SlideShare a Scribd company logo
Secure Video Transmission Using Steganography and
Cryptography
NAME :MAIZATUL AUNI BINTI MAZHAR
COURSE : BACHELOR OF COMPUTER SCIENCE
(NETWORK SECURITY)
SUPERVISOR : DR ZARINA BINTI MOHAMAD
CHAPTER 1
1.0 INTRODUCTION
1.1 BACKGROUND
3
4
PROBLEM STATEMENT
 Development of large open network makes the security threats increased significantly.For example,modification of
information masquerade and other threats.Therefore, steganography techniques has been apply to secure data during
transmission.However,using only steganography method is no longer secured.Hence,cryptography technique must be
combined together with steganography method to provide better security.
 However ,for the cover media, video file is being used which generally a collection of images and sounds, so most of
the presented techniques on images and audio can be applied to video files too . The great advantages of video are the
large amount of data that can be hidden inside and the fact that it is a moving stream of images and sounds.
5
1.3 OBJECTIVE
▪ Objective to implement this approach:
▪ 1.To propose a combination of steganography and
cryptography techniques to provide authentication
and confidentiality of that secret data.
▪ 2.To design the proposed techniques to protect the
secrecy of data.
▪ 3.To implement and test if quality of the cover
media is loss after the encrypted message is
hidden into it.
6
1.4 SCOPES OF PROJECT
▪ a) Project Scope
▪ 1.Security
▪ - Double layer of data hiding
▪ - Message will be encrypted first using aes algorithm and then embedded into
video using lsb techniques.
▪ 2.Minimize Quality Loss
▪ - Quality loss of cover video will be analyzed by using PSNR and MSE
7
▪ b) User Scope
▪ 1. Sender
▪ - It will make frame extraction
▪ - Then ,sender can choose any file format of video
▪ - Encryption key will be selected.
▪ 2. Receiver
▪ - It will make frame extraction
▪ - It will use secret key for the hidden message decryption.
▪ - Besides that,receiver will enter decryption key to view the secret message
8
CHAPTER 2 :
LITERATURE
REVIEW
9
10
“ CHAPTER 3 :
METHODOLOGY
11
FRAMEWORK
12
ENCODING PSEUDOCODE
START
Display name of video after selecting by user
Display video frames by frames
Display total number of video frames
Display current number of video frames
Display name of text file which user already write down the message
Value needed for user input to process encryption
Display progress on encryption process
Display message which user input and cipher text after encryption
Display status of embedding process
END
13
ENCODING
FLOWCHART
14
START
Display stego video that user has chosen
Display video frames by frames
▪ END
Display total number of video frames
Display current number of video frames Display status of embedding process
Slot for user to input original text Display cipher text that have been extracted and the
original message
User input the key for message encryption
Encryption Process
15
DECODING PSEUDOCODES
START
Display name of stego video
Display stego video that user has chosen
Display total number of video frames
Display current number of video frames
Slot for user to input which frame that hides the message
Slot for user to input the process decryption
Display cipher text that have been extracted
END
16
DECODING
FLOWCHART
17
START
Display name of stego video
Display stego video that user has chosen
▪ END
Display total number of video frames
Display current number of video frames Display cipher text that have been extracted
Slot for user to input which frame that hides the Slot for user to input the process decryption
message
18
HARDWARE AND SOFTWARE
REQUIREMENT
 Laptop 6GB RAM
 Matlab R2017a
 Microsoft Word
 Wifi
19
AES ALGORITHM
20
THANKS!
▪ [1] Yi-Tu.Wu, F.Y. Shih, Genetic algorithm based methodology for breaking the steganalytic systems,
Systems, Man and Cybernetics, Part B: Cybernetics, IEEE Transactions on,36(1),Feb 2006,24-31.
▪ [2] M. Kharrazi, H.T. Cover Selection for Steganographic Embedding, Image Processing, IEEE International
Conference, Oct 2006, Atlanta, GA
▪ [3] Al- Ethawi G. A. Salman, "Text hiding in image border" Dean of the Military College of Engineering,
MsC. Thesis, 2002.
▪ [4] J. Ashok, Y. Raju, S. Munishankaralah and K. Srinnivas," Steganography : An Overview ", International
Journal of Engineering Science and Technology, Vol. No 2(10), pp: 5985-5992, 2010.
▪ [5] S. Katzenbeisser, F. A.P. Petitcolas, " Information hiding techniques for steganography and digital
watermarking ", pp: 20 - 23, June, 1999.
▪ [6] B.G.AAGARSANA, ANJALI, T.K.KIRTHIKA, Mr. S. SIVAKUMAR,(2018), IMAGE STEGANOGRAPHY
USING SECURED FORCE ALGORITHM FOR HIDING AUDIO SIGNAL INTO COLOUR IMAGE,
International Research Journal of Engineering and Technology (IRJET) , 5:1224-1228
▪ [7] Bharti Chandel, Dr.Shaily Jain, " Video Steganography: A Survey ",OSR Journal of Computer
Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 1, Ver. III (Jan – Feb.
2016)
21
REFERENCES

