SlideShare a Scribd company logo
1 of 5
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 164
AN APPROACH TO HIDE DATA IN VIDEO USING STEGANOGRAPHY
Deepak Kumar Sharma1
, AsthaGautam2
1
Student, School of Computer Science &Engineering, Bahra University, Himachal Pradesh, India
2
Student, School of Computer Science &Engineering, Bahra University, Himachal Pradesh, India
Abstract
In this paper, we have proposed a new video steganographic algorithm that is used to hide any sort of data or information inside the
video with the help of hash function technique. A video steganography is an approach to hide the data inside the video. In general,
video is a set of moving frames, so we here are selecting a frame and then applying a hash function technique to choose a pixel for the
purpose to hide the information. A double hash function technique is used to select the pixel from row and column. It might happen
that the pixel after applying hash function may not found in the frame, this type of problem can occur, so a collision resolution
technique is used. A quadratic probing technique is used for solving the problem of collision where we are adding a prime number
with the existing hash value instead of linear search. A division method technique is used to point out the pixel in a frame that is
pixel’s location in row and column in a frame. When pixel is found, the character of information that is to hide, a binary value of that
single character is replaced by original pixel’s red component, then second frame is to select and second character’s binary value is
replaced by the original pixel’s green component, this will continue until the all binary characters of the information are hidden.
Keywords: Collision, Embedding, Extraction, Video Frame, Steganography.
-----------------------------------------------------------------------***-------------------------------------------------------------------
1. INTRODUCTION
Steganography is the art and science of hiding information by
embedding messages within other. Steganography is made up
of Greek words “stegno” and “graphie”. Here stegno means
“covered or protected” and graphie means “writing”.
Steganography is the art or practice of concealing a message,
image or within another message, image or files [1].
Early steganography was messy. Before phones, before mail,
before horses, messages were sent on foot. If you wanted to
hide a message, you had two choices: have the messenger
memorize it, or hide it on the messenger. In fact, the Chinese
wrote messages on silk and encased them in balls of wax. The
wax ball, "la wan," could then be hidden in the messenger.
Some steganographic methods also use steganography with
cryptography where sender encrypts the message and receiver
decrypts the message to get original message. This technique
is used to prevent the message from the intruders [9].
The primary objective of steganography is to avoid drawing
attention to the transmission of hidden information. If
suspicion is raised, then this objective that has been planned to
achieve the security of the secret message because if the
hackers noted any change in the sent message then this
observer will try to know the hidden information inside the
message[7][8].
2. VIDEO STEGANOGRAPHY
It is a technique to hide any kind of files into a carrying video
file. The use of the video based steganography can be more
eligible than other multimedia files because of its size and
memory requirements.
Videos are the set of images. Video is an electronic medium
for the recording, copying and broadcasting of moving visual
images. The number of still pictures per unit of time of video
ranges from six to eight frames per second [1] It is 120 or
more frames per second for new professional camera [3].
Aspect ratio describes the dimensions of video screen and
video picture elements. All popular video formats are
rectilinear and so can be described by a ratio between width
and height [6].
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 165
3. FLOW CHART OF VIDEO STEGANOGRAPHY:
3.1 Encryption:
3.2 Decryption:
4. PROPOSED ALGORITHM
The algorithm of video steganography is based on the fact that
each pixel is represented by 3 bytes where each byte
representing the intensity of 3 primary colors that is RGB
(Red, Green and Blue).Size of image file is directly related to
number of pixels and granularity of color definition[11].
Let the data to be hidden is word “ABC”
ASCII code of A=65
Binary code of A= 01000001
ASCII code of B = 66
Binary code of B = 01000010
ASCII code of C = 67
Binary Code of C = 01000011
Let the first pixel’s RGB component be:
RED GREEN BLUE
1 0 1 1 0 0 0 1 0 1 0 0 1 1 0 0 0 1 0 0 1 1 0 1
Red component of pixel is replaced by binary values of 65 i.e
A
RED GREEN BLUE
0 1 0 0 0 0 0 1 0 1 0 0 1 1 0 0 0 1 0 0 1 1 0 1
Let the second pixel’s RGB component be:
RED GREEN BLUE
0 1 0 0 0 0 0 1 0 1 0 0 1 1 0 0 0 1 0 0 1 1 0 1
Green component of pixel is replaced by binary value of 66 i.e
B
RED GREEN BLUE
0 1 0 0 0 0 0 1 0 1 0 0 0 0 1 0 0 1 0 0 1 1 0 1
Let the third pixel’s RGB component be:
RED GREEN BLUE
0 1 0 0 0 0 0 1 0 1 0 0 0 0 1 0 0 1 0 0 1 1 0 1
Start
Video
Found In
Frame?
Embedding
Stop
Msg
Hash Function
Modified H(K)
te
Stop
Extract Video
Hash Function
Stego Video
Found In
Frame?
Modified H(K)
te
Msg
Start
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 166
Blue component of pixel is replaced with binary value of 67i.e
C
RED GREEN BLUE
0 1 0 0 0 0 0 1 0 1 0 0 1 1 0 0 0 1 0 0 0 0 1 1
The resulted image pixel contains the text bits
Now one image contains a text bit.
As we know that video is a set of images, So we can hidemore
number of data in other images that is consisted by video.After
replacing the bits from one imageweincrement to the next
video frame or image and again applying the same procedure
of bits replacing operation.
5. CHOOSING THE PIXEL IN IMAGE TO
REPLACE IN VIDEO
We here are using hash function to choose the pixel in image.
The terminology which we are using in hashing will be
oriented towards file management.
A hash function[4] is any algorithm that maps data of arbitrary
length to data of a fixed length. The values returned by a hash
function are called hash values, hash codes, hash
sums, checksums or simply hashes.
We are considering 2 assumptions:
