SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5



      Video Steganography by LSB Substitution Using Different Polynomial
                                 Equations
                                      A. Swathi 1, Dr. S.A.K Jilani, Ph.D2
 1                   2
     (M.tech Student, Professor,) Electronics and communication Engineering, Madanapalli Institute of Technology and science




Abstract:
         Video Steganography is a technique to hide any kind of files into a carrying Video file. The use of the video based
Steganography can be more eligible than other multimedia files, because of its size and memory requirements. The least
significant bit (LSB) insertion is an important approach for embedding information in a carrier file. Least significant bit (LSB)
insertion technique operates on LSB bit of the media file to hide the information bit. In this project, a data hiding scheme will
be developed to hide the information in specific frames of the video and in specific location of the frame by LSB substitution
using polynomial equation.

Keywords: least significant bit, Steganography
1. Introduction:
          Currently, internet and digital media are getting more and more popularity. So, requirement of secure transmission of
data also increased.For this reason various good techniques are proposed and already taken into practice. In this project, we
use the steganography process for the secure data transmission from the sender to receiver through the internet.

2. Steganography Introduction:
Steganography is the process of secretly embedding information inside a data source without changing its perceptual
quality.Steganography comes from the Greek word steganos which literally means “covered” and graphia which means
“writing”, i.e. covered writing. The most common use of steganography is to hide a file inside another file.
      Generally, in data hiding, the actual information is not maintained in its original format.The format is converted into an
alternative equivalent multimedia files like images, video or audio. Which in turn is being hidden within another object[7].
3. Block diagram:
              The basic block diagram representation for steganography mechanism is shown in the below figure.




                                             Fig 3. 1: Steganography mechanism

3.1 Block Diagram Explanation:
        The above figure shows a simple representation of the generic embedding and extraction process in steganography. In
this example ,a secret data is being embedded inside a cover image to produce the stego image. A key is often needed in the
embedding process.The embedding procedure is done by the sender by using the proper stego key. The recipient can Extract
the stego cover image in order to view the secret data by using the same key used by the sender. The stego image should look
almost identical to the cover image.



Issn 2250-3005(online)                                   September| 2012                                        Page 1620
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5



4. Least Significant Bit Insertion Method:
          Least Significant Bit (LSB) insertion is a common, simple approach to embedding information in a cover video.
Video is converted into a number of frames, and then convert each frame in to an image[6]. After that, the Least Significant
Bit (in other words the 8 bit) of some or all of the bytes inside an image is changed to a bit of each of the Red, Green and Blue
colour components can be used, since they are each represented by a byte. In other words one can store 3 bit in each pixel. An
800 x 600 pixel image can thus store a total amount of 1,440,000 bits or 180,000 bytes of embedded data. We implemented
our project such that it can accept and video of any size.
For example a grid for 3 pixels of a 24 bit image can be as follows:
                                               (00101101 00011100 11011100)
                                               (10100110 11000100 00001100)
                                               (11010010 10101101 01100011)
When the letter A, which binary representation is 01000001 and is embedded into the least significant bits of this part of the
image, the resulting grid is as follows:
                                            (00101100        00011101        11011100)
                                            (10100110        11000100       00001100)
                                            (11010010        10101101        01100011)

