SlideShare a Scribd company logo
1 of 4
Download to read offline
B.suneetha Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 7( Version 3), July 2014, pp.243-246 
www.ijera.com 243 | P a g e 
Secured Data Transmission Using Video Steganographic Scheme 
B.suneetha Sr asst.professor, DADI Institute of Engineering &Technology,anakapalli Abstract Steganography is the art of hiding information in ways that avert the revealing of hiding messages. Video Steganography is focused on spatial and transform domain. Spatial domain algorithm directly embedded information in the cover image with no visual changes. This kind of algorithms has the advantage in Steganography capacity, but the disadvantage is weak robustness. Transform domain algorithm is embedding the secret information in the transform space. This kind of algorithms has the advantage of good stability, but the disadvantage of small capacity. These kinds of algorithms are vulnerable to steganalysis. This paper proposes a new Compressed Video Steganographic scheme. The data is hidden in the horizontal and the vertical components of the motion vectors. The PSNR value is calculated so that the quality of the video after the data hiding is evaluated. 
Index Terms—Data hiding, least significant bit(LSB), encryption, decryption, PSNR. 
I. INTRODUCTION 
A Steganography system, in general, is expected to meet three key requirements, namely, imperceptibility of embedding, accurate recovery of embedded information, and large payload (payload is the number of bits that get delivered to the end user at the destination) [1]. In a pure Steganography framework, the technique for embedding the message should be unidentified to anyone other than the sender and the receiver. An effective Steganography should posses the following characteristics [10-11]: Secrecy: Extraction of hidden data from the host medium should not be possible without the knowledge of the proper secret key used in the extracting procedure. Imperceptibility: After embedding the data in the medium, it should be imperceptible from the original medium. High capacity: The maximum length of the hidden message that can be embedded can be as long as possible. Resistance: The hidden data should be able to survive when the host medium has been manipulated, for example lossy compression scheme. Accurate extraction: The extraction of the hidden data from the medium should be accurate and reliable. This paper explains a way in which so that a video file is used as a host media to hide secret message without affecting the file structure and content of the video file. Because degradation in the quality of the cover object leads to noticeable change in the cover object which may leads to the failure of objective of Steganography. In this paper we consider the motion estimation stage of video compression. The contents are processed during video encoding/decoding. This 
makes less vulnerable to video steganalysis methods and is lossless coded, thus not prone to quantization distortions. The data bits of the message are hidden in motion vectors. A single bit is hidden in the least significant bit of the each motion vector. The rest of the paper is organized as follows: in Section II we overview the terms of video compression and decompression. The proposed method is given is explained briefly in Section III and algorithm for our proposed method is given in Section IV followed by the results and analyses in Section V. Finally, the paper is concluded in Section VI. 
II. OVERVIEW 
In this section, we overview lossy video compression to define our evaluation. There are three types of pictures (or frames) used in video compression: I-frames, P-frames, and B-frames centered mainly on amount of data compression. They are different in the following characteristics: 
 I- (Intra-coded) frames are the least compressible but don't require other video frames to decode. 
 P- (Predicted) frames use data from previous frames to decompress and are more compressible than I-frames. 
 B- (Bi-predictive) frames use both previous and forward frames for data reference to get the highest amount of data compression. 
RESEARCH ARTICLE OPEN ACCESS
B.suneetha Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 7( Version 3), July 2014, pp.243-246 
www.ijera.com 244 | P a g e 
Fig.1: Block diagram of the video Steganography using I, P, B frames separately At the encoder, the I- frame is encoded using image compression techniques. So the decoder reconstructs it. The I-frame is used as a reference frame for encoding P or B frames. In Motion Picture Expert Group (MPEG-2) standard, the video is ordered into groups of pictures (GOPs) whose frames are encoded in the sequence: [I,B,B,P,B,B,P,B,B]. The temporal redundancy between frames is exploited using block-based motion estimation which is applied on macroblocks Bijof size bb in P or B and searched in target frame(s). The motion field in video compression is translational with horizontal component dxand vertical component dy. It’s representation in vector form isd(x) for the spatial variables X = (x, y)in the underlying image. The search window is constrained by assigning limited n- bits for di.e., both dx anddy∈ [-2n-1, 2n-1-1]. An exhaustive search in the window of size b+2n X b+ 2n is done to find the optimal motion vector which satisfies the search criterion. Since d does not represent the true motion in the video, the compensated frame using (x + d(x)) is associated with a prediction error E(x) = (P - )(x) in order to be able to reconstruct P=with minimum distortion at the decoder in case of P frame. Similar operation is done for the B-frame but with the average of both the forward compensation from a previous reference frame and backward compensation from a next reference frame. E is of the size of an image and is thus lossy compressed using JPEG compression reducing its data size. The lossy compression quantization stage is a nonlinear process and for every motion estimation method, the pair (d,E) will be different and the data size D of the compressed error Ẽ will be different. The motion vectors d are lossless coded and thus become an attractive place to hide a message that can be extracted by a special decoder. 
The decoder receives the pair (d,Ẽ), applies motion compensation to form P or퐵 and decompress Ẽto obtain a reconstructed Er. Since E and Erare different by the effect of quantization,then the decoder in unable to reconstruct P identically but it alternatively reconstructs Pr= P + Er. The reconstruction quality is usually measured by the mean squared error P - Pr, represented as peak signal- to-noise ratio (PSNR) and we denote it by R. 
III. PROPOSED WORK 