 First of all we are assuming that there is a file F of n
records with a set K of keys which uniquely
determine the records in F.
 Secondly, we are assuming that F is maintained in
memory by a table T of m memory locations and that
L is the set of memory address of the location T.
For notational convenience we have assumed that the key in K
and address in L are integers.
The general idea of using the key is to determine the address
of a record is an excellent idea but it must be modified so that
a great deal of space is not wasted. This modification takes the
form of a function H from the set K of keys into the set L of
memory addresses.
Such a function H : K L is called hash function or hashing
function.
Unfortunately, such a function H may not yield distinct values,
it is possible that two different keys K1 and K2 willnot be able
to yield the appropriate hash address for resolving this
problem we are using Quadratic probing of Collision
Resolution Technique. If the resultant pixel is not found in
frame then the value of H(K) is modified to K.
5.1 Quadratic Probing Technique:
Suppose a record R with key K has the hash address H(K)=h.
then instead of searching the location with address h,
h+1,h+2……… so on we linearly search the address location.
H(K) = H(K) + Prime number.
The two principle criteria used in selecting a hash function
are:
Firstof all, the function H should be very easy and quick to
compute.
Second, the function H should as far as possible uniformly
distributes the hash addresses throughout the sat L so that
there is minimum number of collisions.
Let, K=256and m=7
Then, H(256)=256(mod 7)
H(256)=4
So replace the 4th
pixel from top of the frame.
Fig 1 Frame with selected 4th
pixel
To make the change of pixel more efficient andunidentifiable
we used two hash functions. One function isto choose from
row and 2nd
is to choose from column.
Two hash functions are:
 H(K)=K(mod m)
 H(L)=L(mod n)
Let K=256 and m=7
H(256)=256(mod 7)=4
Let L=118 and n=3
H(118) = 118(mod 3)=1
So, from 4th
row we choose 1st
column pixel to replace or to
Implement algorithm.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 167
Fig 2 Frame with selected 4th
pixel by two hash function
6. Technique of hash Function
6.1 Division Method
Choose a number larger than the number n of keys in K.Hash
function H is defined as :
H(K)=K(mod m)
Or
H(K)=K(mod m)+1
Where, K is a key and the value of K lie between image frame
size (width or length) and m is any prime no.
7. EMBEDDING TECHNIQUE ON SENDER END
7.1 Encryption:
1) Begin
2) Select a text file to hide
3) Convert a text into binary form and calculate the number
of bits in it
4) Select a video file for hiding purpose
5) Start sub iteration 1 until all frames covered
6) s = Calculating the number of frames in video
= Rate of video frame(25fps) * Time length of video
7) For (i=1; i<=s; i++)
8) {
9) H(K) = 71(mod i)[for rows]
10) H(L) = 89(mod i)[for columns]
11) }
12) If ((H(K) || H(L) = 0) || (H(K),H(L))= NOT FOUND IN
FRAME)
13) {
14) H(K) = H(K) +7
15) H(L) = H(L) + 13
16) }
17) Replaced Red component bit of pixel with 1st
character
18) Replaced Green component bit of pixel with 2nd
character
19) Replaced Blue component bit of pixel with 3rd
character.
20)}
If video is of 4 minutes and of frame rate 25 frames per second
then it means that 4 min video is equal to 240 second video
which implies that it is having 25*240 framesthat is equal to
5100 frames, and we can replace 5100 frames pixel with 5100
characters
7.2 Decryption
1) Select the stego video
2) Start iteration until frames end
3) s= number of frames
4) For( i=1;i<=s; i++)
5) {
6) H(K) = 71(mod i)[for row]
7) H(L) = 89 (mod i)[for columns]
8) }
9) If ((H(K)|| H(L))=0 || (H(K),H(L))=not found in
frame)
10) {
11) Collision resolution technique
12) H(K)=H(K)+7
13) H(L)=H(L)+13
14) }
15) Convert binary RGB bit value into ASCII and
character values
16) }
8. CONCLUSIONS
As frame rate of video is 25 frames per second human eyeis
not able to visualize any sort of alteration in a single pixel.
Thus video steganography is a good technique to hide the data.
Frame 1
Pixel to choose in a frame to store 1st
3 characters that is 24
bits from text file
H(K1) = K(mod m1)
H(L1) = L(mod n1)
(H(K1), H(L1)) pixel
Replace (H(K1), H(L1)) pixel with 3 characters
Next
Frame 2
Choose pixel in a frame to store next 3 characters of text file
that is 24 bits
H(K2) = K2 (mod m2)
H(L2) = L2 (mod n2)
(H(K2), H(L2)) pixels
Repeat till all the frames are used
As
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 168
Video length = 4 minutes
= 4*60 sec
=240 sec
Frame rate of video = 4 minutes
Total frame rate in a video is 25 * 240 frames = 5100 frames
Each frame consisting 3 characters.
No. of characters that we can hide in a video is 5100*3
characters= 15300 characters.
FUTURE ASPECTS
We will implement this algorithm with the help of
diffiehellman algorithm for embedding data bit into pixel bit.
Further we are concerned with increasing the characters in
video too. With the help of the concept or interpolation we
will match the stego pixel with the original one.
REFERENCES
[1]. en.wikipedia.org/wiki/steganography
[2]. strangehorizons.com
[3]. TayVoughan, Seventh edition, Multemedia: Making It
Work, Tata McGraw Hill.
[4]. Seymour Lipschutz. 1st
Edition, Data Structures, The
McGrawHill, Schaum,sOutlins.
[5]. Vipul Sharma, Sunny Kumar, A New Approach To Hide
Text In Images Using Steganography.
[6]. www.red.com/learn/red-101/video-aspect-ratios
[7]. H. Wu, H. Wang, C. Tsai and C. Wang, Reversible image
steganographic scheme via predictive coding. 1 (2010), ISSN:
01419382, 35-43.
[8]. J, Corporation, Steganography.
http://www.webopedia.com/ TERM/S/steganography.html.
2005.
[9]. A.A.Zaidan, B.B.Zaidan, AnasMajeed, "High Securing
Cover-File ofHidden Data Using Statistical Technique and
AES EncryptionAlgorithm", World Academy of Science
Engineering and Technology(WASET), Vol.54, ISSN: 2070-
3724, P.P 468-479.
[10].www.strngehorizons.com/2001/20011008,steganograhy.s
html#stools
[11] www.garykessler.net/library/steganography.html
BIOGRAPHIES
Deepak Kumar Sharma, Mtech Student,
Bahra University, Shimla Hills, Himachal
Pradesh, Deepaksharma1810@live.com
AsthaGautam, Mtech Student, Bahra
University, Shimla Hills, Himachal Pradesh,
Gautam.aastha1@gmail.com

