SlideShare a Scribd company logo
1 of 3
Download to read offline
P K Reddy. M et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1123-1125

RESEARCH ARTICLE

www.ijera.com

OPEN ACCESS

A Novel Algorithmic Approach for Information Hiding In a
Video with Low Video Distortion
Praveen Kumar Reddy. M, D. Adithya Chandra Varma, Prof. Varunkumar.M
School of Computing Science Engineering, VIT University, Vellore - 632014, Tamil Nadu, India.
School of Information Technology & Engineering, VIT University, Vellore-632014, Tamil Nadu, India.

Abstract
Data hiding in compressed video is the recent way of providing security. The main objective of data hiding in
video is to transmit the message with security (by encryption) in streaming video. This paper presents a
technique to hide secret data in the motion vectors of a compressed video which is not vulnerable to Stag
analysis and also to maintain the quality and size of the reconstructed video. In this technique the secret message
bit stream is embedded in the least significant bit of both components of the candidate motion vector. Also this
paper uses a standard encryption mechanism (AES) in order to improve more security for the message. The
proposed technique is found to have lower distortion to the quality of the video. “
Keywords: Data hiding, Motion vectors, steganography.

I.

Introduction

“Data hiding and watermarking in digital
images and raw video have wide scope in security
related issues. The related work presents that most
work applied on data hiding in motion vectors relies
on changing the motion vectors based on their
attributes such as their magnitude, phase angle, etc [1].
In the data bits method the message are hidden in
some of the motion vectors whose magnitude is above
a predefined threshold, and are called candidate
motion vectors (CMVs) [2]. A single bit is hidden in
the least significant bit of the larger component of
each CMV. The limitation of this approach is, the data
is encoded as a region where the motion estimation is
only allowed to generate motion vectors in that
specified region. This paper is formatted as follows. In
section 2, the related work of the paper is discussed. In
section 3, the architecture of the proposed approach is
discussed. Finally in section 4 conclusions of the
proposed technique and future work are discussed.

II.

Literature Survey

D.-Y. Fang et al. [3] and X. He et al. [4]
proposed a technique to embed the data in video by
using the phase angle between two consecutive CMV.
These CMV are selected based on the magnitude of
the motion vectors as in [2]. The message bit streams
are encoded as phase angle difference in sectors
between CMV. The block matching is constrained to
search within the selected sector for a magnitude to be
larger than the predefined threshold. J. Zhang et al.
[2] and X. He et al. [4] proposed a technique that
mainly focused on finding a direct reversible way to
identify the CMV at the decoder and thus relied on the
attributes of the motion vectors. The problems
associated with this data hiding approach are increase
in data size and drop in reconstruction quality.
www.ijera.com

In this paper, we take a different approach directed
towards achieving a minimum distortion to the quality
and the data size overhead. This approach is based on
the quantization algorithm for providing security by
encryption and decryption.”
III.
Proposed Approach Architecture
Thus we are proposing Advanced Encryption
Standard (AES) encryption and decryption for
security. AES is a specification for the encryption of
electronic data. The algorithm described by AES is a
symmetric-key algorithm, meaning the same key is
used for both encrypting and decrypting the data. A
greedy adaptive threshold is searched for every frame
to achieve robustness while maintaining a low
prediction error level.
Our data-hiding algorithm is applied at the
encoder side, uses the regular pair produced, tampers
to become, and thus replaces them by the pair for each
P and B-frame in the GOP as in Algorithm 1. The
secret message is organized as a bit stream: message
length. A subset of is selected to be the CMV. The
selection of (line 6 of Algorithm 1) is performed if
their associated macro block prediction error
measured in PSNR is below an initial threshold value.
The least significant bit (LSB) of both components,
are replaced by bits of the message after data
embedding.

1123 | P a g e
P K Reddy. M et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1123-1125

www.ijera.com

3.3 Phase 3- Data Extraction
The data extractor operates to extract the
hidden message as a special decoder and our proposal
is straightforward. After data extraction from the
consecutive GOPs the hidden message is
reconstructed back by concatenation of the extracted
bit stream.

Fig 3.1 Data Hiding and Data Extraction in
Compressed video using Quantization Algorithm
In this approach, the motion vectors are used
to encode and reconstruct both the forward predictive
(P)-frame and bidirectional (B)-frames in compressed
video. The proposed approach is divided into 3
phases.
3.1 Phase 1- Conversion of video into frames
In phase-1 the video input is given to the
system initially for data hiding and then the input
video is converted into the frames. In this phase the
frames are only converted and it doesn’t any features
of the video.