Although the letter was embedded into the first 8 bytes of the grid, only the 2 highlighted bits need to be changed according to
the embedded message. On average only half of the bit in an image will need to be modified to hide a secret message using the
maximum cover size.
         First we read the original video signal and text. We have to embed the text into the video signal. Then we have to
convert the text data into the binary format. Binary convertion is done by taking the ASCII
Value of the character and converting those ASCII values into binary format. We take the binary representation of samples of
cover signal and we insert the binary representation of text into that cover signal
         The LSB bits of video signals are replaced by the binary bits of data and this encoded signal is called stego signal is
ready for transmission through internet. For the steganography the important video format is Audio Video Interleave (AVI).
The message which we want to hide is converted into ASCII and then converted into its binary representation with each word
consist of 8bits.These bits are substituted in the Least Significant Bits of binary representation of each image ample. Suppose
if we want to hide letter A (01000001) in LSBs of binary signal.
          Here the polynomial equations are used to find the location of insertion of message binary bit in the video file.
Below process shows finding the location by using polynomial equations. After finding the location in audio file Least
Significant Bits are replaced as below process.
                  Y=X                         M1=3X+5                             M2=2X+5
                   123                   if X=1M1= 8                             M2=7
                   124                    X=2M1= 11                              M2=9
                  126                        :                                     :
                  128                        :                                     :
                   135                   X=10M1= 35                               M2=25
                   144
                  135 -------10111000-----10111000
                   156                                     11111110 AND operation by 254th bit
                   173                                   -------------------
                   192                                    10111000
                   203                                                 1 OR operation by message bit
                   257                                  --------------------
                   269                                    10111001
                   288                         If the message is mits., ASCII(m)-129 (10000001)
                                                 If we get same locations by two polynomials
                                                   Then 2 will be added to location.
                                              M1=22 M2=22 then M=22+2=24
                                      01110001 10011000 11001000 00110110
                                      10001101 11000111 01010011 10100011
                                 becomes
                                         01110000 10011001 11001000 00110110
                                         10001100 11000110 01010010 10100011


Issn 2250-3005(online)                                   September| 2012                                        Page 1621
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5



  5. Flow Chart for encoding:




                                             Fig 5.1 : Flow chart for encoding

Description about Encoding:
    First we will take the original video and text file in which we have to embed into original image. Then we have to convert
the video file into number of frames, we consider each frame as an image. Here we set the counter value to frames. Then we
have convert the text data into binary format. Binary convertion is done by taking the ASCII value of each character and
converting those ASCII values into binary format. We are going to set the counter value to the length of the binary message,
so that the loop re[peats that much times. The LSB bit of the image pixel is replaced by the binary data. This encoded image
called as stego video is ready for transmission through the internet.

5.1 Flow Chart for decoding:




                                             Fig 5.2 : Flow chart for Decoding



Issn 2250-3005(online)                                  September| 2012                                       Page 1622
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5




Description about Decoding:
         First we take the LSB encoded image. We will set the counter to the length of the binary data. Then we will extract
the binary data from the LSB encoded image by extracting the LSB bits of the image pixels. In order to form the text file from
the binary data we have to group all the binary bits.




         Cover Video                                                      Stego Video
Description:
By observing the above two figures we can simply say that both stego and cover videos are identically equal.

6. Conclusion:
          There are many kinds of steganography techniques are available among them hiding data in video by LSB
substitution is a simple method . Here the information will be embedded based on the stego key. Key is used in the form of
polynomial equations with different coefficients. By using this the capacity of embedding bits into the cover image can be
increased.

References
[1]   Ping Wah Wong and Edward J. Delp, editors. Security and Watermarking of Multimedia Contents, volume
      3657.Society of Photooptical Instrumentation Engineers, 1999.
[2]   Ping Wah Wong and Edward J. Delp, editors.Security and Watermarking of Multimedia Contents II, volume
      3971.Society of Photo-optical Instrumentation Engineers, 2000.
[3]   W. Bender, D. Gruhl , N. Morimoto , A. Lu : Techniques for data hiding, IBM SYSTEMS JOURNAL, VOL 35, NOS
      3&4, 1996
[4]   R. Anderson, F. Petitcolas : On the limits of the steganography, IEEE Journal Selected Areas in Communications, VOL
      .16, NO. 4 ,MAY 1998.
[5]   FABIEN A. P. PETITCOLAS, ROSS J. ANDERSON, AND MARKUS G. KUHN, Information Hiding—A Survey,
      PROCEEDINGS OF THE IEEE, VOL. 87, NO. 7, JULY 1999.
[6]   Deshpande Neeta, KamalapurSnehal, Daisy Jacobs: Implementation of LSB Steganography and Its Evaluation for
      Various Bits ,2001.
[7]   NedeljkoCvejic, TapioSeppben : Increasing the capacity of LSB-based video steganography ,IEEE 2002.
[8]   Dr D Mukhopadhyay, A Mukherjee, S Ghosh, S Biswas, P Chakarborty: An Approach for Message Hiding using
      Substitution Techniques and video Steganography, IEEE 2005.
[9]   Zhou Lin-na, Liu Cui-qing, Ping Xi-jian, Wang Yun-he : Information Hiding Method in Digital Audio Signal Based on
      Perfect Codes , Information Hiding and Multimedia Signal Processing, IEEE 2006.




