SlideShare a Scribd company logo
1 of 4
Download to read offline
Kamred Udham Singh Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 1), May 2014, pp.105-108
www.ijera.com 105 | P a g e
Video Steganography: Text Hiding In Video By LSB Substitution
Kamred Udham Singh*
*(Department of Computer Science, Faculty of Science Banaras Hindu University, Varanasi, (U.P.), INDIA)
ABSTRACT
The development of high speed computer networks and Internet has increased the easiness of Information
Communication. In contrast with Analog media and Digital media provide several different advantages such as
high quality, simple editing, high loyalty copying and authenticity. But in the field of data communication this
type of development has increased the fear of sneaking the data while sending data from the sender to the
receiver. Due to this reason Information Security is main problem of Data Communication. Steganography plays
an important role in field of Information Security. Video and images are very common choice for hiding data. It
is very important for effective and successful embedding process to select appropriate pixels in the video
frames, which are used to store the secret data. We use video based Steganography because of large size and
memory requirements. Hiding information in a carrier file we use least significant bit (LSB) insertion technique.
In Least significant bit (LSB) insertion technique, for hiding information we change LSB of video file with the
information bits .This paper will focus on hiding information in specific frames of the video and in specific
position of the frame by LSB substitution.
Keywords - Steganography, cover video, stego-video, secret message, Data hiding, LSB bit method
I. INTRODUCTION
Steganography is a Greek word which
means “covered or hidden writing”. The idea of
steganography is thousands of years old. The Greek
soldiers used to pass secret message they shave a
slave‟s head, tattoo a message on his head when the
hair grow again then the tattoo could not be seen.
Receiver shaves the head of slave and gets the
message from the tattoo [1]. Invisible ink was also
used during the World War II. Watermarking and
fingerprinting are closely related to steganography.
Data hiding can be used for secret transmission.
Steganography is a technique for hiding secret
information in digital image, audio and video to
secure information from third party [2]. Different
kind of techniques are proposed and already taken
into practice. The capacity of steganography is in
hiding the private data by indistinct, hiding its
existence in a non-secret carrier file. In this sense,
steganography is differing from cryptography, which
involves creating the content of the secret
information unreadable while not stopping non-
intended viewers from learning about its existence.
Steganography apply in various fields such
as military and industrial applications. Lossless
steganography techniques are use for secure and
successful transmission of information from sender to
receiver. Usually, steganography was based on hiding
secret message in digital image files. Recently, the
computer programmers start interest applying
steganographic techniques to video files as well as
audio files.
This time multimedia objects like image, audio, video
are used as a cover media by steganographic systems
because public often send digital pictures in email
and other Internet communication. The image file
formats are JPEG, GIF, BMP, audio file formats are
WAV, MP3, and video file formats are MPEG, MP4,
and AVI [3]. On the basis of nature of cover item,
Steganography technique can be separated into five
types [4].
1. Image
2. Audio
3. Video
4. Text
5. Protocol
II. Requirements of Hiding Message in
Digital Object:-
There are various embedding techniques that
enable us to hide secret message in a given object.
Meanwhile, whole methods definitely assure almost
all the requirements so that steganography can be
apply accurately [5].
Steganography techniques must satisfy these
following requirements:
a) The integrity of the hidden data must be accurate
after embedding it inside the stego object.
b) Robustness- The hidden data should be survived
through any processing operation through which
host signal undergoes and protect its loyalty.
c) Capacity-Maximize data embedding payload.
d) The stego object must stay unmodified or almost
unmodified to the bare eye.
e) Security- Use a security key.
RESEARCH ARTICLE OPEN ACCESS
Kamred Udham Singh Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 1), May 2014, pp.105-108
www.ijera.com 106 | P a g e
f) At a final point, we always presume that the
hacker knows that there is hidden data inside the
stego object.
Data hiding in object is the different idea
than cryptography, but it uses some basic principles
of cryptography [6].
III. Basic Model
