SlideShare a Scribd company logo
Novateur Publication’s
International Journal of Innovation in Engineering, Research and Technology [IJIERT]
ICITDCEME’15 Conference Proceedings
ISSN No - 2394-3696
1 | P a g e
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN
FORENSICS TECHNIQUE FOR AUTHENTICATION AND DATA
SECURITY.
Mr.Wagh Rahul S.
Department of computer Department, SCSCOE, Rahuri Factory
Mr. Bagul Kunal S.
Department of computer Department, SCSCOE, Rahuri Factory
Mr. Shinde Dinesh R.
Department of computer Department,SCSCOE,Rahuri Factory.
Mr. Vathare Mahesh S.
Department of computer Department, SCSCOE,Rahuri Factory
ABSTRACT
Steganography is the art of covered or hidden text message. The purpose of steganography is covert communication-
to hide the existence of a secret message from a third party. This paper is intnded as a high-level technical
introduction to steganography for those unfamiliar with the field. It is directed at forensic computer examiners who
need a practical understanding of steganography without study into the mathematical, although references are
provided to many of the ongoing research for the person who needs or wants additional detail covered by audio-
video file. Although in this paper gives a historical context for steganography, the significance is on digital
applications use anti Forensics technique, focusing on hiding information in online audio and video files. Examples
for tools of software that employ steganography to hide data inside of audio-video file as well as software to detect
such hidden files will also be presented. Suitable algorithm such as LSB is used for image steganography suitable
parameter of security and authentication is like PSNR, histogram are obtained at transmittersende and receiver side
which are exactly identical, hence data security can be increased. This paper focus on the idea of computer anti
forensics technique and its use of video steganography in both investigative and security manner.
KEYWORDS: 4LSB; Data Hiding; Steganography; Histogram; PSNR; Computer anti Forensics; Authentication
INTRODUCTION
Steganography is the art of covered or hidden information. The purpose of steganography is covert communication
to hide a secret message from a third party. This differs from cryptography, the art of secret message, which is
intended to make a message unreadable by a third party but does not hide the existence of the secret communication.
Although steganography is distinct and separate from cryptography, there are many analogies between the both, and
some authors categorize steganography as a form of cryptography since hidden communication is a form of secret
writing. Nevertheless, this paper will treated steganography as a separate field[5].
Steganography hides the covert data but not the fact that two transactions are communicate with each other. The
steganography process generally involves placing a hidden information in some transport medium like audio-video
file, called the carrier[4]. The secret message is embedded in the carrier to form the steganography medium. The use
of a steganography key may be employed for encryption of the hidden message and/or for randomization in the
steganography scheme. In summary[4].
steganography_medium = (hidden_data + carrier + steganography_secrate key.)
The proposed system is provides audio-video cryptostegnography which is the combination of audio-video
steganography using anti Forensics Technique as a tool to authentication. Stenography is the method of hiding any
secret message like password, text and image, audio behind original cover file[2]. Original message is converted into
cipher text by using secret key and then hide into the LSB of original file. The proposed system is provides audio-
video cryptostegnography which is the combination of image steganography and audio steganography using anti
Forensics Technique as a software tool to authentication. The main aim is to hide secret data behind image and
audio of video file[1]. As video is the tool of many still frames of audio and video, we can select any frame of video
for hiding our secret information. Suitable algorithm such as LSB is used for frame of video steganography suitable
parameter of security and authentication like PSNR, histograms are obtained at transmittersender and receiver side
Novateur Publication’s
International Journal of Innovation in Engineering, Research and Technology [IJIERT]
ICITDCEME’15 Conference Proceedings
ISSN No - 2394-3696
2 | P a g e
which are exactly identical , hence data security can be increased. This paper focus the idea of computer anti
forensics technique and its use of video steganography in both investigative and security manner[2].
LITERATURE SURVEY:
COMPARISON OF EXISTING SYSTEM
In existing system for any site we use password and username in textual format .When we use this format to any site
there is changes getting hacking of the data when sending data from client to server for validating. If we use text
format then it readable to anyone. Next time encryption algorithm used for to prevent the hacking of the data. Now a
days there are deferent encryption algorithms are used. This technique is not scent to now a days. So now we
develop new technique for securing data when we transferring data for client to server we use the video
steganography. Which is more powerful technique for transferring? data for client to server.
PRESENT SYSTEM IN USE
The most basic form of user authentication, particularly on the Web, is the password authentication protocol. This
method of authentication forces you to remember username/password combinations to access accounts or special
sections of a website. While elective and in some ways fundamentally a part of online security, password
authentication protocols fail when you don't address them seriously. This means constructing complex passwords
and maintaining secrecy. This also means that entities implementing password authentication must safeguard
passwords in some way. Next use to Storage and Encryption When you use pass- word authentication, you must
store passwords and usernames in a database to authenticate users. If you don't have strong server security, someone
can break into the database and read the passwords. One way to address this is to use password "hashing," which
involves running the password through a hash algorithm that produces a unique value based on the password and
stores the hash value instead of the password itself. If the database is breached, the attacker can read only the hashes
and have no idea what the passwords are. However, hashing
in this sense exists only due to the inherent weakness of plain text password authentication. The glory of Internet
and its merits are being highly masked by the drawback associated with it. Of them the prime issue is Internet
vulnerability, leading to data modi_cation and data thefts. Many Web applications store the data in the data base and
retrieve and update information as needed. To overcome this type of disadvantages developed an video