A. Video Compression Video compression uses modern coding techniques to reduce redundancy in video data. Video compression typically operates on square-shaped groups of neighboring pixels, often called macro blocks. These pixel groups or blocks of pixels are compared from one frame to the next and the video compression code sends only the differences within those blocks. In areas of video with more motion, the compression must encode more data to keep up with the larger number of pixels that are changing. Generally, the motion field in video compression is assumed to be translational with horizontal component and vertical component and denoted in vector form by for the spatial variables in the underlying image. Such as three steps search, etc. Administrator chooses one video file along with one key compress and send to the member. The Authenticated member decompresses the video file and takes the second privacy key. Fig.2: Block diagram proposed model B. Motion Vector In video compression, a motion vector is used for motion estimation process. It is used to represent a macro block in a picture. Authenticated person after taking the second privacy key, can see the video in our application, in that video it can detect the motion vector. After seeing this, the member uses the key to see the message sent to the administrator. C. Encryption 
Encryption is the conversion of data into a form, called a cipher text that cannot be easily understood by unauthorized people. Original message is hidden
B.suneetha Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 7( Version 3), July 2014, pp.243-246 
www.ijera.com 245 | P a g e 
within a carrier such that the changes occurred in the carrier are not observable. The information about the private key is used to encrypt the text. D. Extraction of original data Decryption is the process of converting encrypted data back into its original form, so it can be understood. When the user inputs the correct key that is used at the decryption process, this will extract the original message that is encrypted and embedded. E. Peak signal-to-Noise Ratio Larger SNR and PSNR indicate a smallerdifference between the original (without noise) and reconstructed image. The main advantage of this measure is ease of computation but it does not reflect perceptual quality. An important property of PSNR is that a slight spatial shift of an image can cause a large numerical distortion but no visual distortion. 
IV. ALGORITHM FOR PROPOSED MODEL 
Algorithm for Encoding Step 1: Input cover video file or stream. Step 2: Read required information of the cover video. Step 3: Break the video into frames. Step 4: Compress the frame where the data is to be inserted using any compression technique, DCT was used in this paper. Step 5: The data was hide using LSB algorithm. Algorithm for Decoding Step 1: Input stego video file or stream. Step 2: Read required information from the stego video. Step 3: Break the video into frames. Step 4:Using the motion vector, the frame where the data is hide is chosen. Step 5:The data is extracted from the LSBs of the identified frame. 
V. EXPERIMENTAL RESULTS 
Any Steganography technique is characterizedmainly by two attributes, imperceptibility andcapacity. Imperceptibility means the embeddeddata must be imperceptible to the observer(perceptual invisibility) and computer analysis (statistical invisibility). The performance of the proposed technique is evaluated using five different video streams (bulb.avi, pearson.avi, plot.avi, sample.avi and sinewave.avi)and one secret data.The perceptual imperceptibility of the embedded data is indicated by comparing the original image or video to its stego counterpart so that their visual differences, if any, can be determined. 
Table 1: Cover video file information 
Table 2: Obtained results information Additionally, as an objective measure, the Mean squared Error (MSE), Peak Signal to Noise Ratio (PSNR) between the stego frame and its corresponding cover frame are studied. The quantities are given as below. (1) Where, MSE is Mean Square error, H and W are height width and P (i,j) represents original frame and S(i,j) represents corresponding stego frame. PSNR= 10 log (2) where, PSNR is peak signal to noise ratio, L istakenas 255.The cover file video details are given in Table 1 and results are tabulated in Table 2. 
VI. CONCLUSION 
In this paper, we propose and investigate the data hiding method using the motion vector techniquefor the moving objects, operating directly incompressed domain. This algorithm provides high capacityand imperceptible stego-image for humanvision of the hidden secret information. By embedding the data in the moving objects the quality of the video is increased. In this paper, the compressed video is used for the data transmission since it can hold large 
Video name 
Resolution (W*H) 
Frame/Sec. 
No. of Frames 
size 
Bulb 
232 X 232 
15 
80 
740KB 
Person 
356 X 244 
15 
50 
199KB 
Plot 
560 X 420 
15 
40 
26.9MB 
Sample 
611 X 352 
12 
60 
555KB 
Sine wave 
436 X 344 
10 
101 
460KB 
Video Name 
PSNR (dB) 
MSE 
Payload (Bytes) 
ΔD (Bytes) 
ΔR /Frame (dB) 
Bulb 
38.71 
9.51 
4439 
42014 
0.483 
Person 
37.14 
12.55 
2545 
23267 
0.742 
Plot 
34.07 
25.44 
3032 
27302 
0.851 
Sample 
38.52 
9.13 
3054 
30874 
0.642 
Sine wave 
33.87 
26.94 
2286 
22726 
0.335
B.suneetha Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 7( Version 3), July 2014, pp.243-246 
www.ijera.com 246 | P a g e 
volume of the data. The adaptive based compression technique is evaluated such that the data is embedding in the vertical and horizontal component pixels. The PSNR value is calculated to show that the frame is transmitted without any loss or distortion. As a result, the motion vector technique is found as the better solution since it hides the data in the moving objects rather than in the still pictures. The encryption enhances the security of the data being transmitted. REFERENCES 
[1] Hussein A. Aly, “Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error”, Ieee Transactions On Information Forensics And Security, Vol. 6, No. 1, March 2011 
[2] J. Zhang, J. Li, and L. Zhang, “Video watermark technique in motion vector,” in Proc. XIV Symp. Computer Graphics and Image Processing, Oct. 2001, pp. 179–182. 
[3] C. Xu, X. Ping, and T. Zhang, “Steganography in compressed video stream,” in Proc. Int. Conf. Innovative Computing, Information and Control (ICICIC’06), 2006, vol. II, pp. 803–806. 
[4] P.Wang, Z. Zheng, and J. Ying, “A novel videowatermark technique in motion vectors,” in Int. Conf. Audio, Language and Image Processing (ICALIP), Jul. 2008, pp. 1555–1559. 
[5] S. K. Kapotas, E. E. Varsaki, and A. N. Skodras, “Data hiding in H.264 encoded video sequences,” in IEEE 9th Workshop on Multimedia Signal Processing (MMSP07), Oct. 2007, pp. 373–376. 
[6] D.-Y. Fang and L.-W. Chang, “Data hiding for digital video with phase of motion vector,” in Proc. Int. Symp. Circuits and Systems (ISCAS), 2006, pp. 1422–1425. 
[7] X. He and Z. Luo, “A novel steganographic algorithm based on the motion vector phase,” in Proc. Int. Conf. Comp. Sc. and Software Eng., 2008, pp. 822–825. 
[8] Mamta Juneja, Parvinder S. Sandhu, and Ekta Walia ”Application of LSB Based Steganographic Technique for 8-bit Color Images, World Academy of Science, Engineering and Technology 50 2009 Published 
[9] Mritha Ramalingam “Stego Machine – Video Steganography usingModified LSB Algorithm”,World Academy of Science, Engineering and Technology 74 2011 Published 
[10] Saurabh SinghInvertis University Bareilly, India and Gaurav Agarwal Invertis University Bareilly, India “Hiding image to 
video: A new approach of LSBreplacement”, International Journal of Engineering Science and TechnologyVol. 2(12),2010,6999-7003Published 
[11] JOSEPHGILVARRY School of Computer Applications Dublin City University “Calculationof Motion Using Motion Vectors Extracted from an MPEG Stream” Technical report 20 September 1999 Dublin City University Published