More Related Content

Similar to Fyp1 slide presentation 2.1

Robust video data hiding using forbidden data hiding
Robust video data hiding using forbidden data hidingRobust video data hiding using forbidden data hiding
Robust video data hiding using forbidden data hiding
nandhu_m08
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
ijiert bestjournal
 
Novel lightweight video encryption method based on ChaCha20 stream cipher an...
Novel lightweight video encryption method based on ChaCha20  stream cipher an...Novel lightweight video encryption method based on ChaCha20  stream cipher an...
Novel lightweight video encryption method based on ChaCha20 stream cipher an...
IJECEIAES
 

Similar to Fyp1 slide presentation 2.1 (20)

Ijmet 10 01_020
Ijmet 10 01_020Ijmet 10 01_020
Ijmet 10 01_020
 
Data Security Using Audio Steganography
Data Security Using Audio SteganographyData Security Using Audio Steganography
Data Security Using Audio Steganography
 
B018131117
B018131117B018131117
B018131117
 
Robust video data hiding using forbidden data hiding
Robust video data hiding using forbidden data hidingRobust video data hiding using forbidden data hiding
Robust video data hiding using forbidden data hiding
 
Understanding Image Steganography with Practical Approach
Understanding Image Steganography with Practical ApproachUnderstanding Image Steganography with Practical Approach
Understanding Image Steganography with Practical Approach
 
Data Security Using Steganography
Data Security Using Steganography Data Security Using Steganography
Data Security Using Steganography
 
Atm Security System Using Steganography Nss ptt by (rohit malav)
Atm Security System Using  Steganography Nss ptt by (rohit malav)Atm Security System Using  Steganography Nss ptt by (rohit malav)
Atm Security System Using Steganography Nss ptt by (rohit malav)
 
HACKING
HACKINGHACKING
HACKING
 
Secure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and SteganographySecure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and Steganography
 
H41034449
H41034449H41034449
H41034449
 
Audio Cryptography System
Audio Cryptography SystemAudio Cryptography System
Audio Cryptography System
 
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...
 
Audio Steganography java project
Audio Steganography java projectAudio Steganography java project
Audio Steganography java project
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
 
Novel lightweight video encryption method based on ChaCha20 stream cipher an...
Novel lightweight video encryption method based on ChaCha20  stream cipher an...Novel lightweight video encryption method based on ChaCha20  stream cipher an...
Novel lightweight video encryption method based on ChaCha20 stream cipher an...
 