stegnography.
FLAWS IN CURRENT SYSTEM
In the _rst and second step, program we accept cover audio and convert it into samples.Then we apply spread
spectrum stenographic algorithm and hide the encrypted data in audio frame. In third and fourth step we hide
authentication logo in _xed frame and recombine frames to from stego-audio. At receiver end above steps are
repeated in reverse manner.
BUSINESS CONTEXT
Nowadays, users can access the Internet and get the information globally spread on the websites. Upon receiving a
request for information, the server requests the user ID and password to prove whether the user intends to be
authenticated is a legitimate user or not. However, there are several malicious activities that could possibly make the
authentication scheme vulnerable. One of those is a web phishing, in which an attacker attempts to acquire sensitive
information such as usernames, passwords, and personal information such as credit card number or registration
number. So provide an audio-video cryptography is used for data hiding stegnography for transferring data from
source to destination.
Table: Literature survey
Paper Name Author Method Algorithm Addvantage Disadvantage
Image Encryption And
Decryption
(2003)
Prof.shen
chen,ron-gjian
chen
Scan Method Encryption
Decryp-
tion Algo-
rithm
Loss less En-
cryption Of
Image,Security
can be incre-ased using
more
encryption loop
It can not used
Any multimedia
system.
Data hiding binary
image for Authonti-
cation and annota-
tion(2006)
Prof.min
wu,Prof.
bede liu
Digital Wa-
termarking & Data
Hiding
Technique
Data Hid-
ing of Bi-
nary Image
It Can Stored
data in digital
form
Low Secu-
rity.Digital Data
can be easly
access.
Data Hiding in Prof. P. watermarkig, data hid- It iS used To It cant be used
International Journal of Innovation in Engineering, Research and Technology [IJIERT]
Image and Video Part
IFundamental
Issues and
Solutions(2008)
Diaco-
nis,Profs.
B. Dick-
inson, E.
Cinlar,
and S.
Kulkarni
modulation and
multiplexing,
shuffe.
Application Of data
Hiding in Audio Video
using Anti-
Forensics tech
For Authentica
-tion and
Dasecrity 2014
Prof.Sunil
kmoon,
Prof.
Rajeshree D
Raut
Steganography,
Authentication
of Frames
PROPOSED SYSTEM:
In existing system for ay site we use password and username in textual format .When we use this format to any
site there is changes getting hacking of the data when sending data from client to server for validating. If we
use text format then it readable to anyone. Next time encryption algorithm used for to prevent the hacking of
the data. Now a days there are different encryption algorithms a
a day. So now we develop new technique for securing data when we transferring data for client to server we
use the video steganography. Which is more powerful technique for transferring data for client to se
SYSTEM ARCHITECTURE:
The main aim is to hide secret information behind image and audio of video le. As video is the application of many
still frames of images and audio, we can select any frame of video and audio for hiding our secret information.
Suitable algorithm such as LSB is used for image steganography suitable parameter of security and authentication
like PSNR, histogram are obtained at receiver and transmitter side which are exactly identical , hence data security
can be increased. This paper focus the idea of computer
both investigative and security manner.
ALGORITHMS:
1)Least Signi_cant Bit (LSB) based steganography:
The simplest and most common type of steganography is LSB (least signi_cant bit).
encode the hidden information. Suppose we want to encode the letter A (ASCII 65 or binary 01000001) in the
following 8 bytes of a carrier file.
01011101 11010000 00011100 10101100
11100111 10000111 01101011 11100011
Becomes
01011100 11010001 00011100 10101100
11100110 10000110 01101010 11100011
Novateur Publication’s
International Journal of Innovation in Engineering, Research and Technology [IJIERT]
ICITDCEME’15 Conference Proceedings
ISSN No
modulation and
multiplexing,
shuffe.
ing algo-
rithms.divied
framework sys-
tem.It used Lay-ered
structure of
data hiding.
Steganography,
Authentication
of Frames
LSB
Algo,AES
Algo,RLSB
Algo
High Security
provided.Secure
Data transfer
for _nancial
purpose.
In existing system for ay site we use password and username in textual format .When we use this format to any
hacking of the data when sending data from client to server for validating. If we
use text format then it readable to anyone. Next time encryption algorithm used for to prevent the hacking of
the data. Now a days there are different encryption algorithms are used. This technique is not sufficient to now
a day. So now we develop new technique for securing data when we transferring data for client to server we
use the video steganography. Which is more powerful technique for transferring data for client to se
Fig 1.System Architecture
The main aim is to hide secret information behind image and audio of video le. As video is the application of many
still frames of images and audio, we can select any frame of video and audio for hiding our secret information.
B is used for image steganography suitable parameter of security and authentication
like PSNR, histogram are obtained at receiver and transmitter side which are exactly identical , hence data security
can be increased. This paper focus the idea of computer forensics technique and its use of video steganography in
both investigative and security manner.
1)Least Signi_cant Bit (LSB) based steganography:
The simplest and most common type of steganography is LSB (least signi_cant bit). The one's bit of a byte is used to
encode the hidden information. Suppose we want to encode the letter A (ASCII 65 or binary 01000001) in the
01011101 11010000 00011100 10101100
11100111 10000111 01101011 11100011
01011100 11010001 00011100 10101100
11100110 10000110 01101010 11100011
Novateur Publication’s
International Journal of Innovation in Engineering, Research and Technology [IJIERT]
ICITDCEME’15 Conference Proceedings
ISSN No - 2394-3696
3 | P a g e
audio _les.It
Can Not Men-
sion Size of
hidden data.
Future work Not
Mentioned
In existing system for ay site we use password and username in textual format .When we use this format to any
hacking of the data when sending data from client to server for validating. If we
use text format then it readable to anyone. Next time encryption algorithm used for to prevent the hacking of
re used. This technique is not sufficient to now
a day. So now we develop new technique for securing data when we transferring data for client to server we
use the video steganography. Which is more powerful technique for transferring data for client to server?
The main aim is to hide secret information behind image and audio of video le. As video is the application of many
still frames of images and audio, we can select any frame of video and audio for hiding our secret information.
B is used for image steganography suitable parameter of security and authentication