More Related Content

What's hot

Implementation and Secured Authentication Key using Elliptic Curve Cryptography
Implementation and Secured Authentication Key using Elliptic Curve CryptographyImplementation and Secured Authentication Key using Elliptic Curve Cryptography
Implementation and Secured Authentication Key using Elliptic Curve CryptographyAM Publications,India
 
An unsupervised method for real time video shot segmentation
An unsupervised method for real time video shot segmentationAn unsupervised method for real time video shot segmentation
An unsupervised method for real time video shot segmentationcsandit
 
CT-SVD and Arnold Transform for Secure Color Image Watermarking
CT-SVD and Arnold Transform for Secure Color Image WatermarkingCT-SVD and Arnold Transform for Secure Color Image Watermarking
CT-SVD and Arnold Transform for Secure Color Image WatermarkingAM Publications,India
 
Project 2: Baseband Data Communication
Project 2: Baseband Data CommunicationProject 2: Baseband Data Communication
Project 2: Baseband Data CommunicationDanish Bangash
 
Fpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encoderFpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encodereSAT Publishing House
 
Network coding
Network codingNetwork coding
Network codingLishi He
 
A short introduction to Network coding
A short introduction to Network codingA short introduction to Network coding
A short introduction to Network codingArash Pourdamghani
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...ijceronline
 
Robust Watermarking through Dual Band IWT and Chinese Remainder Theorem
Robust Watermarking through Dual Band IWT and Chinese Remainder TheoremRobust Watermarking through Dual Band IWT and Chinese Remainder Theorem
Robust Watermarking through Dual Band IWT and Chinese Remainder TheoremjournalBEEI
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Fpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encoderFpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encodereSAT Journals
 
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting TechniqueLossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting TechniqueIRJET Journal
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 

What's hot (18)

Implementation and Secured Authentication Key using Elliptic Curve Cryptography
Implementation and Secured Authentication Key using Elliptic Curve CryptographyImplementation and Secured Authentication Key using Elliptic Curve Cryptography
Implementation and Secured Authentication Key using Elliptic Curve Cryptography
 
An unsupervised method for real time video shot segmentation
An unsupervised method for real time video shot segmentationAn unsupervised method for real time video shot segmentation
An unsupervised method for real time video shot segmentation
 
CT-SVD and Arnold Transform for Secure Color Image Watermarking
CT-SVD and Arnold Transform for Secure Color Image WatermarkingCT-SVD and Arnold Transform for Secure Color Image Watermarking
CT-SVD and Arnold Transform for Secure Color Image Watermarking
 
Project 2: Baseband Data Communication
Project 2: Baseband Data CommunicationProject 2: Baseband Data Communication
Project 2: Baseband Data Communication
 
Fpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encoderFpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encoder
 
Network coding
Network codingNetwork coding
Network coding
 
A short introduction to Network coding
A short introduction to Network codingA short introduction to Network coding
A short introduction to Network coding
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...
 