More Related Content

What's hot

Optimization of image compression and ciphering based on EZW techniques
Optimization of image compression and ciphering based on EZW techniquesOptimization of image compression and ciphering based on EZW techniques
Optimization of image compression and ciphering based on EZW techniquesTELKOMNIKA JOURNAL
 
Thesis on Image compression by Manish Myst
Thesis on Image compression by Manish MystThesis on Image compression by Manish Myst
Thesis on Image compression by Manish MystManish Myst
 
Uncompressed Image Steganography using BPCS: Survey and Analysis
Uncompressed Image Steganography using BPCS: Survey and AnalysisUncompressed Image Steganography using BPCS: Survey and Analysis
Uncompressed Image Steganography using BPCS: Survey and AnalysisIOSR Journals
 
Data Steganography for Optical Color Image Cryptosystems
Data Steganography for Optical Color Image CryptosystemsData Steganography for Optical Color Image Cryptosystems
Data Steganography for Optical Color Image CryptosystemsCSCJournals
 
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYEMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYJournal For Research
 
Di2644594461
Di2644594461Di2644594461
Di2644594461IJMER
 
Compression: Video Compression (MPEG and others)
Compression: Video Compression (MPEG and others)Compression: Video Compression (MPEG and others)
Compression: Video Compression (MPEG and others)danishrafiq
 
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSIONSECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSIONsipij
 
IMAGE COMPRESSION AND DECOMPRESSION SYSTEM
IMAGE COMPRESSION AND DECOMPRESSION SYSTEMIMAGE COMPRESSION AND DECOMPRESSION SYSTEM
IMAGE COMPRESSION AND DECOMPRESSION SYSTEMVishesh Banga
 
Digital Image Processing - Image Compression
Digital Image Processing - Image CompressionDigital Image Processing - Image Compression
Digital Image Processing - Image CompressionMathankumar S
 
High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...
High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...
High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...Dr. Amarjeet Singh
 
A Study of Image Compression Methods
A Study of Image Compression MethodsA Study of Image Compression Methods
A Study of Image Compression MethodsIOSR Journals
 