The given figure depicts simple
representation of embedding and extracting process
in steganography. In this figure, a secret message is
being embedded inside a digital video to produce the
stego video using data embedding technique.
Figure 1 Structure of Steganography System
When stego object is produced then, it will
be send via some public communications channel to
receiver. The extracting process is simply the reverse
of the embedding process. The receiver must decode
the stego object to view the secret message by
applying an extracting algorithm/technique.
3.1 Digital video basics
Fig 2: Diagrammatic representation of bit distribution
of 16-bit (RGB), 24-bit (RGB), 32-bit (CMYK)
digital image
Digital video contains a set of frames
(images) which are played back at fixed frame rates
based on the video standards. Digital video Quality
depends on the combination of parameters like the
fps (frames per second), the number of pixels in a
frame, and frame size .The fps parameter standard is
very common video formats, it‟s value lies between
24 and 30 fps but the other two parameters, the
number of pixels in a frame and frame size present a
number of modified from one video standard to
another. Every image in a video called a frame which
contains number of pixels having three or four color
combinations like RGB (Red, Green, Blue) or
CMYK (Cyan, Magenta, Yellow, Black). The rest of
the mediator colors are composed from a mixture of
these primary colors [7], [8].Because the human eye
is mainly sensitive to green color, in few video
standards the number of bits of every color
combination may vary. Figure2 depicts 16-bit color
standard in which red and blue colors are containing
5 bits while the green color containing 6 bits .In 24-
bit RGB color standard, each red, green, and blue
color containing 8 bits in length and has 256
alternatives in color density. On the other hand 32-bit
CMYK color standard is required and this standard is
generally used in modern computer displays
[9].Audio Video Interleave (AVI) is a most common
sequence video format advanced by Microsoft and
IBM as a part of RIFF (Resource Interchange File
Format) in 1992. It contains various sequences of
dissimilar data types like audio and video sequences
which stores images in BMP (Bit Map) format. Thus,
without any major changes in AVI video sequences
capacity and resolution computations of bitmap
images can be applied.
IV. Video/Image Steganography
Today on the internet the most popular
image formats are Graphics Interchange Format
(GIF), Portable Network Graphics (PNG) and Joint
Photographic Experts Group (JPEG). Most of the
advanced techniques not use the structures of these
formats but they use the Bitmap format (BMP) for its
easy data structure [9].We use digital images for
steganography because of the weaknesses in the HVS
(human visual system) which has a low sensitivity in
random pattern changes. Due to this weakness the
secret message can be hiding into the cover video or
image without being noticed. As we described above,
a digital video contains a set of frames (digital
images) which are played back at fixed frame rates
based on the video standards. An image is a
collection of pixels and each pixel is a mixture of
three primary colors RGB (Red, Green and Blue).
Pixels in the image are show row by row
horizontally. Data hiding in the video/images get less
troubled as contrasted to other multimedia files.
When data is hiding in an image its size increase .So
compression techniques are required. Video/image
size can be decreased by compression technique.
There are two type compression techniques lossy and
lossless.
Algorithm of LSB with an Application The
proposed algorithm, both for encoding and decoding
along with application are given in this section.
Embedding and extracting technique is given.
Kamred Udham Singh Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 1), May 2014, pp.105-108
www.ijera.com 107 | P a g e
Algorithm of Embedding
Step 1: Input video object file.
Step 2: Read required message of the video.
Step 3: Split the video into frames.
Step 4: Find LSB bits of the cover frame.
Step 5: Get the position for embedding secret
message using function given in equation 1.
Step 6: Regenerate video frames.
Algorithm of Extracting
Step 1: Input stego video file.
Step 2: Read required message from the stego video.
Step 3: Split the video into frames.
Step 4: Find LSB bits of the stego frame.
Step 5: Obtain the position of embedded bits of the
secret message using function given in equation 1.
Step6: Regenerate video frames.
V. Proposed Approach
This proposed approach is based on video
Steganography for hiding message in the video
image, retrieving the hidden message from the video
using LSB (Least Significant Bit) modification
technique. LSB steganography techniques widely
