Secure Video Transmission Using Steganography and
Cryptography
NAME :MAIZATUL AUNI BINTI MAZHAR
COURSE : BACHELOR OF COMPUTER SCIENCE
(NETWORK SECURITY)
SUPERVISOR : DR ZARINA BINTI MOHAMAD
CHAPTER 1
1.0 INTRODUCTION
1.1 BACKGROUND
3
4
PROBLEM STATEMENT
 Development of large open network makes the security threats increased significantly.For example,modification of
information masquerade and other threats.Therefore, steganography techniques has been apply to secure data during
transmission.However,using only steganography method is no longer secured.Hence,cryptography technique must be
combined together with steganography method to provide better security.
 However ,for the cover media, video file is being used which generally a collection of images and sounds, so most of
the presented techniques on images and audio can be applied to video files too . The great advantages of video are the
large amount of data that can be hidden inside and the fact that it is a moving stream of images and sounds.
5
1.3 OBJECTIVE
▪ Objective to implement this approach:
▪ 1.To propose a combination of steganography and
cryptography techniques to provide authentication
and confidentiality of that secret data.
▪ 2.To design the proposed techniques to protect the
secrecy of data.
▪ 3.To implement and test if quality of the cover
media is loss after the encrypted message is
hidden into it.
6
1.4 SCOPES OF PROJECT
▪ a) Project Scope
▪ 1.Security
▪ - Double layer of data hiding
▪ - Message will be encrypted first using aes algorithm and then embedded into
video using lsb techniques.
▪ 2.Minimize Quality Loss
▪ - Quality loss of cover video will be analyzed by using PSNR and MSE
7
▪ b) User Scope
▪ 1. Sender
▪ - It will make frame extraction
▪ - Then ,sender can choose any file format of video
▪ - Encryption key will be selected.
▪ 2. Receiver
▪ - It will make frame extraction
▪ - It will use secret key for the hidden message decryption.
▪ - Besides that,receiver will enter decryption key to view the secret message
8
CHAPTER 2 :
LITERATURE
REVIEW
9
10
“ CHAPTER 3 :
METHODOLOGY
11
FRAMEWORK
12
ENCODING PSEUDOCODE
START
Display name of video after selecting by user
Display video frames by frames
Display total number of video frames
Display current number of video frames
Display name of text file which user already write down the message
Value needed for user input to process encryption
Display progress on encryption process
Display message which user input and cipher text after encryption
Display status of embedding process
END
13
ENCODING
FLOWCHART
14
START
Display stego video that user has chosen
Display video frames by frames
▪ END
Display total number of video frames
Display current number of video frames Display status of embedding process
Slot for user to input original text Display cipher text that have been extracted and the
original message
User input the key for message encryption
Encryption Process
15
DECODING PSEUDOCODES
START
Display name of stego video
Display stego video that user has chosen
Display total number of video frames
Display current number of video frames
Slot for user to input which frame that hides the message
Slot for user to input the process decryption
Display cipher text that have been extracted
END
16
DECODING
FLOWCHART
17
START
Display name of stego video
Display stego video that user has chosen
▪ END
Display total number of video frames
Display current number of video frames Display cipher text that have been extracted
Slot for user to input which frame that hides the Slot for user to input the process decryption
message
18
HARDWARE AND SOFTWARE
REQUIREMENT
 Laptop 6GB RAM
 Matlab R2017a
 Microsoft Word
 Wifi
19
AES ALGORITHM
20
THANKS!
▪ [1] Yi-Tu.Wu, F.Y. Shih, Genetic algorithm based methodology for breaking the steganalytic systems,
Systems, Man and Cybernetics, Part B: Cybernetics, IEEE Transactions on,36(1),Feb 2006,24-31.
▪ [2] M. Kharrazi, H.T. Cover Selection for Steganographic Embedding, Image Processing, IEEE International
Conference, Oct 2006, Atlanta, GA
▪ [3] Al- Ethawi G. A. Salman, "Text hiding in image border" Dean of the Military College of Engineering,
MsC. Thesis, 2002.
▪ [4] J. Ashok, Y. Raju, S. Munishankaralah and K. Srinnivas," Steganography : An Overview ", International
Journal of Engineering Science and Technology, Vol. No 2(10), pp: 5985-5992, 2010.
▪ [5] S. Katzenbeisser, F. A.P. Petitcolas, " Information hiding techniques for steganography and digital
watermarking ", pp: 20 - 23, June, 1999.
▪ [6] B.G.AAGARSANA, ANJALI, T.K.KIRTHIKA, Mr. S. SIVAKUMAR,(2018), IMAGE STEGANOGRAPHY
USING SECURED FORCE ALGORITHM FOR HIDING AUDIO SIGNAL INTO COLOUR IMAGE,
International Research Journal of Engineering and Technology (IRJET) , 5:1224-1228
▪ [7] Bharti Chandel, Dr.Shaily Jain, " Video Steganography: A Survey ",OSR Journal of Computer
Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 1, Ver. III (Jan – Feb.