High capacity histogram shifting based reversible data hiding with data compr...
High capacity histogram shifting based reversible data hiding with data compr...High capacity histogram shifting based reversible data hiding with data compr...
High capacity histogram shifting based reversible data hiding with data compr...IAEME Publication
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking BasicsIOSR Journals
 

What's hot (20)

Optimization of image compression and ciphering based on EZW techniques
Optimization of image compression and ciphering based on EZW techniquesOptimization of image compression and ciphering based on EZW techniques
Optimization of image compression and ciphering based on EZW techniques
 
Thesis on Image compression by Manish Myst
Thesis on Image compression by Manish MystThesis on Image compression by Manish Myst
Thesis on Image compression by Manish Myst
 
Uncompressed Image Steganography using BPCS: Survey and Analysis
Uncompressed Image Steganography using BPCS: Survey and AnalysisUncompressed Image Steganography using BPCS: Survey and Analysis
Uncompressed Image Steganography using BPCS: Survey and Analysis
 
Gg3311121115
Gg3311121115Gg3311121115
Gg3311121115
 
O017429398
O017429398O017429398
O017429398
 
Data Steganography for Optical Color Image Cryptosystems
Data Steganography for Optical Color Image CryptosystemsData Steganography for Optical Color Image Cryptosystems
Data Steganography for Optical Color Image Cryptosystems
 
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYEMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
 
E04552327
E04552327E04552327
E04552327
 
M017427985
M017427985M017427985
M017427985
 
Di2644594461
Di2644594461Di2644594461
Di2644594461
 
Compression: Video Compression (MPEG and others)
Compression: Video Compression (MPEG and others)Compression: Video Compression (MPEG and others)
Compression: Video Compression (MPEG and others)
 
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSIONSECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
 
IMAGE COMPRESSION AND DECOMPRESSION SYSTEM
IMAGE COMPRESSION AND DECOMPRESSION SYSTEMIMAGE COMPRESSION AND DECOMPRESSION SYSTEM
IMAGE COMPRESSION AND DECOMPRESSION SYSTEM
 
J017426467
J017426467J017426467
J017426467
 
Digital Image Processing - Image Compression
Digital Image Processing - Image CompressionDigital Image Processing - Image Compression
Digital Image Processing - Image Compression
 
High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...
High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...
High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...
 
Jpeg and mpeg ppt
Jpeg and mpeg pptJpeg and mpeg ppt
Jpeg and mpeg ppt
 
A Study of Image Compression Methods
A Study of Image Compression MethodsA Study of Image Compression Methods
A Study of Image Compression Methods
 
High capacity histogram shifting based reversible data hiding with data compr...
High capacity histogram shifting based reversible data hiding with data compr...High capacity histogram shifting based reversible data hiding with data compr...
High capacity histogram shifting based reversible data hiding with data compr...
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking Basics
 

Viewers also liked

Hydrogeological Studies At Jalakandapuram Sub – Basin Of Sarabanga Minor Basi...
Hydrogeological Studies At Jalakandapuram Sub – Basin Of Sarabanga Minor Basi...Hydrogeological Studies At Jalakandapuram Sub – Basin Of Sarabanga Minor Basi...
Hydrogeological Studies At Jalakandapuram Sub – Basin Of Sarabanga Minor Basi...IJERA Editor
 
General Solution of Equations of Motion of Axisymmetric Problem of Micro-Isot...
General Solution of Equations of Motion of Axisymmetric Problem of Micro-Isot...General Solution of Equations of Motion of Axisymmetric Problem of Micro-Isot...
General Solution of Equations of Motion of Axisymmetric Problem of Micro-Isot...IJERA Editor
 
Effects of Soil and Air Drying Methods on Soil Plasticity of Different Cities...
Effects of Soil and Air Drying Methods on Soil Plasticity of Different Cities...Effects of Soil and Air Drying Methods on Soil Plasticity of Different Cities...
Effects of Soil and Air Drying Methods on Soil Plasticity of Different Cities...IJERA Editor
 
Research on Automobile Exterior Color and Interior Color Matching
Research on Automobile Exterior Color and Interior Color MatchingResearch on Automobile Exterior Color and Interior Color Matching
Research on Automobile Exterior Color and Interior Color MatchingIJERA Editor
 
Reviewing the factors of the Renewable Energy systems for Improving the Energ...
Reviewing the factors of the Renewable Energy systems for Improving the Energ...Reviewing the factors of the Renewable Energy systems for Improving the Energ...
Reviewing the factors of the Renewable Energy systems for Improving the Energ...IJERA Editor
 
Non-life claims reserves using Dirichlet random environment
Non-life claims reserves using Dirichlet random environmentNon-life claims reserves using Dirichlet random environment
Non-life claims reserves using Dirichlet random environmentIJERA Editor
 
Degradation and Microbiological Validation of Meropenem Antibiotic in Aqueous...
Degradation and Microbiological Validation of Meropenem Antibiotic in Aqueous...Degradation and Microbiological Validation of Meropenem Antibiotic in Aqueous...
Degradation and Microbiological Validation of Meropenem Antibiotic in Aqueous...IJERA Editor
 