RC4 Technique in Visual Cryptography
RC4 Technique in Visual CryptographyRC4 Technique in Visual Cryptography
RC4 Technique in Visual Cryptography
 
Robust Watermarking through Dual Band IWT and Chinese Remainder Theorem
Robust Watermarking through Dual Band IWT and Chinese Remainder TheoremRobust Watermarking through Dual Band IWT and Chinese Remainder Theorem
Robust Watermarking through Dual Band IWT and Chinese Remainder Theorem
 
B046050711
B046050711B046050711
B046050711
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Fpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encoderFpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encoder
 
Ijcnc050213
Ijcnc050213Ijcnc050213
Ijcnc050213
 
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting TechniqueLossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Ijcatr04021016
Ijcatr04021016Ijcatr04021016
Ijcatr04021016
 

Viewers also liked

Steganography Project
Steganography Project Steganography Project
Steganography Project Jitu Choudhary
 
Automatic anti glare system for night time driving using liquid crystal screens
Automatic anti glare system for night time driving using liquid crystal screensAutomatic anti glare system for night time driving using liquid crystal screens
Automatic anti glare system for night time driving using liquid crystal screenseSAT Publishing House
 
Performance comparison of qo s based routing
Performance comparison of qo s based routingPerformance comparison of qo s based routing
Performance comparison of qo s based routingeSAT Publishing House
 
High speed multiplier using vedic mathematics
High speed multiplier using vedic mathematicsHigh speed multiplier using vedic mathematics
High speed multiplier using vedic mathematicseSAT Publishing House
 
Anaerobic digestion of domestic wastewater
Anaerobic digestion of domestic wastewaterAnaerobic digestion of domestic wastewater
Anaerobic digestion of domestic wastewatereSAT Publishing House
 
Measurement of iodine availability and stability of
Measurement of iodine availability and stability ofMeasurement of iodine availability and stability of
Measurement of iodine availability and stability ofeSAT Publishing House
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case studyeSAT Publishing House
 
Numerical simulation of friction stir butt welding processes for az91 magnesi...
Numerical simulation of friction stir butt welding processes for az91 magnesi...Numerical simulation of friction stir butt welding processes for az91 magnesi...
Numerical simulation of friction stir butt welding processes for az91 magnesi...eSAT Publishing House
 
Simulation and experimental studies for lateral
Simulation and experimental studies for lateralSimulation and experimental studies for lateral
Simulation and experimental studies for lateraleSAT Publishing House
 
The influence of tree induce suction on soil suction
The influence of tree induce suction on soil suctionThe influence of tree induce suction on soil suction
The influence of tree induce suction on soil suctioneSAT Publishing House
 
Optimization of shrinkage and surface roughness of
Optimization of shrinkage and surface roughness ofOptimization of shrinkage and surface roughness of
Optimization of shrinkage and surface roughness ofeSAT Publishing House
 
Study of brass wire and cryogenic treated brass wire on titanium alloy using ...
Study of brass wire and cryogenic treated brass wire on titanium alloy using ...Study of brass wire and cryogenic treated brass wire on titanium alloy using ...
Study of brass wire and cryogenic treated brass wire on titanium alloy using ...eSAT Publishing House
 
Design issues and challenges of reliable and secure transmission of medical i...
Design issues and challenges of reliable and secure transmission of medical i...Design issues and challenges of reliable and secure transmission of medical i...
Design issues and challenges of reliable and secure transmission of medical i...eSAT Publishing House
 
Sequences classification based on group technology
Sequences classification based on group technologySequences classification based on group technology
Sequences classification based on group technologyeSAT Publishing House
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptographyeSAT Publishing House
 
Case study on slender multi storey rc building with brick infill
Case study on slender multi storey rc building with brick infillCase study on slender multi storey rc building with brick infill
Case study on slender multi storey rc building with brick infilleSAT Publishing House
 
Holographic optical elements for beautification
Holographic optical elements for beautificationHolographic optical elements for beautification
Holographic optical elements for beautificationeSAT Publishing House
 
Status of noise in yeshwanthpur circle (bangalore north) based on on site dat...
Status of noise in yeshwanthpur circle (bangalore north) based on on site dat...Status of noise in yeshwanthpur circle (bangalore north) based on on site dat...
Status of noise in yeshwanthpur circle (bangalore north) based on on site dat...eSAT Publishing House
 
Verification of uart ip core using uvm
Verification of uart ip core using uvmVerification of uart ip core using uvm
Verification of uart ip core using uvmeSAT Publishing House
 
Online social network mining current trends and research issues
Online social network mining current trends and research issuesOnline social network mining current trends and research issues
Online social network mining current trends and research issueseSAT Publishing House
 

Viewers also liked (20)

Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Automatic anti glare system for night time driving using liquid crystal screens
Automatic anti glare system for night time driving using liquid crystal screensAutomatic anti glare system for night time driving using liquid crystal screens
Automatic anti glare system for night time driving using liquid crystal screens
 
Performance comparison of qo s based routing
Performance comparison of qo s based routingPerformance comparison of qo s based routing
Performance comparison of qo s based routing
 
High speed multiplier using vedic mathematics
High speed multiplier using vedic mathematicsHigh speed multiplier using vedic mathematics
High speed multiplier using vedic mathematics
 
Anaerobic digestion of domestic wastewater
Anaerobic digestion of domestic wastewaterAnaerobic digestion of domestic wastewater
Anaerobic digestion of domestic wastewater
 
Measurement of iodine availability and stability of
Measurement of iodine availability and stability ofMeasurement of iodine availability and stability of
Measurement of iodine availability and stability of
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Numerical simulation of friction stir butt welding processes for az91 magnesi...
Numerical simulation of friction stir butt welding processes for az91 magnesi...Numerical simulation of friction stir butt welding processes for az91 magnesi...
Numerical simulation of friction stir butt welding processes for az91 magnesi...
 