used image in based steganographic and examine
under what conditions an observer can differentiate
between stego-images) and cover-images. Fig-3
depicts two video images, one is the carrier image of
the message and the other image is Stego image
which contain the hidden message. To identify the
difference between the original video and the Stego
video image is not possible.
Fig-3: Steganography using video image
Frame Extraction
Consider we have n number of frames that
are extracted from the video. The sound extraction
from the frames can be done with the help of
following equation.
…………… (1)
Where
= Starting Time of next Frame
Tis = Starting time of Current frame
t = Starting time of Sample
a = Amplitude of Sample
Si = Audio Sample Between frames.
Then the total video is given by the equation
Vi = Si + f ……………………………………….. (2)
The general equation for calculate the value
of whole video is given by
Vi = Concat |fisi + F(i+1).S(i+1)+-----------------------
-+F(i+n).S(i+n)|
VI. Least Significant Bit (LSB) Technique
Data is hided in video file with the help of
least significant bit (LSB) algorithm. LSB coding
technique has the advantage of low computational
complexity and very high watermark channel bit rate.
By this technique, least significant bits of the
individual pixels of carrier files are changed with the
message bits [11]. Each pixel has 3 bits of secret
message; one in each RGB component. For hiding
three bits of message in every pixel‟s color , we use
24-bit image like BMP (Bitmap). The human eye
cannot easily differentiate between 21-bit colors and
24-bit color [10]. 3 pixels of a 24-bit image are given
below:
(00100110 11101000 11001001)
(00100111 11001001 11101001)
(11001000 00100111 11101001)
Character „a‟ has an ASCII value 97 in
decimal and its equivalents binary value is 1100001.
These seven bits changed with the LSB of each seven
bit of carrier bytes.
(00100111 111010001 1001000)
(00100110 110010000 1101000)
(11001001 001001111 1101001)
With LSB technique a small difference in
the colors of the video image. This would be
extremely difficult for the human eye to discern the
difference. [12].
VII. VII Conclusion
There are various kinds of steganography
techniques are available to hide data in video but
LSB substitution is a simple technique. The above
mentioned approach is based on the research to hide
message into video images (AVI) which provides a
robust and secure way of data transmission. The
proposed embedded video steganography has many
advantages like user friendliness, simple and
Kamred Udham Singh Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 1), May 2014, pp.105-108
www.ijera.com 108 | P a g e
successful process of embedding secret message with
more security.
List of references
[1] Niels Provos and Peter Honeyman, “Hide
and Seek: An Introduction to
Steganography”, University of Michigan,
IEEE 2003
[2] Daniela Stanescu, Mircea Stratulat, Voicu
Groza, Joana Ghergulescu and Daniel
Borca, "Steganography in YUVcolor space",
IEEE International Workshop on Robotic
and Sensors Environments (ROSE 2007),
Ottawa-Canada, pp.1-4, October 2007
[3] P.Ramesh Babu, Digital Image Processing.
Scitech Publications., 2003.
[4] Johnson, N. F. and Jajodia, S. (1998).
Exploring steganography: Seeing the
unseen. Computer, 31(2): 26–34.
[5]. Jonathan Cummins, Patrick Diskin, Samuel
Lau and Robert Parlett, “Steganography and
digital watermarking” School of Computer
Science, The University of Birmingham.
2003. www.cs.unibo.it/people/phdstudents/
scacciag/home_files/teach/datahide.pdf.
[6] Debnath Bhattacharyya, P. Das, S.
Mukherjee, D. Ganguly, S.K.
Bandyopadhyay, Tai-hoon Kim, “A Secured
Technique for Image Data Hiding”,
Communications in Computer and
Information Science, Springer, June, 2009,
Vol. 29, pp. 151-159.
[7] Wang H., Wang S.,“Cyber warfare:
Steganography vs. Steganalysis”,
Communications of the ACM-Voting
Systems,Vol. 47, No. 10, pp. 76-82, 2004.
[8] Chincholkar A.A. and Urkude D.A.,
"Design and Implementation of Image
Steganography", Journal of Signal and
Image Processing, ISSN: 0976-8882 & E-
ISSN: 0976-8890, Volume 3, Issue 3, pp.
111-113, 2012
[9] Nagham Hamid, Abid Yahya, R. Badlishah
Ahmad and Osamah M. Al - Qershi, "Image
Steganography Techniques: an Overview",
International Journal of Computer Science
and Security (IJCSS), Volume (6) : Issue(3)
: 2012
[10] Mamta Juneja, Parvinder S. Sandhu, and
Ekta Walia,”Application of LSB Based
Steganographic Technique for 8-bit Color
Images”, WASET 2009
[11] Neeta Deshpande, Kamalapur Sneha, Daisy
Jacobs,―Implementation of LSB
Steganography and Its Evaluation for
various Bits Digital Information
Management, 2006 1st International
Conference on. 06/01/2007; DOI:
10.1109/ICDIM.2007.369349
[12] Sutaone, M.S.; Khandare, ”Image based
Steganography using LSB insertion
technique”, IET, 2008.