Two-temperature elasto-thermo diffusive response inside a spherical shell wit...
Two-temperature elasto-thermo diffusive response inside a spherical shell wit...Two-temperature elasto-thermo diffusive response inside a spherical shell wit...
Two-temperature elasto-thermo diffusive response inside a spherical shell wit...IJERA Editor
 
Assessment of sanitation levels of sources of water in Osun State Capital, Ni...
Assessment of sanitation levels of sources of water in Osun State Capital, Ni...Assessment of sanitation levels of sources of water in Osun State Capital, Ni...
Assessment of sanitation levels of sources of water in Osun State Capital, Ni...IJERA Editor
 

Viewers also liked (20)

Hydrogeological Studies At Jalakandapuram Sub – Basin Of Sarabanga Minor Basi...
Hydrogeological Studies At Jalakandapuram Sub – Basin Of Sarabanga Minor Basi...Hydrogeological Studies At Jalakandapuram Sub – Basin Of Sarabanga Minor Basi...
Hydrogeological Studies At Jalakandapuram Sub – Basin Of Sarabanga Minor Basi...
 
J046015861
J046015861J046015861
J046015861
 
Br044426429
Br044426429Br044426429
Br044426429
 
General Solution of Equations of Motion of Axisymmetric Problem of Micro-Isot...
General Solution of Equations of Motion of Axisymmetric Problem of Micro-Isot...General Solution of Equations of Motion of Axisymmetric Problem of Micro-Isot...
General Solution of Equations of Motion of Axisymmetric Problem of Micro-Isot...
 
D49032225
D49032225D49032225
D49032225
 
Effects of Soil and Air Drying Methods on Soil Plasticity of Different Cities...
Effects of Soil and Air Drying Methods on Soil Plasticity of Different Cities...Effects of Soil and Air Drying Methods on Soil Plasticity of Different Cities...
Effects of Soil and Air Drying Methods on Soil Plasticity of Different Cities...
 
F046063538
F046063538F046063538
F046063538
 
Research on Automobile Exterior Color and Interior Color Matching
Research on Automobile Exterior Color and Interior Color MatchingResearch on Automobile Exterior Color and Interior Color Matching
Research on Automobile Exterior Color and Interior Color Matching
 
Reviewing the factors of the Renewable Energy systems for Improving the Energ...
Reviewing the factors of the Renewable Energy systems for Improving the Energ...Reviewing the factors of the Renewable Energy systems for Improving the Energ...
Reviewing the factors of the Renewable Energy systems for Improving the Energ...
 
Non-life claims reserves using Dirichlet random environment
Non-life claims reserves using Dirichlet random environmentNon-life claims reserves using Dirichlet random environment
Non-life claims reserves using Dirichlet random environment
 
R0450697101
R0450697101R0450697101
R0450697101
 
Degradation and Microbiological Validation of Meropenem Antibiotic in Aqueous...
Degradation and Microbiological Validation of Meropenem Antibiotic in Aqueous...Degradation and Microbiological Validation of Meropenem Antibiotic in Aqueous...
Degradation and Microbiological Validation of Meropenem Antibiotic in Aqueous...
 
W04406104107
W04406104107W04406104107
W04406104107
 
Two-temperature elasto-thermo diffusive response inside a spherical shell wit...
Two-temperature elasto-thermo diffusive response inside a spherical shell wit...Two-temperature elasto-thermo diffusive response inside a spherical shell wit...
Two-temperature elasto-thermo diffusive response inside a spherical shell wit...
 
Assessment of sanitation levels of sources of water in Osun State Capital, Ni...
Assessment of sanitation levels of sources of water in Osun State Capital, Ni...Assessment of sanitation levels of sources of water in Osun State Capital, Ni...
Assessment of sanitation levels of sources of water in Osun State Capital, Ni...
 
A045040110
A045040110A045040110
A045040110
 
P0460699102
P0460699102P0460699102
P0460699102
 
Ab04404170177
Ab04404170177Ab04404170177
Ab04404170177
 
J42036572
J42036572J42036572
J42036572
 
C044041723
C044041723C044041723
C044041723
 

Similar to Secured Data Transmission Using Video Steganographic Scheme

IRJET - Information Hiding in H.264/AVC using Digital Watermarking
IRJET -  	  Information Hiding in H.264/AVC using Digital WatermarkingIRJET -  	  Information Hiding in H.264/AVC using Digital Watermarking
IRJET - Information Hiding in H.264/AVC using Digital WatermarkingIRJET Journal
 
DCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video SequenceDCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video SequenceIJERA Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
An overview Survey on Various Video compressions and its importance
An overview Survey on Various Video compressions and its importanceAn overview Survey on Various Video compressions and its importance
An overview Survey on Various Video compressions and its importanceINFOGAIN PUBLICATION
 
Information hiding in edge location of video using amalgamate fft and cubic s...
Information hiding in edge location of video using amalgamate fft and cubic s...Information hiding in edge location of video using amalgamate fft and cubic s...
Information hiding in edge location of video using amalgamate fft and cubic s...IAEME Publication
 