Simulation and experimental studies for lateral
Simulation and experimental studies for lateralSimulation and experimental studies for lateral
Simulation and experimental studies for lateral
 
The influence of tree induce suction on soil suction
The influence of tree induce suction on soil suctionThe influence of tree induce suction on soil suction
The influence of tree induce suction on soil suction
 
Optimization of shrinkage and surface roughness of
Optimization of shrinkage and surface roughness ofOptimization of shrinkage and surface roughness of
Optimization of shrinkage and surface roughness of
 
Study of brass wire and cryogenic treated brass wire on titanium alloy using ...
Study of brass wire and cryogenic treated brass wire on titanium alloy using ...Study of brass wire and cryogenic treated brass wire on titanium alloy using ...
Study of brass wire and cryogenic treated brass wire on titanium alloy using ...
 
Design issues and challenges of reliable and secure transmission of medical i...
Design issues and challenges of reliable and secure transmission of medical i...Design issues and challenges of reliable and secure transmission of medical i...
Design issues and challenges of reliable and secure transmission of medical i...
 
Sequences classification based on group technology
Sequences classification based on group technologySequences classification based on group technology
Sequences classification based on group technology
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
 
Case study on slender multi storey rc building with brick infill
Case study on slender multi storey rc building with brick infillCase study on slender multi storey rc building with brick infill
Case study on slender multi storey rc building with brick infill
 
Holographic optical elements for beautification
Holographic optical elements for beautificationHolographic optical elements for beautification
Holographic optical elements for beautification
 
Status of noise in yeshwanthpur circle (bangalore north) based on on site dat...
Status of noise in yeshwanthpur circle (bangalore north) based on on site dat...Status of noise in yeshwanthpur circle (bangalore north) based on on site dat...
Status of noise in yeshwanthpur circle (bangalore north) based on on site dat...
 
Verification of uart ip core using uvm
Verification of uart ip core using uvmVerification of uart ip core using uvm
Verification of uart ip core using uvm
 
Online social network mining current trends and research issues
Online social network mining current trends and research issuesOnline social network mining current trends and research issues
Online social network mining current trends and research issues
 

Similar to An approach to hide data in video using steganography

Secured data hiding by using extended visual cryptography
Secured data hiding by using extended visual cryptographySecured data hiding by using extended visual cryptography
Secured data hiding by using extended visual cryptographyeSAT Journals
 
Secured data hiding by using extended visual
Secured data hiding by using extended visualSecured data hiding by using extended visual
Secured data hiding by using extended visualeSAT Publishing House
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different mediaseSAT Journals
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different mediaseSAT Publishing House
 
Optimized block size based video coding algorithm
Optimized block size based video coding algorithmOptimized block size based video coding algorithm
Optimized block size based video coding algorithmeSAT Publishing House
 
Analysis of image compression algorithms using wavelet transform with gui in ...
Analysis of image compression algorithms using wavelet transform with gui in ...Analysis of image compression algorithms using wavelet transform with gui in ...
Analysis of image compression algorithms using wavelet transform with gui in ...eSAT Journals
 
Analysis of image compression algorithms using wavelet transform with gui in ...
Analysis of image compression algorithms using wavelet transform with gui in ...Analysis of image compression algorithms using wavelet transform with gui in ...
Analysis of image compression algorithms using wavelet transform with gui in ...eSAT Publishing House
 
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET Journal
 
A novel cryptographic technique that emphasis visual quality and efficieny by...
A novel cryptographic technique that emphasis visual quality and efficieny by...A novel cryptographic technique that emphasis visual quality and efficieny by...
A novel cryptographic technique that emphasis visual quality and efficieny by...eSAT Journals
 
A Novel Algorithm on Wavelet Based Robust Invisible Digital Image Watermarkin...
A Novel Algorithm on Wavelet Based Robust Invisible Digital Image Watermarkin...A Novel Algorithm on Wavelet Based Robust Invisible Digital Image Watermarkin...
A Novel Algorithm on Wavelet Based Robust Invisible Digital Image Watermarkin...IJERA Editor
 
Fpga based encryption design using vhdl
Fpga based encryption design using vhdlFpga based encryption design using vhdl
Fpga based encryption design using vhdleSAT Publishing House
 
Background differencing algorithm for moving object detection using system ge...
Background differencing algorithm for moving object detection using system ge...Background differencing algorithm for moving object detection using system ge...
Background differencing algorithm for moving object detection using system ge...eSAT Publishing House
 
Frequency Domain Approach of Image Steganography
Frequency Domain Approach of Image SteganographyFrequency Domain Approach of Image Steganography
Frequency Domain Approach of Image SteganographyAM Publications,India
 
Hardware implementation of aes encryption and decryption for low area & power...
Hardware implementation of aes encryption and decryption for low area & power...Hardware implementation of aes encryption and decryption for low area & power...
Hardware implementation of aes encryption and decryption for low area & power...eSAT Publishing House
 
Minimum image disortion of reversible data hiding
Minimum image disortion of reversible data hidingMinimum image disortion of reversible data hiding
Minimum image disortion of reversible data hidingIRJET Journal
 
Secured Data Transmission Using Video Steganographic Scheme
Secured Data Transmission Using Video Steganographic SchemeSecured Data Transmission Using Video Steganographic Scheme
Secured Data Transmission Using Video Steganographic SchemeIJERA Editor
 
Greyscale image authentication and repairing
Greyscale image authentication and repairingGreyscale image authentication and repairing
Greyscale image authentication and repairingeSAT Publishing House
 
Greyscale image authentication and repairing
Greyscale image authentication and repairingGreyscale image authentication and repairing
Greyscale image authentication and repairingeSAT Journals
 