Fig 3.2 Input and output of phase 1
3.2 phase 2- Data Hiding in Group of Pictures
Data hiding in motion vectors at the encoder
replaces the regular pair, due to tampering the motion
vectors, where the superscript denotes hiding. We
define data hiding in motion vectors of compressed
video in the context of super-channel; the secret
message is hidden in the host video signal to produce
the composite signal. The composite signal is subject
to video lossy compression to become. The message
should survive the video lossy compression and can be
identically extracted. This robustness constraint
should have low distortion effect on the reconstructed
video as well as low effect on the data size (bit rate).
Here we use two metrics to evaluate data-hiding
algorithms in compressed video which are:
1) Increase in data size
2) Drop in the reconstruction quality
The proposed data-hiding algorithm is applied at the
encoder side, uses the regular pair produced, tampers
to become, and thus replaces them by the pair for each
P and B-frame in the GOP as in Algorithm 1.

Fig 3.3 Input and Output of Phase 2

www.ijera.com

Fig 3.4 Input and Output of Phase 3
3.4 Calculation of Motion Vector
If the reconstructed prediction error
maintains the same criterion, then identify the data
extractor for the given value. If any macro block
associated with fails to maintain the criterion (line 5 of
Algorithm 2), then will not be identified by the data
extract or and the message will not be extracted
correctly. Hence, we propose to use an adaptive
threshold by iteratively decrementing by 1 decibel
(dB) for this frame until either the criterion is satisfied
for all macro blocks or the stopping value is reached
for which we embed no data in this frame (line 19 in
Algorithm 1). Since the threshold used for each frame
is different, we hide their eight values for that GOP in
the I-frame using any robust image data-hiding
technique or sending them on a separate channel based
on the application.
Algorithm 1
Input: ,
,
Output: Key found,
Compress
using JPEG compression to
produce
Decompress
to obtain lossy
Set key found =true
While key found &(i,j)
do
If
then
key found =false
decrement
end
end
Algorithm 2
input:GOP(
,
),K
Output: message bit stream m
Extract the threshold
for all frames in GOP form
I-frame or use them for other channel
For each frame P and B do
Decompress
to obtain
and identify the
Candidate motion vectors:
:
For each (i,j)
,do)
Extract two message bits m(k)=LSB
1124 | P a g e
P K Reddy. M et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1123-1125
m(k+1)=LSB(
)
K=k+2
If B-frame then
Extract from backward compensation
Motion vectors 2message bits m(k)=
m(K+1=
k=k+2
end
end
end.

IV.

Experimental Analyses

The experimental analysis describes the
implementation of proposed approach and its
comparison with existing approach. The proposed
approach is implemented using Mat lab software.
Video Size In PSNR ratio in PSNR ratio in
MB
Existing
Proposed
System(in dbs)
System(in dbs)
3MB

0.4
0.61

0.42

10MB

0.93

selection on attributes of the motion vectors, we chose
a different approach that selects those motion vectors
whose associated macro blocks prediction error is high
(low PSNR) to be the candidates for hiding a bit in
each of their horizontal and vertical components for
achieving low distortion in quality and size. A greedy
adaptive threshold is searched for every frame to
achieve robustness while maintaining a low prediction
error level. The secret message bit stream is embedded
in the least significant bit of both components of the
candidate motion vectors. The method is implemented
and tested for hiding data in natural sequences of
multiple groups of pictures and the results are
evaluated. In future work we can use any other
encryption standards for more security else define any
Steganography techniques.”

References
[1]

0.27

6MB

0.65

[2]

[3]
Table1: Comparison of PSNR ratio between
existing system and Proposed System
Clearly from table 1 the PSNR (Peak Signal To Noise
Ratio) from existing system Approach to the proposed
system decreased.

[4]

PSNR value

1

[5]

0.9
0.8
0.7

[6]

0.6
0.5

proposed

0.4

existing

www.ijera.com

F. A. P. Petitcolas, R. J. Anderson, and M. G.
Kuhn, “Information hiding—A survey,”
Proc. IEEE, vol. 87, no. 7, pp. 1062–1078,
Jul.2004.
J. Zhang, J. Li, and L. Zhang, “Video
watermark technique in motion vector,” in
Proc. XIV Symp. Computer Graphics and
Image Processing, Oct. 2001, pp. 179–182.
D.-Y. Fang and L.-W. Chang, “Data hiding
for digital video with phase of motion
vector,” in Proc. Int. Symp. Circuits and
Systems (ISCAS), 2006, pp. 1422–1425.
X. He and Z. Luo, “A novel steganographic
algorithm based on the motion vector phase,”
in Proc. Int. Conf. Comp. Sc. and Software
Eng., 2008, pp. 822–825.
S. K. Kapotas, E. E. Varsaki, and A. N.
Skodras, “Data hiding in H.264 encoded
video sequences,” in IEEE 9th Workshop on
Multimedia Signal Processing (MMSP07),
Oct. 2007, pp. 373–376.
B. Chen and G. W. Wornell, “Quantization
index modulation for digitalwatermarking
and information embedding of multimedia,”
J. VLSI Signal Process., vol. 27, pp. 7–33,
2001.

