Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Robust video data hiding using forbidden zone data hiding and selective embedding

4,551 views

Published on

This ppt is on "Robust video data hiding". Includes intro, issues, challenges, motivation, design, implementation, result with snapshots, conclusion and future work.
HOPE THIS HELPS !! :)

Published in: Technology

Robust video data hiding using forbidden zone data hiding and selective embedding

  1. 1. ROBUST VIDEO DATAHIDING USINGFORBIDDEN ZONE DATAHIDING AND SELECTIVEEMBEDDINGUnder the guidance of:Prof. Rekha PatilTeam members:Geeta S SavalgiPooja LakhaPooja S Patil
  2. 2. WHAT IS DATA SECURITY?Protecting a database fromdestructive forces and theunwanted actions ofunauthorized users.INTRODUCTION
  3. 3. DATA SECURITY TECHNOLOGIESDISKENCRYPTIONHARDWARE BASEDMECHANISMS BACKUPSDATAMASKINGDATA ERASUR
  4. 4. DATA HIDINGIt is the process of embedding information into a host medium.FORBIDDEN ZONEIt is defined as the host signal range where no alteration is allowedduring data hiding process. SELECTIVE EMBEDDINGHere host signal samples, which will be used in data hiding, aredetermined adaptively. The selection is performed at four stages:Frame selection, frequency band determination, block selection andcoefficient selection.KEY TERMS USED IN PROJECT
  5. 5.  To achieve efficient data hiding in video sequence. To utilize systematic RA Codes to encode messagebits and frame bits. To allow handling de-synchronization betweenembedder and decoder. To achieve certain level of robustness against framedrop, repeat and insertion attacks. To use 3-D interleaving.ISSUES AND CHALLENGES
  6. 6.  Successfully utilized in video data hidingapplications. Tamper detection in digital videos can beperformed efficiently. It is used in fragile applications such asauthentication. It provides excess control, copy control in DVD’s. Widely suitable for broader range of application.APPLICATIONS
  7. 7.  The necessity for practical higher dimensionaldata hiding codes. Adjusting trade-off between robustness(channelcode) and imperceptibility(source) by practicalmeans. Design of end-to-end real-life visual applications.MOTIVATIONS
  8. 8.  During video data hiding the quality of the imagecannot be preserved. They cannot survive any format conversion ortranscoding, without any significant loss of perceptualquality. Efficiently hide data in video and to preserve thequality from the external attacks.PROBLEM STATEMENT
  9. 9.  A new block based data hiding method which makesuse of erasure correction capability of repeataccumulates codes. Uses superiority of forbidden zone for low embeddingdistortion levels. Robust to frame manipulation attacks via framesynchronization markers.SCOPE OF WORK
  10. 10. The goal of the design process is toproduce a model of a system which can beused later to build that system and use thismodel to build the overall system.DESIGN
  11. 11.  Parallel decoders are used to correct de-sync. The video data hiding methods utilize uncompressed videodata where insertions and erasures occur at decoder, causingde-sync. Multiple hronization errors. This scheme is successful only when the number of selectedhost signal samples is much less than the total number ofhost signal samples.EXISTING SYSTEM
  12. 12. ARCHITECTURE of proposedsystemEMBEDMESSAGE DATA FILEOUTPUT FILEMASTER FILEENCODEDVIDEOCOMPRESSION AND ENCRYPTIONDECODEUNCOMPRESSION DECRYPTIONCOMPRESSION ANDENCRYPTION CHECKENCODEDVIDEORECEIVEDDECODED FILEMESSAGE OR DATA FILESENDERRECEIVER
  13. 13. ENCODERDECODER
  14. 14. Substitute bytesShift rowsAdd round keyMix columnsSubstitute bytesAdd round keyMix columnsShift keysAdd round keyShift keysSubstitute bytesAdd round keyAdd round keyInverse mix columnsAdd round keyInverse sub bytesInverse shift rowsInverse mix columnsAdd round keyInverse shift bytesInverse shift rowsAdd round keyInverse shift bytesInverse shift rowsEXPAND KEYW(0,3)KEYRound 9 .Round 10Round 1Round 9ound 1
  15. 15. Implementation is the stage of the project when thetheoretical design is turned out into a working system.The implementation stage involves careful planning,investigation of the existing system and it’s constraints.IMPLEMENTATION
  16. 16. Frame selection is performed and the selectedframes are processed block-wise.The selection is performed at four stages: Frame selection Frequency band determination Block selection Coefficient selectionENCRYPTION MODULE
  17. 17. Let fcur and fpre denote the current and previousframe indices fcur > T, then skip this frame. If fcur = fpre, then skip this frame. Otherwise, process the current frame. fcur< fpre, then the end of the group of frames isreached.DECRYPTION MODULE
  18. 18. System flow diagramSystem flowEmbed dataSpread framesActual videoUser give input Msg or data as Data embedded videoinputSpread a video Encrypted videoDecrypt a video View original data ormsgEncryptionDecryption
  19. 19. results
  20. 20.  New video data hiding framework that makes use of erasurecorrection capability of RA codes and superiority of FZDH. It robust to frame manipulation attacks via framesynchronization markers. Typical system parameter are reported for error-free decoding. The results indicate that the framework can be successfullyutilized in video data hiding applications. User cannot find the original data. It increases the security.Conclusion
  21. 21.  Incorporation of human visual system based spatiotemporal adaption of data hiding methodparameters. New multilevel embedding technique . Increase block size to embed more data. Improve commercialization.FUTURE WORK
  22. 22. THANK YOU FORYOURATTENTION !

×