IMAGE STEGANOGRAPHY WITH CONTRAST ENHANCEMENT USING HISTOGRAM SHIFTING
IMAGE STEGANOGRAPHY WITH CONTRAST ENHANCEMENT USING HISTOGRAM SHIFTINGIMAGE STEGANOGRAPHY WITH CONTRAST ENHANCEMENT USING HISTOGRAM SHIFTING
IMAGE STEGANOGRAPHY WITH CONTRAST ENHANCEMENT USING HISTOGRAM SHIFTINGIRJET Journal
 

Similar to An approach to hide data in video using steganography (20)

Secured data hiding by using extended visual cryptography
Secured data hiding by using extended visual cryptographySecured data hiding by using extended visual cryptography
Secured data hiding by using extended visual cryptography
 
Secured data hiding by using extended visual
Secured data hiding by using extended visualSecured data hiding by using extended visual
Secured data hiding by using extended visual
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
 
Optimized block size based video coding algorithm
Optimized block size based video coding algorithmOptimized block size based video coding algorithm
Optimized block size based video coding algorithm
 
Analysis of image compression algorithms using wavelet transform with gui in ...
Analysis of image compression algorithms using wavelet transform with gui in ...Analysis of image compression algorithms using wavelet transform with gui in ...
Analysis of image compression algorithms using wavelet transform with gui in ...
 
Analysis of image compression algorithms using wavelet transform with gui in ...
Analysis of image compression algorithms using wavelet transform with gui in ...Analysis of image compression algorithms using wavelet transform with gui in ...
Analysis of image compression algorithms using wavelet transform with gui in ...
 
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
 
A novel cryptographic technique that emphasis visual quality and efficieny by...
A novel cryptographic technique that emphasis visual quality and efficieny by...A novel cryptographic technique that emphasis visual quality and efficieny by...
A novel cryptographic technique that emphasis visual quality and efficieny by...
 
A Novel Algorithm on Wavelet Based Robust Invisible Digital Image Watermarkin...
A Novel Algorithm on Wavelet Based Robust Invisible Digital Image Watermarkin...A Novel Algorithm on Wavelet Based Robust Invisible Digital Image Watermarkin...
A Novel Algorithm on Wavelet Based Robust Invisible Digital Image Watermarkin...
 
Fpga based encryption design using vhdl
Fpga based encryption design using vhdlFpga based encryption design using vhdl
Fpga based encryption design using vhdl
 
Background differencing algorithm for moving object detection using system ge...
Background differencing algorithm for moving object detection using system ge...Background differencing algorithm for moving object detection using system ge...
Background differencing algorithm for moving object detection using system ge...
 
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
 
Frequency Domain Approach of Image Steganography
Frequency Domain Approach of Image SteganographyFrequency Domain Approach of Image Steganography
Frequency Domain Approach of Image Steganography
 
Hardware implementation of aes encryption and decryption for low area & power...
Hardware implementation of aes encryption and decryption for low area & power...Hardware implementation of aes encryption and decryption for low area & power...
Hardware implementation of aes encryption and decryption for low area & power...
 
Minimum image disortion of reversible data hiding
Minimum image disortion of reversible data hidingMinimum image disortion of reversible data hiding
Minimum image disortion of reversible data hiding
 
Secured Data Transmission Using Video Steganographic Scheme
Secured Data Transmission Using Video Steganographic SchemeSecured Data Transmission Using Video Steganographic Scheme
Secured Data Transmission Using Video Steganographic Scheme
 
Greyscale image authentication and repairing
Greyscale image authentication and repairingGreyscale image authentication and repairing
Greyscale image authentication and repairing
 
Greyscale image authentication and repairing
Greyscale image authentication and repairingGreyscale image authentication and repairing
Greyscale image authentication and repairing
 
IMAGE STEGANOGRAPHY WITH CONTRAST ENHANCEMENT USING HISTOGRAM SHIFTING
IMAGE STEGANOGRAPHY WITH CONTRAST ENHANCEMENT USING HISTOGRAM SHIFTINGIMAGE STEGANOGRAPHY WITH CONTRAST ENHANCEMENT USING HISTOGRAM SHIFTING
IMAGE STEGANOGRAPHY WITH CONTRAST ENHANCEMENT USING HISTOGRAM SHIFTING
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