like PSNR, histogram are obtained at receiver and transmitter side which are exactly identical , hence data security
forensics technique and its use of video steganography in
The one's bit of a byte is used to
encode the hidden information. Suppose we want to encode the letter A (ASCII 65 or binary 01000001) in the
Novateur Publication’s
International Journal of Innovation in Engineering, Research and Technology [IJIERT]
ICITDCEME’15 Conference Proceedings
ISSN No - 2394-3696
4 | P a g e
2)AES ALGORITHM FOR ENCRYPTION:
AES is based on a design principle known as a substitution-permutation network, and is fast in both software and
hardware. Unlike its predecessor DES, AES does not use a Feistel network. AES operates on a 44 column-major
order matrix of bytes, termed the state, although some versions of Rijndael have a larger block size and have
additional columns in the state. Most AES calculations are done in a special finite field. We use 128 bit key for an
AES cipher which specifies the number of repetitions should be 10 cycles' transformation rounds that convert the
input, called the plaintext, into the final output, called the cipher text. Each round consists of several processing
steps, each containing four similar but di_erent stages, including one that depends on the encryption key itself. A set
of reverse rounds are applied to transform cipher text back into the original plaintext using the same encryption key.
Random Least Signi_cant Bit(RLSB)
Image steganography, is one kind of steganographic system where the secret message is hidden in a digital image
with some kind of hiding strategy. The conventional image steganographic algorithm is the Least Signi_cant Bit
(LSB) algorithm, the advantage of LSB is its simplicity to embed the bits of the message directly into the LSB plane
of the cover image and many applications use this method. The storage of information bits in the least signi_cant
bits of the image does not a_ect the image in a greater scale and hence the change is not perceived by the Human
Visual System (HVS). LSB embedding when applied to the pixels of an image sequentially make it easy for any
intruder to uncover the information, hence the bits can be embedded in a random fashion to present a more secured
way of information hiding.
FLOW OF EXISTING SYSTEM :
AT THE SENDER SIDE:
Choose Audio-Video file:
Following are the steps for selecting a specific audio-video file and the separation of audio and video part are
explained.
1.Select any available format audio-video file in which user wants to hide data.
2.Apart the video and audio from the Video file using specific software.
3.Then save the give audio files and video files isolation separately.
Hiding Frame in Video (Sender)
Following are the steps for insert a secret image in one of the selected video frame are give below
1. Choose the video file and read the videofile.
2. Now play the video.
3.We See No Any change in the Give Video File.
4 Choose the random frame in which the user want to hide Image in it.
5. Choose the encrypted image in which the user want to hide
6. We use data encryption Using AES Algorithm
7.Then extract the most significant bit MSB of the frame by bitand frame with 240 using “bitand” function.
8.Now extract the givemsb of the encrypted image byBitand image with 240 using “bitand” function.
9. Reverse the give place of msb to lsb by dividing by 16.
10. The given reshaped row vector of Real image data is to be embedded on the given frame
matrix in which addition of each row vector bit’s by two last 4 bits of the given frame bit.
11.FinallyStego Video is created.
12.Then check Either Stego video is played or Not.
13. Close the given file.
Now Hiding data in Audio
Following are the steps for Hiding data in Audiofile are to be explained.
1. First step is Encrypted message is take.
2. Then it convert to ASCII format
3. Supply the hiding key.
4. Translate eachan every audio sample into 8 bits sequences.
5. From each sample read first two MSBbits and convert it to decimal.
6. Addthe given secret bits into a specific position refer using the last method.
7. Same Process will be conducted until the secret bits are changed.
Creating stego Audio-Video file
Combine stego audio and stegovideo file by using specific software. then we get Stego audio-video file is the
combination of Data and original file at the transmitter side.
Novateur Publication’s
International Journal of Innovation in Engineering, Research and Technology [IJIERT]
ICITDCEME’15 Conference Proceedings
ISSN No - 2394-3696
5 | P a g e
AT THE RECIVER SIDE
Recovering data from Audio(Reciver)
1.Read the stego audio file from the given stego audio-video at receiver.
2. Select the frame number(the frame number should be same at transmitter at receiver side then only the
authentication process start else it gets terminated)
3.To recover the authentication image from the selected frame bit AND the frame data with 15.
4.Authentication image data is available at LSB of frame is recovered.
5.Select the authentication image at receiver side compare recovered authenticated image with the selected image.
6.If both the images matched , then only user can recover the text behind audio else process is terminated.
7.Audio Recovery
8.Read audio File.
9.Open this stego audio file in read mode.
10.Read wave file's first 40 bytes of header.
11.Then read all its data after 40th byte and close file.
12.Recover the size of identity key from LSB of .wav file. Recover identity key from further LSB bits of .WAV
file.message to the end user
message to the end user
CONCLUSION:
Data hiding in audio-video file with the help of computer forensic technique provide better hiding and security for
the secret information. We are working on hiding image and text behind video and audio file and extracted from an
any video file at sender side and computer forensic techniques at receiver side.
REFERENCES
[1] Sunil K.Moon And Rajashree D.Raut”Application Of Data Hiding In Audio Video Using Anti Forensic
Technique For Authen- Tication And Data Security”Ijeec:International Journal Of Electrical Electronics And
Communication 2014ieee.
[2]Yugeshwarikakde And Priyankagonnade, Audio Video Steganography For Authentication Anddata Security”Ieee
International Journal On Recent And Inno- Vation Trends In Computing And Communication Vol: 1 Issue: 4, April
2013.
[3]Ms. M. Sujana[M.Tech] And Mr. K.L.L. Lokesh,[M.Tech] Application Of Data Hiding In Audio-Image Using
Anti Forensics Technique For Authentication And Data Security In Linux Platform”Ijeec : International Journal Of
Electrical Elec- Tronics And Communication
[4]Athiramohananand And Dr. Sasidharbabusuvanam," Audio - Video Steganography Using Forensictechniquefor
Data Security”International Journal Of Engineering And Computer Technology(Ijcet)Issn 09766367volume 5, Issue
12, December (2014), Pp. 154-157
[5] P. Srilatha And J. Vijaya Lakshmi, Anti Forensic Techniques Used For Data Security By Using Audio Video
Files”International Journal Of- Scientic Engineering And Technologyissn 2319-8885vol.04,Issue.35,August-
2015,Pages:6949-6952