Issn 2250-3005(online)                                  September| 2012                                        Page 1623

More Related Content

What's hot

GPU_Based_Image_Compression_and_Interpolation_with_Anisotropic_Diffusion
GPU_Based_Image_Compression_and_Interpolation_with_Anisotropic_DiffusionGPU_Based_Image_Compression_and_Interpolation_with_Anisotropic_Diffusion
GPU_Based_Image_Compression_and_Interpolation_with_Anisotropic_Diffusion
Vartika Sharma
 
Concealogram digital image in image using lsb insertion method
Concealogram digital image in image using lsb insertion methodConcealogram digital image in image using lsb insertion method
Concealogram digital image in image using lsb insertion method
IAEME Publication
 
Project pptVLSI ARCHITECTURE FOR AN IMAGE COMPRESSION SYSTEM USING VECTOR QUA...
Project pptVLSI ARCHITECTURE FOR AN IMAGE COMPRESSION SYSTEM USING VECTOR QUA...Project pptVLSI ARCHITECTURE FOR AN IMAGE COMPRESSION SYSTEM USING VECTOR QUA...
Project pptVLSI ARCHITECTURE FOR AN IMAGE COMPRESSION SYSTEM USING VECTOR QUA...
saumyatapu
 

What's hot (20)

Improved block based segmentation for jpeg compressed document images
Improved block based segmentation for jpeg compressed document imagesImproved block based segmentation for jpeg compressed document images
Improved block based segmentation for jpeg compressed document images
 
Kt3618371840
Kt3618371840Kt3618371840
Kt3618371840
 
Image compression .
Image compression .Image compression .
Image compression .
 
International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...
 
Digital image compression techniques
Digital image compression techniquesDigital image compression techniques
Digital image compression techniques
 
Content Based Image Retrieval Using 2-D Discrete Wavelet Transform
Content Based Image Retrieval Using 2-D Discrete Wavelet TransformContent Based Image Retrieval Using 2-D Discrete Wavelet Transform
Content Based Image Retrieval Using 2-D Discrete Wavelet Transform
 
GPU_Based_Image_Compression_and_Interpolation_with_Anisotropic_Diffusion
GPU_Based_Image_Compression_and_Interpolation_with_Anisotropic_DiffusionGPU_Based_Image_Compression_and_Interpolation_with_Anisotropic_Diffusion
GPU_Based_Image_Compression_and_Interpolation_with_Anisotropic_Diffusion
 
Content Based Video Retrieval in Transformed Domain using Fractional Coeffici...
Content Based Video Retrieval in Transformed Domain using Fractional Coeffici...Content Based Video Retrieval in Transformed Domain using Fractional Coeffici...
Content Based Video Retrieval in Transformed Domain using Fractional Coeffici...
 
Multi-Level Coding Efficiency with Improved Quality for Image Compression bas...
Multi-Level Coding Efficiency with Improved Quality for Image Compression bas...Multi-Level Coding Efficiency with Improved Quality for Image Compression bas...
Multi-Level Coding Efficiency with Improved Quality for Image Compression bas...
 
A novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacksA novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacks
 
Design of Image Compression Algorithm using MATLAB
Design of Image Compression Algorithm using MATLABDesign of Image Compression Algorithm using MATLAB
Design of Image Compression Algorithm using MATLAB
 
Discrete cosine transform
Discrete cosine transform   Discrete cosine transform
Discrete cosine transform
 
Concealogram digital image in image using lsb insertion method
Concealogram digital image in image using lsb insertion methodConcealogram digital image in image using lsb insertion method
Concealogram digital image in image using lsb insertion method
 
Image compression
Image compressionImage compression
Image compression
 
Effective Compression of Digital Video
Effective Compression of Digital VideoEffective Compression of Digital Video
Effective Compression of Digital Video
 
Image compression
Image compressionImage compression
Image compression
 
Secured Data Transmission Using Video Steganographic Scheme
Secured Data Transmission Using Video Steganographic SchemeSecured Data Transmission Using Video Steganographic Scheme
Secured Data Transmission Using Video Steganographic Scheme
 
image basics and image compression
image basics and image compressionimage basics and image compression
image basics and image compression
 
