applied. In Random scan technique for hiding bits, 1 to 4 bits are taken from LSB side randomly because as the bit goes from 4th to 5th bit there is large variation in pixels whereas in MLSB technique, data is hidden at 2 LSB positions only. Stego Video: After embedding the encrypted data in frame, the reconstruction of video is done and stego video is generated. 3.1 Algorithm The step by step algorithm for video steganography is explained below: Step 1: Read the video file. Step 2: Extract the frame from video file. Step 3: Read the secret data
  • 3. Design of Random Scan Algorithm in Video Steganography for Security Purposes DOI: 10.9790/2834-10511420 www.iosrjournals.org 16 | Page Step 4: Encryption Algorithm is applied on secret data. Step 5: Split the data into 2-2 bits for hiding. Step 6: The encrypted data is hidden in cover frame using Random Scan and Modified LSB Technique. Step 7:Compare MSE and PSNR of random scan technique with MLSB technique. Example 1. Cover Frame Pixels Table 1 Cover Frame Pixel Cover data of Ist Row 01011010 01010101 11001100 10111011 Cover data of Second Row 00011100 00111100 11100001 10001000 2. Data value: 10110111 3. After Encryption Data Value: 01001000 4. Stego Frame Pixel values after Modified LSB Technique Table 2 Stego pixel after MLSB Technique Cover data of Ist Row 01011010 01010101 11001100 10111011 Encrypted data shifted to 2 LSB 00000000 00000010 00000000 00000001 Data Embedding using replacement 01011000 01010110 11001100 10111001 Bit Variation 2 bit 1 bit No 2 bit Cover data of 2nd Row 00011100 00111100 11100001 10001000 5. Stego Frame Pixel Values after apply Random Scan Technique Table 3Stego pixel after Random Scan Technique Cover data of ist Row 01011010 01010101 11001100 10111011 Encrypted data shifted to 2 LSB 00000000 00000010 00000000 00000001 Data Embedding using EXOR 01011010 01010111 11001100 10111010 Bit Variation No 2 bit No 1 bit Cover data of 2nd Row 00011100 00111100 11100001 10001000 3.2 Performance Metrics To measure the imperceptibility of steganography several metrics are used.The metrics indicate how similar or different the stego image is from cover image.The following metrics are used: 1. Mean Square Error (MSE) is computed by performing byte by byte comparison of the cover image and stego image. The Computation formula is expressed as[4] MSE = 1 M∗N Fij − Gij 2N 1 M 1 (1) M: numbers of rows of cover image N: number of column of Cover Image Fij: Pixel value from cover image Gij: Pixel value from Stego Image Higher value of MSE indicates dissimilarity between Cover image and Stego image. 2. Peak signal to noise ratio (PSNR) measures in decibels the quality of the stego image compared with the cover image. The higher the PSNR better the quality. PSNR is computedusing the following equation. PSNR = 20 log10 255 − 10 log10 MSE (2) 3. Correlation Factor: Correlation factor is one of the performance parameters. Correlation factor ‘r’ is the measure of extent and direction of linear combination of two random variables. If two variables are closely related, the correlation factor is close to the value 1. On the other hand, if the factor is close to 0, two variables are not related.
  • 4. Design of Random Scan Algorithm in Video Steganography for Security Purposes DOI: 10.9790/2834-10511420 www.iosrjournals.org 17 | Page r = Xi−Xm (Yi−Ym )i (Xi−Xmi )2 (Yi−Ym )2 i (3) Where Xi - Pixel intensity of original image Xm- Mean value of original image intensity Yi- Pixel intensity of encrypted image Ym - Mean value of encrypted image intensity IV. Results and Discussion In this paper, Random Scan and MLSB Techniquesare implemented in MATLAB 2013. The experiment is carried out on two different video files namely (visiontraffic.avi) and (atrium.avi) which is used as a cover file and six images are used as secret data. Cover media file In this process visiontraffic.avi and atrium.avi video having resolution of 360*640 has been used as a cover media. Figure 3 shows the frame extraction from visiontraffic.avi and atrium.avi video. Fig. 3 Frame Extraction from visiontraffic.avi and atrium.avi The features of these cover file have been shown in table 4. Table 4 Cover video S. No Cover video file information Name of video file Resolution (W*H) Frames/sec Total frames 1. Visiontraffi c.avi 360*640 29 531 2. atrium.avi 360*640 30 431 4.1 Secret data In this process image taken from MATLAB data base has been used as secret data which is to be hidden in cover media. Scene_right Parkinglot_right Vision team1 Vipstereo_halwayLeft Stopsigntest Yellowstone_right Fig.4 Secret data images