0.3
0.2
0.1

x axis

0
3MB

6MB

10MB

video size in MB

Figure 4.1 Comparison of PSNR ratio with varied
size of video with existing and proposed system.

V.

Conclusion and Future Work

The Quantization algorithm is a symmetrickey algorithm, which uses the same key for both
encrypting and decrypting the data. Unlike most datahiding methods in the motion vectors that rely their
www.ijera.com

1125 | P a g e

More Related Content

What's hot

Deep Learning for Natural Language Processing
Deep Learning for Natural Language ProcessingDeep Learning for Natural Language Processing
Deep Learning for Natural Language ProcessingIRJET Journal
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Stegnography of high embedding efficiency by using an extended matrix encodin...
Stegnography of high embedding efficiency by using an extended matrix encodin...Stegnography of high embedding efficiency by using an extended matrix encodin...
Stegnography of high embedding efficiency by using an extended matrix encodin...eSAT Publishing House
 
S.A.kalaiselvan- robust video data hiding at forbidden zone
S.A.kalaiselvan- robust video data hiding at forbidden zoneS.A.kalaiselvan- robust video data hiding at forbidden zone
S.A.kalaiselvan- robust video data hiding at forbidden zonekalaiselvanresearch
 
A NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYS
A NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYSA NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYS
A NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYSEditor IJMTER
 
IRJET- Data Embedding using Image Steganography
IRJET-  	  Data Embedding using Image SteganographyIRJET-  	  Data Embedding using Image Steganography
IRJET- Data Embedding using Image SteganographyIRJET Journal
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
Improved block based segmentation for jpeg compressed document images
Improved block based segmentation for jpeg compressed document imagesImproved block based segmentation for jpeg compressed document images
Improved block based segmentation for jpeg compressed document imageseSAT Journals
 
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET Journal
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
A Novel Technique for Image Steganography Based on DWT and Huffman Encoding
A Novel Technique for Image Steganography Based on DWT and Huffman EncodingA Novel Technique for Image Steganography Based on DWT and Huffman Encoding
A Novel Technique for Image Steganography Based on DWT and Huffman EncodingCSCJournals
 
Hiding text in speech signal using K-means, LSB techniques and chaotic maps
Hiding text in speech signal using K-means, LSB techniques and chaotic maps Hiding text in speech signal using K-means, LSB techniques and chaotic maps
Hiding text in speech signal using K-means, LSB techniques and chaotic maps IJECEIAES
 
Hidden Layer Leraning Vector Quantizatio
Hidden Layer Leraning Vector Quantizatio Hidden Layer Leraning Vector Quantizatio
Hidden Layer Leraning Vector Quantizatio Armando Vieira
 

What's hot (19)

Deep Learning for Natural Language Processing
Deep Learning for Natural Language ProcessingDeep Learning for Natural Language Processing
Deep Learning for Natural Language Processing
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
I017425763
I017425763I017425763
I017425763
 
C010231217
C010231217C010231217
C010231217
 
Stegnography of high embedding efficiency by using an extended matrix encodin...
Stegnography of high embedding efficiency by using an extended matrix encodin...Stegnography of high embedding efficiency by using an extended matrix encodin...
Stegnography of high embedding efficiency by using an extended matrix encodin...
 
S.A.kalaiselvan- robust video data hiding at forbidden zone
S.A.kalaiselvan- robust video data hiding at forbidden zoneS.A.kalaiselvan- robust video data hiding at forbidden zone
S.A.kalaiselvan- robust video data hiding at forbidden zone
 
A NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYS
A NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYSA NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYS
A NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYS
 
IRJET- Data Embedding using Image Steganography
IRJET-  	  Data Embedding using Image SteganographyIRJET-  	  Data Embedding using Image Steganography
IRJET- Data Embedding using Image Steganography
 
B280916
B280916B280916
B280916
 
CR_CSI_119
CR_CSI_119CR_CSI_119
CR_CSI_119
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Improved block based segmentation for jpeg compressed document images
Improved block based segmentation for jpeg compressed document imagesImproved block based segmentation for jpeg compressed document images
Improved block based segmentation for jpeg compressed document images
 