More Related Content

What's hot

A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...
IJRES Journal
 
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE  FOR SECURE CLOUD STORAGEDATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE  FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
IJTRET-International Journal of Trendy Research in Engineering and Technology
 
B03208016
B03208016B03208016
B03208016
inventy
 
Image to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant BitImage to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant Bit
YogeshIJTSRD
 
LOCALIZATION OF OVERLAID TEXT BASED ON NOISE INCONSISTENCIES
LOCALIZATION OF OVERLAID TEXT BASED ON NOISE INCONSISTENCIESLOCALIZATION OF OVERLAID TEXT BASED ON NOISE INCONSISTENCIES
LOCALIZATION OF OVERLAID TEXT BASED ON NOISE INCONSISTENCIES
aciijournal
 

What's hot (20)

Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
 
Digital Steganography in Computer Forensics
 Digital Steganography in Computer Forensics Digital Steganography in Computer Forensics
Digital Steganography in Computer Forensics
 
Encrypting an audio file based on integer wavelet transform and hand geometry
Encrypting an audio file based on integer wavelet transform and hand geometryEncrypting an audio file based on integer wavelet transform and hand geometry
Encrypting an audio file based on integer wavelet transform and hand geometry
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image Steganography
 
A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...
 
PVD BASED STEGNO.
PVD BASED STEGNO.PVD BASED STEGNO.
PVD BASED STEGNO.
 
Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143
 
Video steganography based on DCT psychovisual and object motion
Video steganography based on DCT psychovisual and object motionVideo steganography based on DCT psychovisual and object motion
Video steganography based on DCT psychovisual and object motion
 
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE  FOR SECURE CLOUD STORAGEDATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE  FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
 
An Approach for Securing Voice Communication via Image Watermarking Technique
An Approach for Securing Voice Communication via Image Watermarking TechniqueAn Approach for Securing Voice Communication via Image Watermarking Technique
An Approach for Securing Voice Communication via Image Watermarking Technique
 
B03208016
B03208016B03208016
B03208016
 
Image to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant BitImage to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant Bit
 
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMSECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
 
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET-  	  Hybrid Approach to Text & Image Steganography using AES and LSB Te...IRJET-  	  Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
 
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
 
H018114956
H018114956H018114956
H018114956
 
Image Encryption-Then-Compression System via Prediction Error Clustering and ...
Image Encryption-Then-Compression System via Prediction Error Clustering and ...Image Encryption-Then-Compression System via Prediction Error Clustering and ...
Image Encryption-Then-Compression System via Prediction Error Clustering and ...
 
LOCALIZATION OF OVERLAID TEXT BASED ON NOISE INCONSISTENCIES
LOCALIZATION OF OVERLAID TEXT BASED ON NOISE INCONSISTENCIESLOCALIZATION OF OVERLAID TEXT BASED ON NOISE INCONSISTENCIES
LOCALIZATION OF OVERLAID TEXT BASED ON NOISE INCONSISTENCIES
 
“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.
 
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING TECHNIQUES
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING  TECHNIQUES A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING  TECHNIQUES
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING TECHNIQUES
 

Viewers also liked

Clase1ramon 1211525742023353 9
Clase1ramon 1211525742023353 9Clase1ramon 1211525742023353 9
Clase1ramon 1211525742023353 9
Rodolfo baksys
 
2010 國家地理雜誌攝影大賽
2010 國家地理雜誌攝影大賽2010 國家地理雜誌攝影大賽
2010 國家地理雜誌攝影大賽
Jaing Lai
 
Sistema Evaluación Jueces
Sistema Evaluación JuecesSistema Evaluación Jueces
Sistema Evaluación Jueces
Pablo Estrada
 
静物摄影(Product shooting)
静物摄影(Product shooting)静物摄影(Product shooting)
静物摄影(Product shooting)
Tj64 gmj
 