Image Compression Using Intra Prediction of H.264/AVC and Implement of Hiding...
Image Compression Using Intra Prediction of H.264/AVC and Implement of Hiding...Image Compression Using Intra Prediction of H.264/AVC and Implement of Hiding...
Image Compression Using Intra Prediction of H.264/AVC and Implement of Hiding...ijsrd.com
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...IRJET Journal
 
Final PPT.pptx (1).pptx
Final PPT.pptx (1).pptxFinal PPT.pptx (1).pptx
Final PPT.pptx (1).pptxgopikahari7
 
A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNEL
A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNELA NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNEL
A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNELijcsit
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganographysipij
 

Similar to Secured Data Transmission Using Video Steganographic Scheme (20)

It3116411644
It3116411644It3116411644
It3116411644
 
A0540106
A0540106A0540106
A0540106
 
IRJET - Information Hiding in H.264/AVC using Digital Watermarking
IRJET -  	  Information Hiding in H.264/AVC using Digital WatermarkingIRJET -  	  Information Hiding in H.264/AVC using Digital Watermarking
IRJET - Information Hiding in H.264/AVC using Digital Watermarking
 
A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...
A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...
A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...
 
DCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video SequenceDCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video Sequence
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data Security
 
C010511420
C010511420C010511420
C010511420
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
An overview Survey on Various Video compressions and its importance
An overview Survey on Various Video compressions and its importanceAn overview Survey on Various Video compressions and its importance
An overview Survey on Various Video compressions and its importance
 
video comparison
video comparison video comparison
video comparison
 
Information hiding in edge location of video using amalgamate fft and cubic s...
Information hiding in edge location of video using amalgamate fft and cubic s...Information hiding in edge location of video using amalgamate fft and cubic s...
Information hiding in edge location of video using amalgamate fft and cubic s...
 
Image Compression Using Intra Prediction of H.264/AVC and Implement of Hiding...
Image Compression Using Intra Prediction of H.264/AVC and Implement of Hiding...Image Compression Using Intra Prediction of H.264/AVC and Implement of Hiding...
Image Compression Using Intra Prediction of H.264/AVC and Implement of Hiding...
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
 
Final PPT.pptx (1).pptx
Final PPT.pptx (1).pptxFinal PPT.pptx (1).pptx
Final PPT.pptx (1).pptx
 
A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNEL
A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNELA NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNEL
A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNEL
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
 

Recently uploaded

Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfsumitt6_25730773
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesRashidFaridChishti
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptAfnanAhmad53
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxNANDHAKUMARA10
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 

Recently uploaded (20)

Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptx
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 