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
A Novel Technique for Image Steganography Based on DWT and Huffman Encoding
A Novel Technique for Image Steganography Based on DWT and Huffman EncodingA Novel Technique for Image Steganography Based on DWT and Huffman Encoding
A Novel Technique for Image Steganography Based on DWT and Huffman Encoding
 
Ja2415771582
Ja2415771582Ja2415771582
Ja2415771582
 
Hiding text in speech signal using K-means, LSB techniques and chaotic maps
Hiding text in speech signal using K-means, LSB techniques and chaotic maps Hiding text in speech signal using K-means, LSB techniques and chaotic maps
Hiding text in speech signal using K-means, LSB techniques and chaotic maps
 
Hidden Layer Leraning Vector Quantizatio
Hidden Layer Leraning Vector Quantizatio Hidden Layer Leraning Vector Quantizatio
Hidden Layer Leraning Vector Quantizatio
 

Viewers also liked (20)

Fx3610771081
Fx3610771081Fx3610771081
Fx3610771081
 
Gd3611171122
Gd3611171122Gd3611171122
Gd3611171122
 
Fq3610331039
Fq3610331039Fq3610331039
Fq3610331039
 
Gh3611391145
Gh3611391145Gh3611391145
Gh3611391145
 
Fs3610481053
Fs3610481053Fs3610481053
Fs3610481053
 
Gg3611321138
Gg3611321138Gg3611321138
Gg3611321138
 
Ft3610541057
Ft3610541057Ft3610541057
Ft3610541057
 
Gc3611111116
Gc3611111116Gc3611111116
Gc3611111116
 
Gf3611261131
Gf3611261131Gf3611261131
Gf3611261131
 
Ga3610941103
Ga3610941103Ga3610941103
Ga3610941103
 
Fy3610821086
Fy3610821086Fy3610821086
Fy3610821086
 
Fp3610261032
Fp3610261032Fp3610261032
Fp3610261032
 
Fu3610581067
Fu3610581067Fu3610581067
Fu3610581067
 
Gb3611041110
Gb3611041110Gb3611041110
Gb3611041110
 
Fv3610681072
Fv3610681072Fv3610681072
Fv3610681072
 
Fw3610731076
Fw3610731076Fw3610731076
Fw3610731076
 
Fr3610401047
Fr3610401047Fr3610401047
Fr3610401047
 
Fz3610871093
Fz3610871093Fz3610871093
Fz3610871093
 
E learning
E learningE learning
E learning
 
Effect of Techniques in Preparing VCO Nanoparticles
Effect of Techniques in Preparing VCO NanoparticlesEffect of Techniques in Preparing VCO Nanoparticles
Effect of Techniques in Preparing VCO Nanoparticles
 

Similar to Low Distortion Video Steganography Using Motion Vectors

Lossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting TechniqueLossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting TechniqueIRJET Journal
 
Robust video data hiding using forbidden zone
Robust video data hiding using forbidden zoneRobust video data hiding using forbidden zone
Robust video data hiding using forbidden zoneMadonna Ranjini
 
Secured Data Transmission Using Video Steganographic Scheme
Secured Data Transmission Using Video Steganographic SchemeSecured Data Transmission Using Video Steganographic Scheme
Secured Data Transmission Using Video Steganographic SchemeIJERA Editor
 
IRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET- An Overview of Hiding Information in H.264/Avc Compressed VideoIRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET- An Overview of Hiding Information in H.264/Avc Compressed VideoIRJET Journal
 
A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication cscpconf
 
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Editor IJMTER
 
IJSRED-V2I2P12
IJSRED-V2I2P12IJSRED-V2I2P12
IJSRED-V2I2P12IJSRED
 
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET Journal
 
Compression technique using dct fractal compression
Compression technique using dct fractal compressionCompression technique using dct fractal compression
Compression technique using dct fractal compressionAlexander Decker
 
11.compression technique using dct fractal compression
11.compression technique using dct fractal compression11.compression technique using dct fractal compression
11.compression technique using dct fractal compressionAlexander Decker
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganographysipij
 
Protection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based SystemProtection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based SystemIRJET Journal
 
Information hiding in edge location of video using amalgamate fft and cubic s...
Information hiding in edge location of video using amalgamate fft and cubic s...Information hiding in edge location of video using amalgamate fft and cubic s...
Information hiding in edge location of video using amalgamate fft and cubic s...IAEME Publication
 