高雅的鳥照片Great birdpicture
高雅的鳥照片Great birdpicture高雅的鳥照片Great birdpicture
高雅的鳥照片Great birdpicture
Jaing Lai
 
Smau padova 2013 stefano dindo
Smau padova 2013 stefano dindoSmau padova 2013 stefano dindo
Smau padova 2013 stefano dindo
SMAU
 

Viewers also liked (20)

Trees
TreesTrees
Trees
 
Clase1ramon 1211525742023353 9
Clase1ramon 1211525742023353 9Clase1ramon 1211525742023353 9
Clase1ramon 1211525742023353 9
 
Operações da configuração do windows
Operações da configuração do windowsOperações da configuração do windows
Operações da configuração do windows
 
Sobre o preconceito
Sobre o preconceitoSobre o preconceito
Sobre o preconceito
 
New Year Blessing
New Year BlessingNew Year Blessing
New Year Blessing
 
TPSC Ae exam qp_07112015
TPSC Ae exam qp_07112015TPSC Ae exam qp_07112015
TPSC Ae exam qp_07112015
 
Livro das Atas da Vereação da Câmara Municipal de Vila Real entre 18-04-1798 ...
Livro das Atas da Vereação da Câmara Municipal de Vila Real entre 18-04-1798 ...Livro das Atas da Vereação da Câmara Municipal de Vila Real entre 18-04-1798 ...
Livro das Atas da Vereação da Câmara Municipal de Vila Real entre 18-04-1798 ...
 
2010 國家地理雜誌攝影大賽
2010 國家地理雜誌攝影大賽2010 國家地理雜誌攝影大賽
2010 國家地理雜誌攝影大賽
 
Acciones Caie 2009
Acciones Caie 2009Acciones Caie 2009
Acciones Caie 2009
 
Sistema Evaluación Jueces
Sistema Evaluación JuecesSistema Evaluación Jueces
Sistema Evaluación Jueces
 
Tarefa 2ª semana
Tarefa 2ª semanaTarefa 2ª semana
Tarefa 2ª semana
 
Gast College
Gast CollegeGast College
Gast College
 
静物摄影(Product shooting)
静物摄影(Product shooting)静物摄影(Product shooting)
静物摄影(Product shooting)
 
Graduación y Servicio de gratitud.
Graduación y Servicio de gratitud.Graduación y Servicio de gratitud.
Graduación y Servicio de gratitud.
 
LEI N° 617-2013 DE 01-2013
LEI N° 617-2013 DE 01-2013LEI N° 617-2013 DE 01-2013
LEI N° 617-2013 DE 01-2013
 
高雅的鳥照片Great birdpicture
高雅的鳥照片Great birdpicture高雅的鳥照片Great birdpicture
高雅的鳥照片Great birdpicture
 
Interacao pea katia_danielle
Interacao pea katia_danielleInteracao pea katia_danielle
Interacao pea katia_danielle
 
Smau padova 2013 stefano dindo
Smau padova 2013 stefano dindoSmau padova 2013 stefano dindo
Smau padova 2013 stefano dindo
 
Haiku
HaikuHaiku
Haiku
 
唉!老嘍
唉!老嘍唉!老嘍
唉!老嘍
 

Similar to S4501105108

Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial IntelligenceVideo Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
ijtsrd
 

Similar to S4501105108 (20)

DCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video SequenceDCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video Sequence
 
A Study on Video Steganographic Techniques
A Study on Video Steganographic TechniquesA Study on Video Steganographic Techniques
A Study on Video Steganographic Techniques
 
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta Steganography
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial IntelligenceVideo Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
 
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
 
Ijetr042105
Ijetr042105Ijetr042105
Ijetr042105
 
A04020107
A04020107A04020107
A04020107
 
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
 
It3116411644
It3116411644It3116411644
It3116411644
 
Understanding Image Steganography with Practical Approach
Understanding Image Steganography with Practical ApproachUnderstanding Image Steganography with Practical Approach
Understanding Image Steganography with Practical Approach
 
1.pdf
1.pdf1.pdf
1.pdf
 
gyu.docx
gyu.docxgyu.docx
gyu.docx
 
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
G044082934
G044082934G044082934
G044082934
 
Ijmet 10 01_020
Ijmet 10 01_020Ijmet 10 01_020
Ijmet 10 01_020
 
H41034449
H41034449H41034449
H41034449
 
Advanced technique for video steganography with an encryption using LSB repl...
Advanced technique for video steganography with an  encryption using LSB repl...Advanced technique for video steganography with an  encryption using LSB repl...
Advanced technique for video steganography with an encryption using LSB repl...
 