Digital Image Processing - Image Compression
Digital Image Processing - Image CompressionDigital Image Processing - Image Compression
Digital Image Processing - Image Compression
 
Project pptVLSI ARCHITECTURE FOR AN IMAGE COMPRESSION SYSTEM USING VECTOR QUA...
Project pptVLSI ARCHITECTURE FOR AN IMAGE COMPRESSION SYSTEM USING VECTOR QUA...Project pptVLSI ARCHITECTURE FOR AN IMAGE COMPRESSION SYSTEM USING VECTOR QUA...
Project pptVLSI ARCHITECTURE FOR AN IMAGE COMPRESSION SYSTEM USING VECTOR QUA...
 

Viewers also liked (6)

VIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHYVIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHY
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Video Steganography
Video SteganographyVideo Steganography
Video Steganography
 
Steganography
Steganography Steganography
Steganography
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Stegnography
StegnographyStegnography
Stegnography
 

Similar to IJCER (www.ijceronline.com) International Journal of computational Engineering research

Steganography - Anup Palarapwar
Steganography - Anup PalarapwarSteganography - Anup Palarapwar
Steganography - Anup Palarapwar
ANUP PALARAPWAR
 

Similar to IJCER (www.ijceronline.com) International Journal of computational Engineering research (20)

Steganography - Anup Palarapwar
Steganography - Anup PalarapwarSteganography - Anup Palarapwar
Steganography - Anup Palarapwar
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Video Stegnography
Video StegnographyVideo Stegnography
Video Stegnography
 
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
 
1. updated document ed sat
1. updated document ed sat1. updated document ed sat
1. updated document ed sat
 
Multimedia Steganography
Multimedia SteganographyMultimedia Steganography
Multimedia Steganography
 
A NOVEL METHOD FOR HIDING INFORMATION
A NOVEL METHOD FOR HIDING INFORMATIONA NOVEL METHOD FOR HIDING INFORMATION
A NOVEL METHOD FOR HIDING INFORMATION
 
A FRAGILE WATERMARKING BASED ON LEGENDRE TRANSFORM FOR COLOR IMAGES (FWLTCI)
A FRAGILE WATERMARKING BASED ON LEGENDRE TRANSFORM FOR COLOR IMAGES (FWLTCI)A FRAGILE WATERMARKING BASED ON LEGENDRE TRANSFORM FOR COLOR IMAGES (FWLTCI)
A FRAGILE WATERMARKING BASED ON LEGENDRE TRANSFORM FOR COLOR IMAGES (FWLTCI)
 
Internet of Things_ Securing Data using ASCII Value base Encryption and Image...
Internet of Things_ Securing Data using ASCII Value base Encryption and Image...Internet of Things_ Securing Data using ASCII Value base Encryption and Image...
Internet of Things_ Securing Data using ASCII Value base Encryption and Image...
 
C010511420
C010511420C010511420
C010511420
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
 
Presentation i
Presentation iPresentation i
Presentation i
 
Image steganography
Image steganographyImage steganography
Image steganography
 
A Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder PiracyA Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder Piracy
 
Introduction Data Compression/ Data compression, modelling and coding,Image C...
Introduction Data Compression/ Data compression, modelling and coding,Image C...Introduction Data Compression/ Data compression, modelling and coding,Image C...
Introduction Data Compression/ Data compression, modelling and coding,Image C...
 
Motion Compensation With Prediction Error Using Ezw Wavelet Coefficients
Motion Compensation With Prediction Error Using Ezw Wavelet CoefficientsMotion Compensation With Prediction Error Using Ezw Wavelet Coefficients
Motion Compensation With Prediction Error Using Ezw Wavelet Coefficients
 
Post-Segmentation Approach for Lossless Region of Interest Coding
Post-Segmentation Approach for Lossless Region of Interest CodingPost-Segmentation Approach for Lossless Region of Interest Coding
Post-Segmentation Approach for Lossless Region of Interest Coding
 