More Related Content

What's hot

Data Security Using Steganography
Data Security Using Steganography Data Security Using Steganography
Data Security Using Steganography
NidhinRaj Saikripa
 
final_Paper_springer_final
final_Paper_springer_finalfinal_Paper_springer_final
final_Paper_springer_finalJoseph Emmanuel
 
Images Steganography using Pixel Value Difference and Histogram Analysis
Images Steganography using Pixel Value  Difference and Histogram AnalysisImages Steganography using Pixel Value  Difference and Histogram Analysis
Images Steganography using Pixel Value Difference and Histogram Analysis
Northeastern University
 
Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyHungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
IJECEIAES
 
Data security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyData security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptography
Alexander Decker
 
Steganograpy
SteganograpySteganograpy
Steganograpy
arvind carpenter
 
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB MethodSecure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
ijtsrd
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
ijcisjournal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Secure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop BasedSecure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop Based
ijtsrd
 
Sample projectdocumentation
Sample projectdocumentationSample projectdocumentation
Sample projectdocumentationhlksd
 
Ew25914917
Ew25914917Ew25914917
Ew25914917
IJERA Editor
 
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONDUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
IJNSA Journal
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
IRJET Journal
 
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHYA NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
cscpconf
 
PVD BASED STEGNO.
PVD BASED STEGNO.PVD BASED STEGNO.
PVD BASED STEGNO.
Abhishek Dhara
 

What's hot (18)

Data Security Using Steganography
Data Security Using Steganography Data Security Using Steganography
Data Security Using Steganography
 
319 325
319 325319 325
319 325
 
Stegonoraphy
StegonoraphyStegonoraphy
Stegonoraphy
 
final_Paper_springer_final
final_Paper_springer_finalfinal_Paper_springer_final
final_Paper_springer_final
 
Images Steganography using Pixel Value Difference and Histogram Analysis
Images Steganography using Pixel Value  Difference and Histogram AnalysisImages Steganography using Pixel Value  Difference and Histogram Analysis
Images Steganography using Pixel Value Difference and Histogram Analysis
 
Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyHungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
 
Data security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyData security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptography
 
Steganograpy
SteganograpySteganograpy
Steganograpy
 
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB MethodSecure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Secure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop BasedSecure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop Based
 
Sample projectdocumentation
Sample projectdocumentationSample projectdocumentation
Sample projectdocumentation
 
Ew25914917
Ew25914917Ew25914917
Ew25914917
 
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONDUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
 
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHYA NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
 
PVD BASED STEGNO.
PVD BASED STEGNO.PVD BASED STEGNO.
PVD BASED STEGNO.
 

Similar to APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR AUTHENTICATION AND DATA SECURITY

V9I1202028.pdf
V9I1202028.pdfV9I1202028.pdf
V9I1202028.pdf
ssuser50a5ec
 
L1803037377
L1803037377L1803037377
L1803037377
IOSR Journals
 
Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Method
ijtsrd
 
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
IRJET Journal
 
Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143
Praneeta Dehare
 
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial IntelligenceVideo Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
ijtsrd
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
vivatechijri
 
A detailed review on Video Steganography
A detailed review on Video SteganographyA detailed review on Video Steganography
A detailed review on Video Steganography
IRJET Journal
 
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
ijtsrd
 
Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...
Praneeta Dehare
 
H017255560
H017255560H017255560
H017255560
IOSR Journals
 
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
iosrjce
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: Report
Aparna Nk
 
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s):
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s): Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s):
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s):
INFOGAIN PUBLICATION
 
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTINGDATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
International Journal of Technical Research & Application
 
Iaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an imageIaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an image
Iaetsd Iaetsd
 
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
IJNSA Journal
 
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within ImageA Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
inventionjournals
 
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHYASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
Asia Smith
 
Review on: Combination of Cryptography and Steganography for Secure File Tran...
Review on: Combination of Cryptography and Steganography for Secure File Tran...Review on: Combination of Cryptography and Steganography for Secure File Tran...
Review on: Combination of Cryptography and Steganography for Secure File Tran...
IRJET Journal
 

Similar to APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR AUTHENTICATION AND DATA SECURITY (20)

V9I1202028.pdf
V9I1202028.pdfV9I1202028.pdf
V9I1202028.pdf
 
L1803037377
L1803037377L1803037377
L1803037377
 
Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Method
 
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
 
Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143
 
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial IntelligenceVideo Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
 
A detailed review on Video Steganography
A detailed review on Video SteganographyA detailed review on Video Steganography
A detailed review on Video Steganography
 
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
 
Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...
 