Secured Data Transmission Using Video Steganographic Scheme

  • 1. B.suneetha Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 7( Version 3), July 2014, pp.243-246 www.ijera.com 243 | P a g e Secured Data Transmission Using Video Steganographic Scheme B.suneetha Sr asst.professor, DADI Institute of Engineering &Technology,anakapalli Abstract Steganography is the art of hiding information in ways that avert the revealing of hiding messages. Video Steganography is focused on spatial and transform domain. Spatial domain algorithm directly embedded information in the cover image with no visual changes. This kind of algorithms has the advantage in Steganography capacity, but the disadvantage is weak robustness. Transform domain algorithm is embedding the secret information in the transform space. This kind of algorithms has the advantage of good stability, but the disadvantage of small capacity. These kinds of algorithms are vulnerable to steganalysis. This paper proposes a new Compressed Video Steganographic scheme. The data is hidden in the horizontal and the vertical components of the motion vectors. The PSNR value is calculated so that the quality of the video after the data hiding is evaluated. Index Terms—Data hiding, least significant bit(LSB), encryption, decryption, PSNR. I. INTRODUCTION A Steganography system, in general, is expected to meet three key requirements, namely, imperceptibility of embedding, accurate recovery of embedded information, and large payload (payload is the number of bits that get delivered to the end user at the destination) [1]. In a pure Steganography framework, the technique for embedding the message should be unidentified to anyone other than the sender and the receiver. An effective Steganography should posses the following characteristics [10-11]: Secrecy: Extraction of hidden data from the host medium should not be possible without the knowledge of the proper secret key used in the extracting procedure. Imperceptibility: After embedding the data in the medium, it should be imperceptible from the original medium. High capacity: The maximum length of the hidden message that can be embedded can be as long as possible. Resistance: The hidden data should be able to survive when the host medium has been manipulated, for example lossy compression scheme. Accurate extraction: The extraction of the hidden data from the medium should be accurate and reliable. This paper explains a way in which so that a video file is used as a host media to hide secret message without affecting the file structure and content of the video file. Because degradation in the quality of the cover object leads to noticeable change in the cover object which may leads to the failure of objective of Steganography. In this paper we consider the motion estimation stage of video compression. The contents are processed during video encoding/decoding. This makes less vulnerable to video steganalysis methods and is lossless coded, thus not prone to quantization distortions. The data bits of the message are hidden in motion vectors. A single bit is hidden in the least significant bit of the each motion vector. The rest of the paper is organized as follows: in Section II we overview the terms of video compression and decompression. The proposed method is given is explained briefly in Section III and algorithm for our proposed method is given in Section IV followed by the results and analyses in Section V. Finally, the paper is concluded in Section VI. II. OVERVIEW In this section, we overview lossy video compression to define our evaluation. There are three types of pictures (or frames) used in video compression: I-frames, P-frames, and B-frames centered mainly on amount of data compression. They are different in the following characteristics:  I- (Intra-coded) frames are the least compressible but don't require other video frames to decode.  P- (Predicted) frames use data from previous frames to decompress and are more compressible than I-frames.  B- (Bi-predictive) frames use both previous and forward frames for data reference to get the highest amount of data compression. RESEARCH ARTICLE OPEN ACCESS
  • 2. B.suneetha Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 7( Version 3), July 2014, pp.243-246 www.ijera.com 244 | P a g e Fig.1: Block diagram of the video Steganography using I, P, B frames separately At the encoder, the I- frame is encoded using image compression techniques. So the decoder reconstructs it. The I-frame is used as a reference frame for encoding P or B frames. In Motion Picture Expert Group (MPEG-2) standard, the video is ordered into groups of pictures (GOPs) whose frames are encoded in the sequence: [I,B,B,P,B,B,P,B,B]. The temporal redundancy between frames is exploited using block-based motion estimation which is applied on macroblocks Bijof size bb in P or B and searched in target frame(s). The motion field in video compression is translational with horizontal component dxand vertical component dy. It’s representation in vector form isd(x) for the spatial variables X = (x, y)in the underlying image. The search window is constrained by assigning limited n- bits for di.e., both dx anddy∈ [-2n-1, 2n-1-1]. An exhaustive search in the window of size b+2n X b+ 2n is done to find the optimal motion vector which satisfies the search criterion. Since d does not represent the true motion in the video, the compensated frame using (x + d(x)) is associated with a prediction error E(x) = (P - )(x) in order to be able to reconstruct P=with minimum distortion at the decoder in case of P frame. Similar operation is done for the B-frame but with the average of both the forward compensation from a previous reference frame and backward compensation from a next reference frame. E is of the size of an image and is thus lossy compressed using JPEG compression reducing its data size. The lossy compression quantization stage is a nonlinear process and for every motion estimation method, the pair (d,E) will be different and the data size D of the compressed error Ẽ will be different. The motion vectors d are lossless coded and thus become an attractive place to hide a message that can be extracted by a special decoder. The decoder receives the pair (d,Ẽ), applies motion compensation to form P or퐵 and decompress Ẽto obtain a reconstructed Er. Since E and Erare different by the effect of quantization,then the decoder in unable to reconstruct P identically but it alternatively reconstructs Pr= P + Er. The reconstruction quality is usually measured by the mean squared error P - Pr, represented as peak signal- to-noise ratio (PSNR) and we denote it by R. III. PROPOSED WORK A. Video Compression Video compression uses modern coding techniques to reduce redundancy in video data. Video compression typically operates on square-shaped groups of neighboring pixels, often called macro blocks. These pixel groups or blocks of pixels are compared from one frame to the next and the video compression code sends only the differences within those blocks. In areas of video with more motion, the compression must encode more data to keep up with the larger number of pixels that are changing. Generally, the motion field in video compression is assumed to be translational with horizontal component and vertical component and denoted in vector form by for the spatial variables in the underlying image. Such as three steps search, etc. Administrator chooses one video file along with one key compress and send to the member. The Authenticated member decompresses the video file and takes the second privacy key. Fig.2: Block diagram proposed model B. Motion Vector In video compression, a motion vector is used for motion estimation process. It is used to represent a macro block in a picture. Authenticated person after taking the second privacy key, can see the video in our application, in that video it can detect the motion vector. After seeing this, the member uses the key to see the message sent to the administrator. C. Encryption Encryption is the conversion of data into a form, called a cipher text that cannot be easily understood by unauthorized people. Original message is hidden