  • 5. Design of Random Scan Algorithm in Video Steganography for Security Purposes DOI: 10.9790/2834-10511420 www.iosrjournals.org 18 | Page The features of these secret images have been shown in table 5 Table 5 Secret Data S.No Secret data image information Name of image Size Format 1. Scene_right 284*512 Png 2. Vipstereo_halwayLeft 300*400 Png 3. Parkinglot_right 480*640 Png 4. Yellowstone_right 480*640 Png 5. Stopsigntest 368*653 Jpg 6. Vision team1 582*800 Jpg Stego Video The secret imageis embedded in cover video with the help of two techniques namely:  Random Scan method  Modified LSB method This is the stego frame generated after hiding parkinglot_right image in visiontraffic.avi video using Random scan technique. Fig. 5Stego Frame after hiding parkinglot_right image in cover Frame Similar stego frames can be generated after hiding othersecret images in cover files. For Steganography, the Correlation factor should be 1 for ideal Case so that there is no dissimilarity in stego image as compared to cover image. The MSE, PSNR and Correlation factor of Random Scan technique is compared with Modified LSB technique in table 6 and table 7 for visiontraffic and atrium video respectively. Table 6 Comparison of MSE, PSNR and Correlation values (visiontraffic.avi) Secret image Results obtained using Random Scan Results obtained using MLSB MSE PSNR Corre lation MSE PSNR Correl ation Parkinglot_right 4.87 43.25 .998 .370 47.76 .992 Scene_right 5.63 42.49 .998 .405 47.72 .992 Vision team1 5.53 42.59 .998 .383 47.74 .992 Vipstereo_halwayLeft 5.28 42.85 .998 .365 47.76 .992 Yellowstone_right 5.17 42.95 .998 .390 47.74 .992 Stopsigntest 5.27 42.85 .998 .437 47.69 .992 Table 7 Comparison of MSE, PSNR and Correlation values (atrium.avi) Secret image Results obtained using Random Scan Results obtained using MLSB MSE PSNR Corre lation MSE PSNR Corre lation Parkinglot_right 4.86 43.26 .999 .378 47.76 .987 Scene_right 5.70 42.42 .999 .405 47.72 .987 Vision team1 5.53 42.59 .999 .383 47.74 .987 Vipstereo_halwayLeft 5.38 42.74 .999 .365 47.76 .987 Yellowstone_right 5.17 42.95 .999 .390 47.74 .987 Stopsigntest 5.29 42.83 .999 .437 47.69 .987
  • 6. Design of Random Scan Algorithm in Video Steganography for Security Purposes DOI: 10.9790/2834-10511420 www.iosrjournals.org 19 | Page Fig.6Comparison of MSE, PSNR and Correlation factor using Random Scan and MLSB technique for Visiontraffic video Fig. 7Comparison of MSE, PSNR and Correlation factor using Random Scan and MLSB technique for atrium video Figure 6 and 7shows thatMSE using MLSB technique has less value as comparison to Random Scan technique. Becausethere is very small change in pixel value using MLSB technique, whereas PSNR using MLSB technique is more than Random scan technique. But Correlation factor using Random Scan Technique is better than MLSB Technique. Therefore Random scan technique is preferable over MLSB technique as per security concern. V. Conclusion In this work video is used as a carrier to embed secret message. In this technique the negative of secret image is made to hide in cover frame. So it is difficult to extract the original image from cover frame becausePixels are hidden at Random locations in cover frame pixels.Also even if an unknown person extracts the image from cover frame they get the negative of secret image.The figure 6 and 7 shows that the MLSB technique has better MSE and PSNR as compared to Random scan technique, but Correlation factor is better for Random scan technique. In Futuremore emphasis will be given on frequency domain due to better PSNR and MSE value as compared to spatial domain.
  • 7. Design of Random Scan Algorithm in Video Steganography for Security Purposes DOI: 10.9790/2834-10511420 www.iosrjournals.org 20 | Page References [1] S.D. Thepade and S.S. Chavan, Cosine, Walsh and Slant Wavelet Transforms for Robust Image Steganography, Tenth International Conference on Wireless and Optical Communications Networks (WOCN), 2013, 1-5. [2] K.S.Jenifer, G. Yogaraj and K. Rajalakshmi, 2014, approach for Video Steganography to embed Images, International Journal of Computer Science and Information Technologies, 5(1), 2014, 319-322. [3] R.G Bal, P.Ezhilarasu,An Efficient Safe and Secured Video Steganography Using Shadow Derivation, International Journal of Innovative Research in Computer and Communication Engineering, 2, 2014, 3251-3258. [4] I. Premi and S. Kaur,Random Scan Algorithm for image steganography inScilab for security purposes, International Journal of Advanced Research in Computer and Communication Engineering, 3(12), 2014, 8876-8879. [5] D. Samidha and D. Agrawal, Random Image Steganography in Spatial Domain, International Conference on Emerging Trends in VLSI, Embedded System, Nano Electronics and Telecommunication System, 2013, 1-3. [6] P. Bhautmage, A.J kumar and A. Dahatonde, Advanced Video Steganography Algorithm, International Journal of Engineering Research, 3(1) 2013, 1641-1644. [7] K. Dasgupta, J.K Mandal and P. Dutta,Hash Based Least Significant Bit Technique for Video Steganography, International Journal of Security, Privacy and Trust Management, 1(2), 2012, 1-11. [8] H.M. Kelash, O.F.A Wahab, O.A. Elshakankiry and H. S. El-sayed,Utilization of SteganographicTechniques in Video Sequences, International Journal of Computing and Network Technology, 2(1), 2014,17-24.