H017255560
H017255560H017255560
H017255560
 
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: Report
 
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s):
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s): Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s):
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s):
 
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTINGDATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
 
Iaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an imageIaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an image
 
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
 
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within ImageA Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
 
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHYASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
 
Review on: Combination of Cryptography and Steganography for Secure File Tran...
Review on: Combination of Cryptography and Steganography for Secure File Tran...Review on: Combination of Cryptography and Steganography for Secure File Tran...
Review on: Combination of Cryptography and Steganography for Secure File Tran...
 

More from ijiert bestjournal

CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMP
 CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMP CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMP
CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMP
ijiert bestjournal
 
A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...
A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...
A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...
ijiert bestjournal
 
COMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAF
COMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAFCOMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAF
COMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAF
ijiert bestjournal
 
POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINE
 POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINE POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINE
POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINE
ijiert bestjournal
 
FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY
FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY
FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY
ijiert bestjournal
 
REVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAIN
REVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAINREVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAIN
REVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAIN
ijiert bestjournal
 
ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...
ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...
ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...
ijiert bestjournal
 
SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...
SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...
SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...
ijiert bestjournal
 
EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...
EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...
EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...
ijiert bestjournal
 
STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR
STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR
STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR
ijiert bestjournal
 
DESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFT
DESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFTDESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFT
DESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFT
ijiert bestjournal
 
ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...
ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...
ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...
ijiert bestjournal
 
HEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENT
HEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENTHEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENT
HEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENT
ijiert bestjournal
 
MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH
MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH
MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH
ijiert bestjournal
 
IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW
IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW
IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW
ijiert bestjournal
 
DESIGN OF WELDING FIXTURES AND POSITIONERS
DESIGN OF WELDING FIXTURES AND POSITIONERSDESIGN OF WELDING FIXTURES AND POSITIONERS
DESIGN OF WELDING FIXTURES AND POSITIONERS
ijiert bestjournal
 
ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...
ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...
ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...
ijiert bestjournal
 
REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...
REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...
REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...
ijiert bestjournal
 
PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...
PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...
PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...
ijiert bestjournal
 
MAGNETIC ABRASIVE FINISHING
MAGNETIC ABRASIVE FINISHINGMAGNETIC ABRASIVE FINISHING
MAGNETIC ABRASIVE FINISHING
ijiert bestjournal
 

More from ijiert bestjournal (20)

CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMP
 CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMP CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMP
CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMP
 
A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...
A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...
A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...
 
COMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAF
COMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAFCOMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAF
COMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAF
 
POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINE
 POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINE POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINE
POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINE
 
FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY
FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY
FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY
 
REVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAIN
REVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAINREVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAIN
REVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAIN
 
ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...
ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...
ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...
 
SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...
SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...
SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...
 
EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...
EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...
EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...
 
STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR
STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR
STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR
 
DESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFT
DESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFTDESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFT
DESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFT
 
ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...
ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...
ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...
 
HEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENT
HEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENTHEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENT
HEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENT
 
MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH
MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH
MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH
 
IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW
IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW
IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW
 
DESIGN OF WELDING FIXTURES AND POSITIONERS
DESIGN OF WELDING FIXTURES AND POSITIONERSDESIGN OF WELDING FIXTURES AND POSITIONERS
DESIGN OF WELDING FIXTURES AND POSITIONERS
 
ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...
ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...
ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...
 
REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...
REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...
REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...
 
PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...
PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...
PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...
 
MAGNETIC ABRASIVE FINISHING
MAGNETIC ABRASIVE FINISHINGMAGNETIC ABRASIVE FINISHING
MAGNETIC ABRASIVE FINISHING
 

Recently uploaded

Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 

Recently uploaded (20)

Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 

APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR AUTHENTICATION AND DATA SECURITY