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingReview On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image Slicing
 
A Study on Video Steganographic Techniques
A Study on Video Steganographic TechniquesA Study on Video Steganographic Techniques
A Study on Video Steganographic Techniques
 
Encryption of Text in Image Over a Network
Encryption of Text in Image Over a NetworkEncryption of Text in Image Over a Network
Encryption of Text in Image Over a Network
 
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET-  	  Hybrid Approach to Text & Image Steganography using AES and LSB Te...IRJET-  	  Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
 
Video steganography based on DCT psychovisual and object motion
Video steganography based on DCT psychovisual and object motionVideo steganography based on DCT psychovisual and object motion
Video steganography based on DCT psychovisual and object motion
 

Recently uploaded

527598851-ppc-due-to-various-govt-policies.pdf
527598851-ppc-due-to-various-govt-policies.pdf527598851-ppc-due-to-various-govt-policies.pdf
527598851-ppc-due-to-various-govt-policies.pdf
rajpreetkaur75080
 

Recently uploaded (15)

Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
 
The Canoga Gardens Development Project. PDF
The Canoga Gardens Development Project. PDFThe Canoga Gardens Development Project. PDF
The Canoga Gardens Development Project. PDF
 
Hi-Tech Industry 2024-25 Prospective.pptx
Hi-Tech Industry 2024-25 Prospective.pptxHi-Tech Industry 2024-25 Prospective.pptx
Hi-Tech Industry 2024-25 Prospective.pptx
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
 
Writing Sample 2 -Bridging the Divide: Enhancing Public Engagement in Urban D...
Writing Sample 2 -Bridging the Divide: Enhancing Public Engagement in Urban D...Writing Sample 2 -Bridging the Divide: Enhancing Public Engagement in Urban D...
Writing Sample 2 -Bridging the Divide: Enhancing Public Engagement in Urban D...
 
527598851-ppc-due-to-various-govt-policies.pdf
527598851-ppc-due-to-various-govt-policies.pdf527598851-ppc-due-to-various-govt-policies.pdf
527598851-ppc-due-to-various-govt-policies.pdf
 
Pollinator Ambassador Earth Steward Day Presentation 2024-05-22
Pollinator Ambassador Earth Steward Day Presentation 2024-05-22Pollinator Ambassador Earth Steward Day Presentation 2024-05-22
Pollinator Ambassador Earth Steward Day Presentation 2024-05-22
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
 
05232024 Joint Meeting - Community Networking
05232024 Joint Meeting - Community Networking05232024 Joint Meeting - Community Networking
05232024 Joint Meeting - Community Networking
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
 
Oracle Database Administration I (1Z0-082) Exam Dumps 2024.pdf
Oracle Database Administration I (1Z0-082) Exam Dumps 2024.pdfOracle Database Administration I (1Z0-082) Exam Dumps 2024.pdf
Oracle Database Administration I (1Z0-082) Exam Dumps 2024.pdf
 
123445566544333222333444dxcvbcvcvharsh.pptx
123445566544333222333444dxcvbcvcvharsh.pptx123445566544333222333444dxcvbcvcvharsh.pptx
123445566544333222333444dxcvbcvcvharsh.pptx
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
 