An approach to hide data in video using steganography

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 164 AN APPROACH TO HIDE DATA IN VIDEO USING STEGANOGRAPHY Deepak Kumar Sharma1 , AsthaGautam2 1 Student, School of Computer Science &Engineering, Bahra University, Himachal Pradesh, India 2 Student, School of Computer Science &Engineering, Bahra University, Himachal Pradesh, India Abstract In this paper, we have proposed a new video steganographic algorithm that is used to hide any sort of data or information inside the video with the help of hash function technique. A video steganography is an approach to hide the data inside the video. In general, video is a set of moving frames, so we here are selecting a frame and then applying a hash function technique to choose a pixel for the purpose to hide the information. A double hash function technique is used to select the pixel from row and column. It might happen that the pixel after applying hash function may not found in the frame, this type of problem can occur, so a collision resolution technique is used. A quadratic probing technique is used for solving the problem of collision where we are adding a prime number with the existing hash value instead of linear search. A division method technique is used to point out the pixel in a frame that is pixel’s location in row and column in a frame. When pixel is found, the character of information that is to hide, a binary value of that single character is replaced by original pixel’s red component, then second frame is to select and second character’s binary value is replaced by the original pixel’s green component, this will continue until the all binary characters of the information are hidden. Keywords: Collision, Embedding, Extraction, Video Frame, Steganography. -----------------------------------------------------------------------***------------------------------------------------------------------- 1. INTRODUCTION Steganography is the art and science of hiding information by embedding messages within other. Steganography is made up of Greek words “stegno” and “graphie”. Here stegno means “covered or protected” and graphie means “writing”. Steganography is the art or practice of concealing a message, image or within another message, image or files [1]. Early steganography was messy. Before phones, before mail, before horses, messages were sent on foot. If you wanted to hide a message, you had two choices: have the messenger memorize it, or hide it on the messenger. In fact, the Chinese wrote messages on silk and encased them in balls of wax. The wax ball, "la wan," could then be hidden in the messenger. Some steganographic methods also use steganography with cryptography where sender encrypts the message and receiver decrypts the message to get original message. This technique is used to prevent the message from the intruders [9]. The primary objective of steganography is to avoid drawing attention to the transmission of hidden information. If suspicion is raised, then this objective that has been planned to achieve the security of the secret message because if the hackers noted any change in the sent message then this observer will try to know the hidden information inside the message[7][8]. 2. VIDEO STEGANOGRAPHY It is a technique to hide any kind of files into a carrying video file. The use of the video based steganography can be more eligible than other multimedia files because of its size and memory requirements. Videos are the set of images. Video is an electronic medium for the recording, copying and broadcasting of moving visual images. The number of still pictures per unit of time of video ranges from six to eight frames per second [1] It is 120 or more frames per second for new professional camera [3]. Aspect ratio describes the dimensions of video screen and video picture elements. All popular video formats are rectilinear and so can be described by a ratio between width and height [6].
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 165 3. FLOW CHART OF VIDEO STEGANOGRAPHY: 3.1 Encryption: 3.2 Decryption: 4. PROPOSED ALGORITHM The algorithm of video steganography is based on the fact that each pixel is represented by 3 bytes where each byte representing the intensity of 3 primary colors that is RGB (Red, Green and Blue).Size of image file is directly related to number of pixels and granularity of color definition[11]. Let the data to be hidden is word “ABC” ASCII code of A=65 Binary code of A= 01000001 ASCII code of B = 66 Binary code of B = 01000010 ASCII code of C = 67 Binary Code of C = 01000011 Let the first pixel’s RGB component be: RED GREEN BLUE 1 0 1 1 0 0 0 1 0 1 0 0 1 1 0 0 0 1 0 0 1 1 0 1 Red component of pixel is replaced by binary values of 65 i.e A RED GREEN BLUE 0 1 0 0 0 0 0 1 0 1 0 0 1 1 0 0 0 1 0 0 1 1 0 1 Let the second pixel’s RGB component be: RED GREEN BLUE 0 1 0 0 0 0 0 1 0 1 0 0 1 1 0 0 0 1 0 0 1 1 0 1 Green component of pixel is replaced by binary value of 66 i.e B RED GREEN BLUE 0 1 0 0 0 0 0 1 0 1 0 0 0 0 1 0 0 1 0 0 1 1 0 1 Let the third pixel’s RGB component be: RED GREEN BLUE 0 1 0 0 0 0 0 1 0 1 0 0 0 0 1 0 0 1 0 0 1 1 0 1 Start Video Found In Frame? Embedding Stop Msg Hash Function Modified H(K) te Stop Extract Video Hash Function Stego Video Found In Frame? Modified H(K) te Msg Start
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 166 Blue component of pixel is replaced with binary value of 67i.e C RED GREEN BLUE 0 1 0 0 0 0 0 1 0 1 0 0 1 1 0 0 0 1 0 0 0 0 1 1 The resulted image pixel contains the text bits Now one image contains a text bit. As we know that video is a set of images, So we can hidemore number of data in other images that is consisted by video.After replacing the bits from one imageweincrement to the next video frame or image and again applying the same procedure of bits replacing operation. 5. CHOOSING THE PIXEL IN IMAGE TO REPLACE IN VIDEO We here are using hash function to choose the pixel in image. The terminology which we are using in hashing will be oriented towards file management. A hash function[4] is any algorithm that maps data of arbitrary length to data of a fixed length. The values returned by a hash function are called hash values, hash codes, hash sums, checksums or simply hashes. We are considering 2 assumptions:  First of all we are assuming that there is a file F of n records with a set K of keys which uniquely determine the records in F.  