  • 1. Novateur Publication’s International Journal of Innovation in Engineering, Research and Technology [IJIERT] ICITDCEME’15 Conference Proceedings ISSN No - 2394-3696 1 | P a g e APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR AUTHENTICATION AND DATA SECURITY. Mr.Wagh Rahul S. Department of computer Department, SCSCOE, Rahuri Factory Mr. Bagul Kunal S. Department of computer Department, SCSCOE, Rahuri Factory Mr. Shinde Dinesh R. Department of computer Department,SCSCOE,Rahuri Factory. Mr. Vathare Mahesh S. Department of computer Department, SCSCOE,Rahuri Factory ABSTRACT Steganography is the art of covered or hidden text message. The purpose of steganography is covert communication- to hide the existence of a secret message from a third party. This paper is intnded as a high-level technical introduction to steganography for those unfamiliar with the field. It is directed at forensic computer examiners who need a practical understanding of steganography without study into the mathematical, although references are provided to many of the ongoing research for the person who needs or wants additional detail covered by audio- video file. Although in this paper gives a historical context for steganography, the significance is on digital applications use anti Forensics technique, focusing on hiding information in online audio and video files. Examples for tools of software that employ steganography to hide data inside of audio-video file as well as software to detect such hidden files will also be presented. Suitable algorithm such as LSB is used for image steganography suitable parameter of security and authentication is like PSNR, histogram are obtained at transmittersende and receiver side which are exactly identical, hence data security can be increased. This paper focus on the idea of computer anti forensics technique and its use of video steganography in both investigative and security manner. KEYWORDS: 4LSB; Data Hiding; Steganography; Histogram; PSNR; Computer anti Forensics; Authentication INTRODUCTION Steganography is the art of covered or hidden information. The purpose of steganography is covert communication to hide a secret message from a third party. This differs from cryptography, the art of secret message, which is intended to make a message unreadable by a third party but does not hide the existence of the secret communication. Although steganography is distinct and separate from cryptography, there are many analogies between the both, and some authors categorize steganography as a form of cryptography since hidden communication is a form of secret writing. Nevertheless, this paper will treated steganography as a separate field[5]. Steganography hides the covert data but not the fact that two transactions are communicate with each other. The steganography process generally involves placing a hidden information in some transport medium like audio-video file, called the carrier[4]. The secret message is embedded in the carrier to form the steganography medium. The use of a steganography key may be employed for encryption of the hidden message and/or for randomization in the steganography scheme. In summary[4]. steganography_medium = (hidden_data + carrier + steganography_secrate key.) The proposed system is provides audio-video cryptostegnography which is the combination of audio-video steganography using anti Forensics Technique as a tool to authentication. Stenography is the method of hiding any secret message like password, text and image, audio behind original cover file[2]. Original message is converted into cipher text by using secret key and then hide into the LSB of original file. The proposed system is provides audio- video cryptostegnography which is the combination of image steganography and audio steganography using anti Forensics Technique as a software tool to authentication. The main aim is to hide secret data behind image and audio of video file[1]. As video is the tool of many still frames of audio and video, we can select any frame of video for hiding our secret information. Suitable algorithm such as LSB is used for frame of video steganography suitable parameter of security and authentication like PSNR, histograms are obtained at transmittersender and receiver side
  • 2. Novateur Publication’s International Journal of Innovation in Engineering, Research and Technology [IJIERT] ICITDCEME’15 Conference Proceedings ISSN No - 2394-3696 2 | P a g e which are exactly identical , hence data security can be increased. This paper focus the idea of computer anti forensics technique and its use of video steganography in both investigative and security manner[2]. LITERATURE SURVEY: COMPARISON OF EXISTING SYSTEM In existing system for any site we use password and username in textual format .When we use this format to any site there is changes getting hacking of the data when sending data from client to server for validating. If we use text format then it readable to anyone. Next time encryption algorithm used for to prevent the hacking of the data. Now a days there are deferent encryption algorithms are used. This technique is not scent to now a days. So now we develop new technique for securing data when we transferring data for client to server we use the video steganography. Which is more powerful technique for transferring? data for client to server. PRESENT SYSTEM IN USE The most basic form of user authentication, particularly on the Web, is the password authentication protocol. This method of authentication forces you to remember username/password combinations to access accounts or special sections of a website. While elective and in some ways fundamentally a part of online security, password authentication protocols fail when you don't address them seriously. This means constructing complex passwords and maintaining secrecy. This also means that entities implementing password authentication must safeguard passwords in some way. Next use to Storage and Encryption When you use pass- word authentication, you must store passwords and usernames in a database to authenticate users. If you don't have strong server security, someone can break into the database and read the passwords. One way to address this is to use password "hashing," which involves running the password through a hash algorithm that produces a unique value based on the password and stores the hash value instead of the password itself. If the database is breached, the attacker can read only the hashes and have no idea what the passwords are. However, hashing in this sense exists only due to the inherent weakness of plain text password authentication. The glory of Internet and its merits are being highly masked by the drawback associated with it. Of them the prime issue is Internet vulnerability, leading to data modi_cation and data thefts. Many Web applications store the data in the data base and retrieve and update information as needed. To overcome this type of disadvantages developed an video stegnography. FLAWS IN CURRENT SYSTEM In