Fyp1 slide presentation 2.1

  • 1. Secure Video Transmission Using Steganography and Cryptography NAME :MAIZATUL AUNI BINTI MAZHAR COURSE : BACHELOR OF COMPUTER SCIENCE (NETWORK SECURITY) SUPERVISOR : DR ZARINA BINTI MOHAMAD
  • 4. 4
  • 5. PROBLEM STATEMENT  Development of large open network makes the security threats increased significantly.For example,modification of information masquerade and other threats.Therefore, steganography techniques has been apply to secure data during transmission.However,using only steganography method is no longer secured.Hence,cryptography technique must be combined together with steganography method to provide better security.  However ,for the cover media, video file is being used which generally a collection of images and sounds, so most of the presented techniques on images and audio can be applied to video files too . The great advantages of video are the large amount of data that can be hidden inside and the fact that it is a moving stream of images and sounds. 5
  • 6. 1.3 OBJECTIVE ▪ Objective to implement this approach: ▪ 1.To propose a combination of steganography and cryptography techniques to provide authentication and confidentiality of that secret data. ▪ 2.To design the proposed techniques to protect the secrecy of data. ▪ 3.To implement and test if quality of the cover media is loss after the encrypted message is hidden into it. 6
  • 7. 1.4 SCOPES OF PROJECT ▪ a) Project Scope ▪ 1.Security ▪ - Double layer of data hiding ▪ - Message will be encrypted first using aes algorithm and then embedded into video using lsb techniques. ▪ 2.Minimize Quality Loss ▪ - Quality loss of cover video will be analyzed by using PSNR and MSE 7
  • 8. ▪ b) User Scope ▪ 1. Sender ▪ - It will make frame extraction ▪ - Then ,sender can choose any file format of video ▪ - Encryption key will be selected. ▪ 2. Receiver ▪ - It will make frame extraction ▪ - It will use secret key for the hidden message decryption. ▪ - Besides that,receiver will enter decryption key to view the secret message 8
  • 10. 10
  • 11. “ CHAPTER 3 : METHODOLOGY 11
  • 13. ENCODING PSEUDOCODE START Display name of video after selecting by user Display video frames by frames Display total number of video frames Display current number of video frames Display name of text file which user already write down the message Value needed for user input to process encryption Display progress on encryption process Display message which user input and cipher text after encryption Display status of embedding process END 13
  • 15. START Display stego video that user has chosen Display video frames by frames ▪ END Display total number of video frames Display current number of video frames Display status of embedding process Slot for user to input original text Display cipher text that have been extracted and the original message User input the key for message encryption Encryption Process 15
  • 16. DECODING PSEUDOCODES START Display name of stego video Display stego video that user has chosen Display total number of video frames Display current number of video frames Slot for user to input which frame that hides the message Slot for user to input the process decryption Display cipher text that have been extracted END 16
  • 18. START Display name of stego video Display stego video that user has chosen ▪ END Display total number of video frames Display current number of video frames Display cipher text that have been extracted Slot for user to input which frame that hides the Slot for user to input the process decryption message 18
  • 19. HARDWARE AND SOFTWARE REQUIREMENT  Laptop 6GB RAM  Matlab R2017a  Microsoft Word  Wifi 19
  • 21. THANKS! ▪ [1] Yi-Tu.Wu, F.Y. Shih, Genetic algorithm based methodology for breaking the steganalytic systems, Systems, Man and Cybernetics, Part B: Cybernetics, IEEE Transactions on,36(1),Feb 2006,24-31. ▪ [2] M. Kharrazi, H.T. Cover Selection for Steganographic Embedding, Image Processing, IEEE International Conference, Oct 2006, Atlanta, GA ▪ [3] Al- Ethawi G. A. Salman, "Text hiding in image border" Dean of the Military College of Engineering, MsC. Thesis, 2002. ▪ [4] J. Ashok, Y. Raju, S. Munishankaralah and K. Srinnivas," Steganography : An Overview ", International Journal of Engineering Science and Technology, Vol. No 2(10), pp: 5985-5992, 2010. ▪ [5] S. Katzenbeisser, F. A.P. Petitcolas, " Information hiding techniques for steganography and digital watermarking ", pp: 20 - 23, June, 1999. ▪ [6] B.G.AAGARSANA, ANJALI, T.K.KIRTHIKA, Mr. S. SIVAKUMAR,(2018), IMAGE STEGANOGRAPHY USING SECURED FORCE ALGORITHM FOR HIDING AUDIO SIGNAL INTO COLOUR IMAGE, International Research Journal of Engineering and Technology (IRJET) , 5:1224-1228 ▪ [7] Bharti Chandel, Dr.Shaily Jain, " Video Steganography: A Survey ",OSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 1, Ver. III (Jan – Feb. 2016) 21 REFERENCES