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Recently uploaded (20)

Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

S4501105108

  • 1. Kamred Udham Singh Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 1), May 2014, pp.105-108 www.ijera.com 105 | P a g e Video Steganography: Text Hiding In Video By LSB Substitution Kamred Udham Singh* *(Department of Computer Science, Faculty of Science Banaras Hindu University, Varanasi, (U.P.), INDIA) ABSTRACT The development of high speed computer networks and Internet has increased the easiness of Information Communication. In contrast with Analog media and Digital media provide several different advantages such as high quality, simple editing, high loyalty copying and authenticity. But in the field of data communication this type of development has increased the fear of sneaking the data while sending data from the sender to the receiver. Due to this reason Information Security is main problem of Data Communication. Steganography plays an important role in field of Information Security. Video and images are very common choice for hiding data. It is very important for effective and successful embedding process to select appropriate pixels in the video frames, which are used to store the secret data. We use video based Steganography because of large size and memory requirements. Hiding information in a carrier file we use least significant bit (LSB) insertion technique. In Least significant bit (LSB) insertion technique, for hiding information we change LSB of video file with the information bits .This paper will focus on hiding information in specific frames of the video and in specific position of the frame by LSB substitution. Keywords - Steganography, cover video, stego-video, secret message, Data hiding, LSB bit method I. INTRODUCTION Steganography is a Greek word which means “covered or hidden writing”. The idea of steganography is thousands of years old. The Greek soldiers used to pass secret message they shave a slave‟s head, tattoo a message on his head when the hair grow again then the tattoo could not be seen. Receiver shaves the head of slave and gets the message from the tattoo [1]. Invisible ink was also used during the World War II. Watermarking and fingerprinting are closely related to steganography. Data hiding can be used for secret transmission. Steganography is a technique for hiding secret information in digital image, audio and video to secure information from third party [2]. Different kind of techniques are proposed and already taken into practice. The capacity of steganography is in hiding the private data by indistinct, hiding its existence in a non-secret carrier file. In this sense, steganography is differing from cryptography, which involves creating the content of the secret information unreadable while not stopping non- intended viewers from learning about its existence. Steganography apply in various fields such as military and industrial applications. Lossless steganography techniques are use for secure and successful transmission of information from sender to receiver. Usually, steganography was based on hiding secret message in digital image files. Recently, the computer programmers start interest applying steganographic techniques to video files as well as audio files. This time multimedia objects like image, audio, video are used as a cover media by steganographic systems because public often send digital pictures in email and other Internet communication. The image file formats are JPEG, GIF, BMP, audio file formats are WAV, MP3, and video file formats are MPEG, MP4, and AVI [3]. On the basis of nature of cover item, Steganography technique can be separated into five types [4]. 1. Image 2. Audio 3. Video 4. Text 5. Protocol II. Requirements of Hiding Message in Digital Object:- There are various embedding techniques that enable us to hide secret message in a given object. Meanwhile, whole methods definitely assure almost all the requirements so that steganography can be apply accurately [5]. Steganography techniques must satisfy these following requirements: a) The integrity of the hidden data must be accurate after embedding it inside the stego object. b) Robustness- The hidden data should be survived through any processing operation through which host signal undergoes and protect its loyalty. c) Capacity-Maximize data embedding payload. d) The stego object must stay unmodified or almost unmodified to the bare eye. e) Security- Use a security key. RESEARCH ARTICLE OPEN ACCESS