the _rst and second step, program we accept cover audio and convert it into samples.Then we apply spread spectrum stenographic algorithm and hide the encrypted data in audio frame. In third and fourth step we hide authentication logo in _xed frame and recombine frames to from stego-audio. At receiver end above steps are repeated in reverse manner. BUSINESS CONTEXT Nowadays, users can access the Internet and get the information globally spread on the websites. Upon receiving a request for information, the server requests the user ID and password to prove whether the user intends to be authenticated is a legitimate user or not. However, there are several malicious activities that could possibly make the authentication scheme vulnerable. One of those is a web phishing, in which an attacker attempts to acquire sensitive information such as usernames, passwords, and personal information such as credit card number or registration number. So provide an audio-video cryptography is used for data hiding stegnography for transferring data from source to destination. Table: Literature survey Paper Name Author Method Algorithm Addvantage Disadvantage Image Encryption And Decryption (2003) Prof.shen chen,ron-gjian chen Scan Method Encryption Decryp- tion Algo- rithm Loss less En- cryption Of Image,Security can be incre-ased using more encryption loop It can not used Any multimedia system. Data hiding binary image for Authonti- cation and annota- tion(2006) Prof.min wu,Prof. bede liu Digital Wa- termarking & Data Hiding Technique Data Hid- ing of Bi- nary Image It Can Stored data in digital form Low Secu- rity.Digital Data can be easly access. Data Hiding in Prof. P. watermarkig, data hid- It iS used To It cant be used
  • 3. International Journal of Innovation in Engineering, Research and Technology [IJIERT] Image and Video Part IFundamental Issues and Solutions(2008) Diaco- nis,Profs. B. Dick- inson, E. Cinlar, and S. Kulkarni modulation and multiplexing, shuffe. Application Of data Hiding in Audio Video using Anti- Forensics tech For Authentica -tion and Dasecrity 2014 Prof.Sunil kmoon, Prof. Rajeshree D Raut Steganography, Authentication of Frames PROPOSED SYSTEM: In existing system for ay site we use password and username in textual format .When we use this format to any site there is changes getting hacking of the data when sending data from client to server for validating. If we use text format then it readable to anyone. Next time encryption algorithm used for to prevent the hacking of the data. Now a days there are different encryption algorithms a a day. So now we develop new technique for securing data when we transferring data for client to server we use the video steganography. Which is more powerful technique for transferring data for client to se SYSTEM ARCHITECTURE: The main aim is to hide secret information behind image and audio of video le. As video is the application of many still frames of images and audio, we can select any frame of video and audio for hiding our secret information. Suitable algorithm such as LSB is used for image steganography suitable parameter of security and authentication like PSNR, histogram are obtained at receiver and transmitter side which are exactly identical , hence data security can be increased. This paper focus the idea of computer both investigative and security manner. ALGORITHMS: 1)Least Signi_cant Bit (LSB) based steganography: The simplest and most common type of steganography is LSB (least signi_cant bit). encode the hidden information. Suppose we want to encode the letter A (ASCII 65 or binary 01000001) in the following 8 bytes of a carrier file. 01011101 11010000 00011100 10101100 11100111 10000111 01101011 11100011 Becomes 01011100 11010001 00011100 10101100 11100110 10000110 01101010 11100011 Novateur Publication’s International Journal of Innovation in Engineering, Research and Technology [IJIERT] ICITDCEME’15 Conference Proceedings ISSN No modulation and multiplexing, shuffe. ing algo- rithms.divied framework sys- tem.It used Lay-ered structure of data hiding. Steganography, Authentication of Frames LSB Algo,AES Algo,RLSB Algo High Security provided.Secure Data transfer for _nancial purpose. In existing system for ay site we use password and username in textual format .When we use this format to any hacking of the data when sending data from client to server for validating. If we use text format then it readable to anyone. Next time encryption algorithm used for to prevent the hacking of the data. Now a days there are different encryption algorithms are used. This technique is not sufficient to now a day. So now we develop new technique for securing data when we transferring data for client to server we use the video steganography. Which is more powerful technique for transferring data for client to se Fig 1.System Architecture The main aim is to hide secret information behind image and audio of video le. As video is the application of many still frames of images and audio, we can select any frame of video and audio for hiding our secret information. B is used for image steganography suitable parameter of security and authentication like PSNR, histogram are obtained at receiver and transmitter side which are exactly identical , hence data security can be increased. This paper focus the idea of computer forensics technique and its use of video steganography in both investigative and security manner. 1)Least Signi_cant Bit (LSB) based steganography: The simplest and most common type of steganography is LSB (least signi_cant bit). The one's bit of a byte is used to encode the hidden information. Suppose we want to encode the letter A (ASCII 65 or binary 01000001) in the 01011101 11010000 00011100 10101100 11100111 10000111 01101011 11100011 01011100 11010001 00011100 10101100 11100110 10000110 01101010 11100011 Novateur Publication’s International Journal of Innovation in Engineering, Research and Technology [IJIERT] ICITDCEME’15 Conference Proceedings ISSN No - 2394-3696 3 | P a g e audio _les.It Can Not Men- sion Size of hidden data. Future work Not Mentioned In existing system for ay site we use password and username in textual format .When we use this format to any hacking of the data when sending data from client to server for validating. If we use text format then it readable to anyone. Next time encryption algorithm used for to prevent the hacking of re used. This technique is not sufficient to now a day. So now we develop new technique for securing data when we transferring data for client to server we use the video steganography. Which is more powerful technique for transferring data for client to server? The main aim is to hide secret information behind image and audio of video le. As video is the application of many still frames of images and audio, we can select any frame of video and audio for hiding our secret information. B is used for image steganography suitable parameter of security and authentication like PSNR, histogram are obtained at receiver and transmitter side which are exactly identical , hence data security forensics technique and its use of video steganography in The one's bit of a byte is used to encode the hidden information. Suppose we want to encode the letter A (ASCII 65 or binary 01000001) in the