Is3314841490
Is3314841490Is3314841490
Is3314841490
 
B017110713
B017110713B017110713
B017110713
 
A Novel Method of Generating (Stream Cipher) Keys for Secure Communication
A Novel Method of Generating (Stream Cipher) Keys for Secure CommunicationA Novel Method of Generating (Stream Cipher) Keys for Secure Communication
A Novel Method of Generating (Stream Cipher) Keys for Secure Communication
 

IJCER (www.ijceronline.com) International Journal of computational Engineering research

  • 1. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5 Video Steganography by LSB Substitution Using Different Polynomial Equations A. Swathi 1, Dr. S.A.K Jilani, Ph.D2 1 2 (M.tech Student, Professor,) Electronics and communication Engineering, Madanapalli Institute of Technology and science Abstract: Video Steganography is a technique to hide any kind of files into a carrying Video file. The use of the video based Steganography can be more eligible than other multimedia files, because of its size and memory requirements. The least significant bit (LSB) insertion is an important approach for embedding information in a carrier file. Least significant bit (LSB) insertion technique operates on LSB bit of the media file to hide the information bit. In this project, a data hiding scheme will be developed to hide the information in specific frames of the video and in specific location of the frame by LSB substitution using polynomial equation. Keywords: least significant bit, Steganography 1. Introduction: Currently, internet and digital media are getting more and more popularity. So, requirement of secure transmission of data also increased.For this reason various good techniques are proposed and already taken into practice. In this project, we use the steganography process for the secure data transmission from the sender to receiver through the internet. 2. Steganography Introduction: Steganography is the process of secretly embedding information inside a data source without changing its perceptual quality.Steganography comes from the Greek word steganos which literally means “covered” and graphia which means “writing”, i.e. covered writing. The most common use of steganography is to hide a file inside another file. Generally, in data hiding, the actual information is not maintained in its original format.The format is converted into an alternative equivalent multimedia files like images, video or audio. Which in turn is being hidden within another object[7]. 3. Block diagram: The basic block diagram representation for steganography mechanism is shown in the below figure. Fig 3. 1: Steganography mechanism 3.1 Block Diagram Explanation: The above figure shows a simple representation of the generic embedding and extraction process in steganography. In this example ,a secret data is being embedded inside a cover image to produce the stego image. A key is often needed in the embedding process.The embedding procedure is done by the sender by using the proper stego key. The recipient can Extract the stego cover image in order to view the secret data by using the same key used by the sender. The stego image should look almost identical to the cover image. Issn 2250-3005(online) September| 2012 Page 1620
  • 2. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5 4. Least Significant Bit Insertion Method: Least Significant Bit (LSB) insertion is a common, simple approach to embedding information in a cover video. Video is converted into a number of frames, and then convert each frame in to an image[6]. After that, the Least Significant Bit (in other words the 8 bit) of some or all of the bytes inside an image is changed to a bit of each of the Red, Green and Blue colour components can be used, since they are each represented by a byte. In other words one can store 3 bit in each pixel. An 800 x 600 pixel image can thus store a total amount of 1,440,000 bits or 180,000 bytes of embedded data. We implemented our project such that it can accept and video of any size. For example a grid for 3 pixels of a 24 bit image can be as follows: (00101101 00011100 11011100) (10100110 11000100 00001100) (11010010 10101101 01100011) When the letter A, which binary representation is 01000001 and is embedded into the least significant bits of this part of the image, the resulting grid is as follows: (00101100 00011101 11011100) (10100110 11000100 00001100) (11010010 10101101 01100011) Although the letter was embedded into the first 8 bytes of the grid, only the 2 highlighted bits need to be changed according to the embedded message. On average only half of the bit in an image will need to be modified to hide a secret message using the maximum cover size. First we read the original video signal and text. We have to embed the text into the video signal. Then we have to convert the text data into the binary format. Binary convertion is done by taking the ASCII Value of the character