  • 3. B.suneetha Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 7( Version 3), July 2014, pp.243-246 www.ijera.com 245 | P a g e within a carrier such that the changes occurred in the carrier are not observable. The information about the private key is used to encrypt the text. D. Extraction of original data Decryption is the process of converting encrypted data back into its original form, so it can be understood. When the user inputs the correct key that is used at the decryption process, this will extract the original message that is encrypted and embedded. E. Peak signal-to-Noise Ratio Larger SNR and PSNR indicate a smallerdifference between the original (without noise) and reconstructed image. The main advantage of this measure is ease of computation but it does not reflect perceptual quality. An important property of PSNR is that a slight spatial shift of an image can cause a large numerical distortion but no visual distortion. IV. ALGORITHM FOR PROPOSED MODEL Algorithm for Encoding Step 1: Input cover video file or stream. Step 2: Read required information of the cover video. Step 3: Break the video into frames. Step 4: Compress the frame where the data is to be inserted using any compression technique, DCT was used in this paper. Step 5: The data was hide using LSB algorithm. Algorithm for Decoding Step 1: Input stego video file or stream. Step 2: Read required information from the stego video. Step 3: Break the video into frames. Step 4:Using the motion vector, the frame where the data is hide is chosen. Step 5:The data is extracted from the LSBs of the identified frame. V. EXPERIMENTAL RESULTS Any Steganography technique is characterizedmainly by two attributes, imperceptibility andcapacity. Imperceptibility means the embeddeddata must be imperceptible to the observer(perceptual invisibility) and computer analysis (statistical invisibility). The performance of the proposed technique is evaluated using five different video streams (bulb.avi, pearson.avi, plot.avi, sample.avi and sinewave.avi)and one secret data.The perceptual imperceptibility of the embedded data is indicated by comparing the original image or video to its stego counterpart so that their visual differences, if any, can be determined. Table 1: Cover video file information Table 2: Obtained results information Additionally, as an objective measure, the Mean squared Error (MSE), Peak Signal to Noise Ratio (PSNR) between the stego frame and its corresponding cover frame are studied. The quantities are given as below. (1) Where, MSE is Mean Square error, H and W are height width and P (i,j) represents original frame and S(i,j) represents corresponding stego frame. PSNR= 10 log (2) where, PSNR is peak signal to noise ratio, L istakenas 255.The cover file video details are given in Table 1 and results are tabulated in Table 2. VI. CONCLUSION In this paper, we propose and investigate the data hiding method using the motion vector techniquefor the moving objects, operating directly incompressed domain. This algorithm provides high capacityand imperceptible stego-image for humanvision of the hidden secret information. By embedding the data in the moving objects the quality of the video is increased. In this paper, the compressed video is used for the data transmission since it can hold large Video name Resolution (W*H) Frame/Sec. No. of Frames size Bulb 232 X 232 15 80 740KB Person 356 X 244 15 50 199KB Plot 560 X 420 15 40 26.9MB Sample 611 X 352 12 60 555KB Sine wave 436 X 344 10 101 460KB Video Name PSNR (dB) MSE Payload (Bytes) ΔD (Bytes) ΔR /Frame (dB) Bulb 38.71 9.51 4439 42014 0.483 Person 37.14 12.55 2545 23267 0.742 Plot 34.07 25.44 3032 27302 0.851 Sample 38.52 9.13 3054 30874 0.642 Sine wave 33.87 26.94 2286 22726 0.335
  • 4. B.suneetha Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 7( Version 3), July 2014, pp.243-246 www.ijera.com 246 | P a g e volume of the data. The adaptive based compression technique is evaluated such that the data is embedding in the vertical and horizontal component pixels. The PSNR value is calculated to show that the frame is transmitted without any loss or distortion. As a result, the motion vector technique is found as the better solution since it hides the data in the moving objects rather than in the still pictures. The encryption enhances the security of the data being transmitted. REFERENCES [1] Hussein A. Aly, “Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error”, Ieee Transactions On Information Forensics And Security, Vol. 6, No. 1, March 2011 [2] J. Zhang, J. Li, and L. Zhang, “Video watermark technique in motion vector,” in Proc. XIV Symp. Computer Graphics and Image Processing, Oct. 2001, pp. 179–182. [3] C. Xu, X. Ping, and T. Zhang, “Steganography in compressed video stream,” in Proc. Int. Conf. Innovative Computing, Information and Control (ICICIC’06), 2006, vol. II, pp. 803–806. [4] P.Wang, Z. Zheng, and J. Ying, “A novel videowatermark technique in motion vectors,” in Int. Conf. Audio, Language and Image Processing (ICALIP), Jul. 2008, pp. 1555–1559. [5] S. K. Kapotas, E. E. Varsaki, and A. N. Skodras, “Data hiding in H.264 encoded video sequences,” in IEEE 9th Workshop on Multimedia Signal Processing (MMSP07), Oct. 2007, pp. 373–376. [6] D.-Y. Fang and L.-W. Chang, “Data hiding for digital video with phase of motion vector,” in Proc. Int. Symp. Circuits and Systems (ISCAS), 2006, pp. 1422–1425. [7] X. He and Z. Luo, “A novel steganographic algorithm based on the motion vector phase,” in Proc. Int. Conf. Comp. Sc. and Software Eng., 2008, pp. 822–825. [8] Mamta Juneja, Parvinder S. Sandhu, and Ekta Walia ”Application of LSB Based Steganographic Technique for 8-bit Color Images, World Academy of Science, Engineering and Technology 50 2009 Published [9] Mritha Ramalingam “Stego Machine – Video Steganography usingModified LSB Algorithm”,World Academy of Science, Engineering and Technology 74 2011 Published [10] Saurabh SinghInvertis University Bareilly, India and Gaurav Agarwal Invertis University Bareilly, India “Hiding image to video: A new approach of LSBreplacement”, International Journal of Engineering Science and TechnologyVol. 2(12),2010,6999-7003Published [11] JOSEPHGILVARRY School of Computer Applications Dublin City University “Calculationof Motion Using Motion Vectors Extracted from an MPEG Stream” Technical report 20 September 1999 Dublin City University Published