2016)
21
REFERENCES

Fyp1 slide presentation 2.1

  • 1.
    Secure Video TransmissionUsing Steganography and Cryptography NAME :MAIZATUL AUNI BINTI MAZHAR COURSE : BACHELOR OF COMPUTER SCIENCE (NETWORK SECURITY) SUPERVISOR : DR ZARINA BINTI MOHAMAD
  • 2.
  • 3.
  • 4.
  • 5.
    PROBLEM STATEMENT  Developmentof large open network makes the security threats increased significantly.For example,modification of information masquerade and other threats.Therefore, steganography techniques has been apply to secure data during transmission.However,using only steganography method is no longer secured.Hence,cryptography technique must be combined together with steganography method to provide better security.  However ,for the cover media, video file is being used which generally a collection of images and sounds, so most of the presented techniques on images and audio can be applied to video files too . The great advantages of video are the large amount of data that can be hidden inside and the fact that it is a moving stream of images and sounds. 5
  • 6.
    1.3 OBJECTIVE ▪ Objectiveto implement this approach: ▪ 1.To propose a combination of steganography and cryptography techniques to provide authentication and confidentiality of that secret data. ▪ 2.To design the proposed techniques to protect the secrecy of data. ▪ 3.To implement and test if quality of the cover media is loss after the encrypted message is hidden into it. 6
  • 7.
    1.4 SCOPES OFPROJECT ▪ a) Project Scope ▪ 1.Security ▪ - Double layer of data hiding ▪ - Message will be encrypted first using aes algorithm and then embedded into video using lsb techniques. ▪ 2.Minimize Quality Loss ▪ - Quality loss of cover video will be analyzed by using PSNR and MSE 7
  • 8.
    ▪ b) UserScope ▪ 1. Sender ▪ - It will make frame extraction ▪ - Then ,sender can choose any file format of video ▪ - Encryption key will be selected. ▪ 2. Receiver ▪ - It will make frame extraction ▪ - It will use secret key for the hidden message decryption. ▪ - Besides that,receiver will enter decryption key to view the secret message 8
  • 9.
  • 10.
  • 11.
    “ CHAPTER 3: METHODOLOGY 11
  • 12.
  • 13.
    ENCODING PSEUDOCODE START Display nameof video after selecting by user Display video frames by frames Display total number of video frames Display current number of video frames Display name of text file which user already write down the message Value needed for user input to process encryption Display progress on encryption process Display message which user input and cipher text after encryption Display status of embedding process END 13
  • 14.
  • 15.
    START Display stego videothat user has chosen Display video frames by frames ▪ END Display total number of video frames Display current number of video frames Display status of embedding process Slot for user to input original text Display cipher text that have been extracted and the original message User input the key for message encryption Encryption Process 15
  • 16.
    DECODING PSEUDOCODES START Display nameof stego video Display stego video that user has chosen Display total number of video frames Display current number of video frames Slot for user to input which frame that hides the message Slot for user to input the process decryption Display cipher text that have been extracted END 16
  • 17.
  • 18.
    START Display name ofstego video Display stego video that user has chosen ▪ END Display total number of video frames Display current number of video frames Display cipher text that have been extracted Slot for user to input which frame that hides the Slot for user to input the process decryption message 18
  • 19.
    HARDWARE AND SOFTWARE REQUIREMENT Laptop 6GB RAM  Matlab R2017a  Microsoft Word  Wifi 19
  • 20.
  • 21.
    THANKS! ▪ [1] Yi-Tu.Wu,F.Y. Shih, Genetic algorithm based methodology for breaking the steganalytic systems, Systems, Man and Cybernetics, Part B: Cybernetics, IEEE Transactions on,36(1),Feb 2006,24-31. ▪ [2] M. Kharrazi, H.T. Cover Selection for Steganographic Embedding, Image Processing, IEEE International Conference, Oct 2006, Atlanta, GA ▪ [3] Al- Ethawi G. A. Salman, "Text hiding in image border" Dean of the Military College of Engineering, MsC. Thesis, 2002. ▪ [4] J. Ashok, Y. Raju, S. Munishankaralah and K. Srinnivas," Steganography : An Overview ", International Journal of Engineering Science and Technology, Vol. No 2(10), pp: 5985-5992, 2010. ▪ [5] S. Katzenbeisser, F. A.P. Petitcolas, " Information hiding techniques for steganography and digital watermarking ", pp: 20 - 23, June, 1999. ▪ [6] B.G.AAGARSANA, ANJALI, T.K.KIRTHIKA, Mr. S. SIVAKUMAR,(2018), IMAGE STEGANOGRAPHY USING SECURED FORCE ALGORITHM FOR HIDING AUDIO SIGNAL INTO COLOUR IMAGE, International Research Journal of Engineering and Technology (IRJET) , 5:1224-1228 ▪ [7] Bharti Chandel, Dr.Shaily Jain, " Video Steganography: A Survey ",OSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 1, Ver. III (Jan – Feb. 2016) 21 REFERENCES