  • 2. Kamred Udham Singh Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 1), May 2014, pp.105-108 www.ijera.com 106 | P a g e f) At a final point, we always presume that the hacker knows that there is hidden data inside the stego object. Data hiding in object is the different idea than cryptography, but it uses some basic principles of cryptography [6]. III. Basic Model The given figure depicts simple representation of embedding and extracting process in steganography. In this figure, a secret message is being embedded inside a digital video to produce the stego video using data embedding technique. Figure 1 Structure of Steganography System When stego object is produced then, it will be send via some public communications channel to receiver. The extracting process is simply the reverse of the embedding process. The receiver must decode the stego object to view the secret message by applying an extracting algorithm/technique. 3.1 Digital video basics Fig 2: Diagrammatic representation of bit distribution of 16-bit (RGB), 24-bit (RGB), 32-bit (CMYK) digital image Digital video contains a set of frames (images) which are played back at fixed frame rates based on the video standards. Digital video Quality depends on the combination of parameters like the fps (frames per second), the number of pixels in a frame, and frame size .The fps parameter standard is very common video formats, it‟s value lies between 24 and 30 fps but the other two parameters, the number of pixels in a frame and frame size present a number of modified from one video standard to another. Every image in a video called a frame which contains number of pixels having three or four color combinations like RGB (Red, Green, Blue) or CMYK (Cyan, Magenta, Yellow, Black). The rest of the mediator colors are composed from a mixture of these primary colors [7], [8].Because the human eye is mainly sensitive to green color, in few video standards the number of bits of every color combination may vary. Figure2 depicts 16-bit color standard in which red and blue colors are containing 5 bits while the green color containing 6 bits .In 24- bit RGB color standard, each red, green, and blue color containing 8 bits in length and has 256 alternatives in color density. On the other hand 32-bit CMYK color standard is required and this standard is generally used in modern computer displays [9].Audio Video Interleave (AVI) is a most common sequence video format advanced by Microsoft and IBM as a part of RIFF (Resource Interchange File Format) in 1992. It contains various sequences of dissimilar data types like audio and video sequences which stores images in BMP (Bit Map) format. Thus, without any major changes in AVI video sequences capacity and resolution computations of bitmap images can be applied. IV. Video/Image Steganography Today on the internet the most popular image formats are Graphics Interchange Format (GIF), Portable Network Graphics (PNG) and Joint Photographic Experts Group (JPEG). Most of the advanced techniques not use the structures of these formats but they use the Bitmap format (BMP) for its easy data structure [9].We use digital images for steganography because of the weaknesses in the HVS (human visual system) which has a low sensitivity in random pattern changes. Due to this weakness the secret message can be hiding into the cover video or image without being noticed. As we described above, a digital video contains a set of frames (digital images) which are played back at fixed frame rates based on the video standards. An image is a collection of pixels and each pixel is a mixture of three primary colors RGB (Red, Green and Blue). Pixels in the image are show row by row horizontally. Data hiding in the video/images get less troubled as contrasted to other multimedia files. When data is hiding in an image its size increase .So compression techniques are required. Video/image size can be decreased by compression technique. There are two type compression techniques lossy and lossless. Algorithm of LSB with an Application The proposed algorithm, both for encoding and decoding along with application are given in this section. Embedding and extracting technique is given.
  • 3. Kamred Udham Singh Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 1), May 2014, pp.105-108 www.ijera.com 107 | P a g e Algorithm of Embedding Step 1: Input video object file. Step 2: Read required message of the video. Step 3: Split the video into frames. Step 4: Find LSB bits of the cover frame. Step 5: Get the position for embedding secret message using function given in equation 1. Step 6: Regenerate video frames. Algorithm of Extracting Step 1: Input stego video file. Step 2: Read required message from the stego video. Step 3: Split the video into frames. Step 4: Find LSB bits of the stego frame. Step 5: Obtain the position of embedded bits of the secret message using function given in equation 1. Step6: Regenerate video frames. V. Proposed Approach This proposed approach is based on video Steganography for hiding message in the video image, retrieving the hidden message from the video using LSB (Least Significant Bit) modification