Secondly, we are assuming that F is maintained in memory by a table T of m memory locations and that L is the set of memory address of the location T. For notational convenience we have assumed that the key in K and address in L are integers. The general idea of using the key is to determine the address of a record is an excellent idea but it must be modified so that a great deal of space is not wasted. This modification takes the form of a function H from the set K of keys into the set L of memory addresses. Such a function H : K L is called hash function or hashing function. Unfortunately, such a function H may not yield distinct values, it is possible that two different keys K1 and K2 willnot be able to yield the appropriate hash address for resolving this problem we are using Quadratic probing of Collision Resolution Technique. If the resultant pixel is not found in frame then the value of H(K) is modified to K. 5.1 Quadratic Probing Technique: Suppose a record R with key K has the hash address H(K)=h. then instead of searching the location with address h, h+1,h+2……… so on we linearly search the address location. H(K) = H(K) + Prime number. The two principle criteria used in selecting a hash function are: Firstof all, the function H should be very easy and quick to compute. Second, the function H should as far as possible uniformly distributes the hash addresses throughout the sat L so that there is minimum number of collisions. Let, K=256and m=7 Then, H(256)=256(mod 7) H(256)=4 So replace the 4th pixel from top of the frame. Fig 1 Frame with selected 4th pixel To make the change of pixel more efficient andunidentifiable we used two hash functions. One function isto choose from row and 2nd is to choose from column. Two hash functions are:  H(K)=K(mod m)  H(L)=L(mod n) Let K=256 and m=7 H(256)=256(mod 7)=4 Let L=118 and n=3 H(118) = 118(mod 3)=1 So, from 4th row we choose 1st column pixel to replace or to Implement algorithm.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 167 Fig 2 Frame with selected 4th pixel by two hash function 6. Technique of hash Function 6.1 Division Method Choose a number larger than the number n of keys in K.Hash function H is defined as : H(K)=K(mod m) Or H(K)=K(mod m)+1 Where, K is a key and the value of K lie between image frame size (width or length) and m is any prime no. 7. EMBEDDING TECHNIQUE ON SENDER END 7.1 Encryption: 1) Begin 2) Select a text file to hide 3) Convert a text into binary form and calculate the number of bits in it 4) Select a video file for hiding purpose 5) Start sub iteration 1 until all frames covered 6) s = Calculating the number of frames in video = Rate of video frame(25fps) * Time length of video 7) For (i=1; i<=s; i++) 8) { 9) H(K) = 71(mod i)[for rows] 10) H(L) = 89(mod i)[for columns] 11) } 12) If ((H(K) || H(L) = 0) || (H(K),H(L))= NOT FOUND IN FRAME) 13) { 14) H(K) = H(K) +7 15) H(L) = H(L) + 13 16) } 17) Replaced Red component bit of pixel with 1st character 18) Replaced Green component bit of pixel with 2nd character 19) Replaced Blue component bit of pixel with 3rd character. 20)} If video is of 4 minutes and of frame rate 25 frames per second then it means that 4 min video is equal to 240 second video which implies that it is having 25*240 framesthat is equal to 5100 frames, and we can replace 5100 frames pixel with 5100 characters 7.2 Decryption 1) Select the stego video 2) Start iteration until frames end 3) s= number of frames 4) For( i=1;i<=s; i++) 5) { 6) H(K) = 71(mod i)[for row] 7) H(L) = 89 (mod i)[for columns] 8) } 9) If ((H(K)|| H(L))=0 || (H(K),H(L))=not found in frame) 10) { 11) Collision resolution technique 12) H(K)=H(K)+7 13) H(L)=H(L)+13 14) } 15) Convert binary RGB bit value into ASCII and character values 16) } 8. CONCLUSIONS As frame rate of video is 25 frames per second human eyeis not able to visualize any sort of alteration in a single pixel. Thus video steganography is a good technique to hide the data. Frame 1 Pixel to choose in a frame to store 1st 3 characters that is 24 bits from text file H(K1) = K(mod m1) H(L1) = L(mod n1) (H(K1), H(L1)) pixel Replace (H(K1), H(L1)) pixel with 3 characters Next Frame 2 Choose pixel in a frame to store next 3 characters of text file that is 24 bits H(K2) = K2 (mod m2) H(L2) = L2 (mod n2) (H(K2), H(L2)) pixels Repeat till all the frames are used As
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 168 Video length = 4 minutes = 4*60 sec =240 sec Frame rate of video = 4 minutes Total frame rate in a video is 25 * 240 frames = 5100 frames Each frame consisting 3 characters. No. of characters that we can hide in a video is 5100*3 characters= 15300 characters. FUTURE ASPECTS We will implement this algorithm with the help of diffiehellman algorithm for embedding data bit into pixel bit. Further we are concerned with increasing the characters in video too. With the help of the concept or interpolation we will match the stego pixel with the original one. REFERENCES [1]. en.wikipedia.org/wiki/steganography [2]. strangehorizons.com [3]. TayVoughan, Seventh edition, Multemedia: Making It Work, Tata McGraw Hill. [4]. Seymour Lipschutz. 1st Edition, Data Structures, The McGrawHill, Schaum,sOutlins. [5]. Vipul Sharma, Sunny Kumar, A New Approach To Hide Text In Images Using Steganography. [6]. www.red.com/learn/red-101/video-aspect-ratios [7]. H. Wu, H. Wang, C. Tsai and C. Wang, Reversible image steganographic scheme via predictive coding. 1 (2010), ISSN: 01419382, 35-43. [8]. J, Corporation, Steganography. http://www.webopedia.com/ TERM/S/steganography.html. 2005. [9]. A.A.Zaidan, B.B.Zaidan, AnasMajeed, "High Securing Cover-File ofHidden Data Using Statistical Technique and AES EncryptionAlgorithm", World Academy of Science Engineering and Technology(WASET), Vol.54, ISSN: 2070- 3724, P.P 468-479. [10].www.strngehorizons.com/2001/20011008,steganograhy.s html#stools [11] www.garykessler.net/library/steganography.html BIOGRAPHIES Deepak Kumar Sharma, Mtech Student, Bahra University, Shimla Hills, Himachal Pradesh, Deepaksharma1810@live.com AsthaGautam, Mtech Student, Bahra University, Shimla Hills, Himachal Pradesh, Gautam.aastha1@gmail.com