and converting those ASCII values into binary format. We take the binary representation of samples of cover signal and we insert the binary representation of text into that cover signal The LSB bits of video signals are replaced by the binary bits of data and this encoded signal is called stego signal is ready for transmission through internet. For the steganography the important video format is Audio Video Interleave (AVI). The message which we want to hide is converted into ASCII and then converted into its binary representation with each word consist of 8bits.These bits are substituted in the Least Significant Bits of binary representation of each image ample. Suppose if we want to hide letter A (01000001) in LSBs of binary signal. Here the polynomial equations are used to find the location of insertion of message binary bit in the video file. Below process shows finding the location by using polynomial equations. After finding the location in audio file Least Significant Bits are replaced as below process. Y=X M1=3X+5 M2=2X+5 123 if X=1M1= 8 M2=7 124 X=2M1= 11 M2=9 126 : : 128 : : 135 X=10M1= 35 M2=25 144 135 -------10111000-----10111000 156 11111110 AND operation by 254th bit 173 ------------------- 192 10111000 203 1 OR operation by message bit 257 -------------------- 269 10111001 288 If the message is mits., ASCII(m)-129 (10000001) If we get same locations by two polynomials Then 2 will be added to location. M1=22 M2=22 then M=22+2=24 01110001 10011000 11001000 00110110 10001101 11000111 01010011 10100011 becomes 01110000 10011001 11001000 00110110 10001100 11000110 01010010 10100011 Issn 2250-3005(online) September| 2012 Page 1621
  • 3. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5 5. Flow Chart for encoding: Fig 5.1 : Flow chart for encoding Description about Encoding: First we will take the original video and text file in which we have to embed into original image. Then we have to convert the video file into number of frames, we consider each frame as an image. Here we set the counter value to frames. Then we have convert the text data into binary format. Binary convertion is done by taking the ASCII value of each character and converting those ASCII values into binary format. We are going to set the counter value to the length of the binary message, so that the loop re[peats that much times. The LSB bit of the image pixel is replaced by the binary data. This encoded image called as stego video is ready for transmission through the internet. 5.1 Flow Chart for decoding: Fig 5.2 : Flow chart for Decoding Issn 2250-3005(online) September| 2012 Page 1622
  • 4. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5 Description about Decoding: First we take the LSB encoded image. We will set the counter to the length of the binary data. Then we will extract the binary data from the LSB encoded image by extracting the LSB bits of the image pixels. In order to form the text file from the binary data we have to group all the binary bits. Cover Video Stego Video Description: By observing the above two figures we can simply say that both stego and cover videos are identically equal. 6. Conclusion: There are many kinds of steganography techniques are available among them hiding data in video by LSB substitution is a simple method . Here the information will be embedded based on the stego key. Key is used in the form of polynomial equations with different coefficients. By using this the capacity of embedding bits into the cover image can be increased. References [1] Ping Wah Wong and Edward J. Delp, editors. Security and Watermarking of Multimedia Contents, volume 3657.Society of Photooptical Instrumentation Engineers, 1999. [2] Ping Wah Wong and Edward J. Delp, editors.Security and Watermarking of Multimedia Contents II, volume 3971.Society of Photo-optical Instrumentation Engineers, 2000. [3] W. Bender, D. Gruhl , N. Morimoto , A. Lu : Techniques for data hiding, IBM SYSTEMS JOURNAL, VOL 35, NOS 3&4, 1996 [4] R. Anderson, F. Petitcolas : On the limits of the steganography, IEEE Journal Selected Areas in Communications, VOL .16, NO. 4 ,MAY 1998. [5] FABIEN A. P. PETITCOLAS, ROSS J. ANDERSON, AND MARKUS G. KUHN, Information Hiding—A Survey, PROCEEDINGS OF THE IEEE, VOL. 87, NO. 7, JULY 1999. [6] Deshpande Neeta, KamalapurSnehal, Daisy Jacobs: Implementation of LSB Steganography and Its Evaluation for Various Bits ,2001. [7] NedeljkoCvejic, TapioSeppben : Increasing the capacity of LSB-based video steganography ,IEEE 2002. [8] Dr D Mukhopadhyay, A Mukherjee, S Ghosh, S Biswas, P Chakarborty: An Approach for Message Hiding using Substitution Techniques and video Steganography, IEEE 2005. [9] Zhou Lin-na, Liu Cui-qing, Ping Xi-jian, Wang Yun-he : Information Hiding Method in Digital Audio Signal Based on Perfect Codes , Information Hiding and Multimedia Signal Processing, IEEE 2006. Issn 2250-3005(online) September| 2012 Page 1623