  • 4. Novateur Publication’s International Journal of Innovation in Engineering, Research and Technology [IJIERT] ICITDCEME’15 Conference Proceedings ISSN No - 2394-3696 4 | P a g e 2)AES ALGORITHM FOR ENCRYPTION: AES is based on a design principle known as a substitution-permutation network, and is fast in both software and hardware. Unlike its predecessor DES, AES does not use a Feistel network. AES operates on a 44 column-major order matrix of bytes, termed the state, although some versions of Rijndael have a larger block size and have additional columns in the state. Most AES calculations are done in a special finite field. We use 128 bit key for an AES cipher which specifies the number of repetitions should be 10 cycles' transformation rounds that convert the input, called the plaintext, into the final output, called the cipher text. Each round consists of several processing steps, each containing four similar but di_erent stages, including one that depends on the encryption key itself. A set of reverse rounds are applied to transform cipher text back into the original plaintext using the same encryption key. Random Least Signi_cant Bit(RLSB) Image steganography, is one kind of steganographic system where the secret message is hidden in a digital image with some kind of hiding strategy. The conventional image steganographic algorithm is the Least Signi_cant Bit (LSB) algorithm, the advantage of LSB is its simplicity to embed the bits of the message directly into the LSB plane of the cover image and many applications use this method. The storage of information bits in the least signi_cant bits of the image does not a_ect the image in a greater scale and hence the change is not perceived by the Human Visual System (HVS). LSB embedding when applied to the pixels of an image sequentially make it easy for any intruder to uncover the information, hence the bits can be embedded in a random fashion to present a more secured way of information hiding. FLOW OF EXISTING SYSTEM : AT THE SENDER SIDE: Choose Audio-Video file: Following are the steps for selecting a specific audio-video file and the separation of audio and video part are explained. 1.Select any available format audio-video file in which user wants to hide data. 2.Apart the video and audio from the Video file using specific software. 3.Then save the give audio files and video files isolation separately. Hiding Frame in Video (Sender) Following are the steps for insert a secret image in one of the selected video frame are give below 1. Choose the video file and read the videofile. 2. Now play the video. 3.We See No Any change in the Give Video File. 4 Choose the random frame in which the user want to hide Image in it. 5. Choose the encrypted image in which the user want to hide 6. We use data encryption Using AES Algorithm 7.Then extract the most significant bit MSB of the frame by bitand frame with 240 using “bitand” function. 8.Now extract the givemsb of the encrypted image byBitand image with 240 using “bitand” function. 9. Reverse the give place of msb to lsb by dividing by 16. 10. The given reshaped row vector of Real image data is to be embedded on the given frame matrix in which addition of each row vector bit’s by two last 4 bits of the given frame bit. 11.FinallyStego Video is created. 12.Then check Either Stego video is played or Not. 13. Close the given file. Now Hiding data in Audio Following are the steps for Hiding data in Audiofile are to be explained. 1. First step is Encrypted message is take. 2. Then it convert to ASCII format 3. Supply the hiding key. 4. Translate eachan every audio sample into 8 bits sequences. 5. From each sample read first two MSBbits and convert it to decimal. 6. Addthe given secret bits into a specific position refer using the last method. 7. Same Process will be conducted until the secret bits are changed. Creating stego Audio-Video file Combine stego audio and stegovideo file by using specific software. then we get Stego audio-video file is the combination of Data and original file at the transmitter side.
  • 5. Novateur Publication’s International Journal of Innovation in Engineering, Research and Technology [IJIERT] ICITDCEME’15 Conference Proceedings ISSN No - 2394-3696 5 | P a g e AT THE RECIVER SIDE Recovering data from Audio(Reciver) 1.Read the stego audio file from the given stego audio-video at receiver. 2. Select the frame number(the frame number should be same at transmitter at receiver side then only the authentication process start else it gets terminated) 3.To recover the authentication image from the selected frame bit AND the frame data with 15. 4.Authentication image data is available at LSB of frame is recovered. 5.Select the authentication image at receiver side compare recovered authenticated image with the selected image. 6.If both the images matched , then only user can recover the text behind audio else process is terminated. 7.Audio Recovery 8.Read audio File. 9.Open this stego audio file in read mode. 10.Read wave file's first 40 bytes of header. 11.Then read all its data after 40th byte and close file. 12.Recover the size of identity key from LSB of .wav file. Recover identity key from further LSB bits of .WAV file.message to the end user message to the end user CONCLUSION: Data hiding in audio-video file with the help of computer forensic technique provide better hiding and security for the secret information. We are working on hiding image and text behind video and audio file and extracted from an any video file at sender side and computer forensic techniques at receiver side. REFERENCES [1] Sunil K.Moon And Rajashree D.Raut”Application Of Data Hiding In Audio Video Using Anti Forensic Technique For Authen- Tication And Data Security”Ijeec:International Journal Of Electrical Electronics And Communication 2014ieee. [2]Yugeshwarikakde And Priyankagonnade, Audio Video Steganography For Authentication Anddata Security”Ieee International Journal On Recent And Inno- Vation Trends In Computing And Communication Vol: 1 Issue: 4, April 2013. [3]Ms. M. Sujana[M.Tech] And Mr. K.L.L. Lokesh,[M.Tech] Application Of Data Hiding In Audio-Image Using Anti Forensics Technique For Authentication And Data Security In Linux Platform”Ijeec : International Journal Of Electrical Elec- Tronics And Communication [4]Athiramohananand And Dr. Sasidharbabusuvanam," Audio - Video Steganography Using Forensictechniquefor Data Security”International Journal Of Engineering And Computer Technology(Ijcet)Issn 09766367volume 5, Issue 12, December (2014), Pp. 154-157 [5] P. Srilatha And J. Vijaya Lakshmi, Anti Forensic Techniques Used For Data Security By Using Audio Video Files”International Journal Of- Scientic Engineering And Technologyissn 2319-8885vol.04,Issue.35,August- 2015,Pages:6949-6952