technique. LSB steganography techniques widely used image in based steganographic and examine under what conditions an observer can differentiate between stego-images) and cover-images. Fig-3 depicts two video images, one is the carrier image of the message and the other image is Stego image which contain the hidden message. To identify the difference between the original video and the Stego video image is not possible. Fig-3: Steganography using video image Frame Extraction Consider we have n number of frames that are extracted from the video. The sound extraction from the frames can be done with the help of following equation. …………… (1) Where = Starting Time of next Frame Tis = Starting time of Current frame t = Starting time of Sample a = Amplitude of Sample Si = Audio Sample Between frames. Then the total video is given by the equation Vi = Si + f ……………………………………….. (2) The general equation for calculate the value of whole video is given by Vi = Concat |fisi + F(i+1).S(i+1)+----------------------- -+F(i+n).S(i+n)| VI. Least Significant Bit (LSB) Technique Data is hided in video file with the help of least significant bit (LSB) algorithm. LSB coding technique has the advantage of low computational complexity and very high watermark channel bit rate. By this technique, least significant bits of the individual pixels of carrier files are changed with the message bits [11]. Each pixel has 3 bits of secret message; one in each RGB component. For hiding three bits of message in every pixel‟s color , we use 24-bit image like BMP (Bitmap). The human eye cannot easily differentiate between 21-bit colors and 24-bit color [10]. 3 pixels of a 24-bit image are given below: (00100110 11101000 11001001) (00100111 11001001 11101001) (11001000 00100111 11101001) Character „a‟ has an ASCII value 97 in decimal and its equivalents binary value is 1100001. These seven bits changed with the LSB of each seven bit of carrier bytes. (00100111 111010001 1001000) (00100110 110010000 1101000) (11001001 001001111 1101001) With LSB technique a small difference in the colors of the video image. This would be extremely difficult for the human eye to discern the difference. [12]. VII. VII Conclusion There are various kinds of steganography techniques are available to hide data in video but LSB substitution is a simple technique. The above mentioned approach is based on the research to hide message into video images (AVI) which provides a robust and secure way of data transmission. The proposed embedded video steganography has many advantages like user friendliness, simple and
  • 4. Kamred Udham Singh Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 1), May 2014, pp.105-108 www.ijera.com 108 | P a g e successful process of embedding secret message with more security. List of references [1] Niels Provos and Peter Honeyman, “Hide and Seek: An Introduction to Steganography”, University of Michigan, IEEE 2003 [2] Daniela Stanescu, Mircea Stratulat, Voicu Groza, Joana Ghergulescu and Daniel Borca, "Steganography in YUVcolor space", IEEE International Workshop on Robotic and Sensors Environments (ROSE 2007), Ottawa-Canada, pp.1-4, October 2007 [3] P.Ramesh Babu, Digital Image Processing. Scitech Publications., 2003. [4] Johnson, N. F. and Jajodia, S. (1998). Exploring steganography: Seeing the unseen. Computer, 31(2): 26–34. [5]. Jonathan Cummins, Patrick Diskin, Samuel Lau and Robert Parlett, “Steganography and digital watermarking” School of Computer Science, The University of Birmingham. 2003. www.cs.unibo.it/people/phdstudents/ scacciag/home_files/teach/datahide.pdf. [6] Debnath Bhattacharyya, P. Das, S. Mukherjee, D. Ganguly, S.K. Bandyopadhyay, Tai-hoon Kim, “A Secured Technique for Image Data Hiding”, Communications in Computer and Information Science, Springer, June, 2009, Vol. 29, pp. 151-159. [7] Wang H., Wang S.,“Cyber warfare: Steganography vs. Steganalysis”, Communications of the ACM-Voting Systems,Vol. 47, No. 10, pp. 76-82, 2004. [8] Chincholkar A.A. and Urkude D.A., "Design and Implementation of Image Steganography", Journal of Signal and Image Processing, ISSN: 0976-8882 & E- ISSN: 0976-8890, Volume 3, Issue 3, pp. 111-113, 2012 [9] Nagham Hamid, Abid Yahya, R. Badlishah Ahmad and Osamah M. Al - Qershi, "Image Steganography Techniques: an Overview", International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue(3) : 2012 [10] Mamta Juneja, Parvinder S. Sandhu, and Ekta Walia,”Application of LSB Based Steganographic Technique for 8-bit Color Images”, WASET 2009 [11] Neeta Deshpande, Kamalapur Sneha, Daisy Jacobs,―Implementation of LSB Steganography and Its Evaluation for various Bits Digital Information Management, 2006 1st International Conference on. 06/01/2007; DOI: 10.1109/ICDIM.2007.369349 [12] Sutaone, M.S.; Khandare, ”Image based Steganography using LSB insertion technique”, IET, 2008.