IJREAMV03I022640.pdf
IJREAMV03I022640.pdfIJREAMV03I022640.pdf
IJREAMV03I022640.pdfssusere02009
 
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUESADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUESIRJET Journal
 
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHM
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHMPIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHM
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHMijcsit
 

Similar to Low Distortion Video Steganography Using Motion Vectors (20)

Lossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting TechniqueLossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
 
Gg3311121115
Gg3311121115Gg3311121115
Gg3311121115
 
Robust video data hiding using forbidden zone
Robust video data hiding using forbidden zoneRobust video data hiding using forbidden zone
Robust video data hiding using forbidden zone
 
Secured Data Transmission Using Video Steganographic Scheme
Secured Data Transmission Using Video Steganographic SchemeSecured Data Transmission Using Video Steganographic Scheme
Secured Data Transmission Using Video Steganographic Scheme
 
IRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET- An Overview of Hiding Information in H.264/Avc Compressed VideoIRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
 
A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication
 
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
 
IJSRED-V2I2P12
IJSRED-V2I2P12IJSRED-V2I2P12
IJSRED-V2I2P12
 
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data Security
 
Compression technique using dct fractal compression
Compression technique using dct fractal compressionCompression technique using dct fractal compression
Compression technique using dct fractal compression
 
11.compression technique using dct fractal compression
11.compression technique using dct fractal compression11.compression technique using dct fractal compression
11.compression technique using dct fractal compression
 
C010511420
C010511420C010511420
C010511420
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
 
Ijetcas14 527
Ijetcas14 527Ijetcas14 527
Ijetcas14 527
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
Protection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based SystemProtection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based System
 
Information hiding in edge location of video using amalgamate fft and cubic s...
Information hiding in edge location of video using amalgamate fft and cubic s...Information hiding in edge location of video using amalgamate fft and cubic s...
Information hiding in edge location of video using amalgamate fft and cubic s...
 
IJREAMV03I022640.pdf
IJREAMV03I022640.pdfIJREAMV03I022640.pdf
IJREAMV03I022640.pdf
 
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUESADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
 
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHM
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHMPIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHM
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHM
 

Recently uploaded

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 

Low Distortion Video Steganography Using Motion Vectors

  • 1. P K Reddy. M et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1123-1125 RESEARCH ARTICLE www.ijera.com OPEN ACCESS A Novel Algorithmic Approach for Information Hiding In a Video with Low Video Distortion Praveen Kumar Reddy. M, D. Adithya Chandra Varma, Prof. Varunkumar.M School of Computing Science Engineering, VIT University, Vellore - 632014, Tamil Nadu, India. School of Information Technology & Engineering, VIT University, Vellore-632014, Tamil Nadu, India. Abstract Data hiding in compressed video is the recent way of providing security. The main objective of data hiding in video is to transmit the message with security (by encryption) in streaming video. This paper presents a technique to hide secret data in the motion vectors of a compressed video which is not vulnerable to Stag analysis and also to maintain the quality and size of the reconstructed video. In this technique the secret message bit stream is embedded in the least significant bit of both components of the candidate motion vector. Also this paper uses a standard encryption mechanism (AES) in order to improve more security for the message. The proposed technique is found to have lower distortion to the quality of the video. “ Keywords: Data hiding, Motion vectors, steganography. I. Introduction “Data hiding and watermarking in digital images and raw video have wide scope in security related issues. The related work presents that most work applied on data hiding in motion vectors relies on changing the motion vectors based on their attributes such as their magnitude, phase angle, etc [1]. In the data bits method the message are hidden in some of the motion vectors whose magnitude is above a predefined threshold, and are called candidate motion vectors (CMVs) [2]. A single bit is hidden in the least significant bit of the larger component of each CMV. The limitation of this approach is, the data is encoded as a region where the motion estimation is only allowed to generate motion vectors in that specified region. This paper is formatted as follows. In section 2, the related work of the paper is discussed. In section 3, the architecture of the proposed approach is discussed. Finally in section 4 conclusions of the proposed technique and future work are discussed. II. Literature Survey D.-Y. Fang et al. [3] and X. He et al. [4] proposed a technique to embed the data in video by using the phase angle between two consecutive CMV. These CMV are selected based on the magnitude of the motion vectors as in [2]. The message bit streams are encoded as phase angle difference in sectors between CMV. The block matching is constrained to search within the selected sector for a magnitude to be larger than the predefined threshold. J. Zhang et al. [2] and X. He et al. [4] proposed a technique that mainly focused on finding a direct reversible way to identify the CMV at the decoder and thus relied on the attributes of the motion vectors. The problems associated with this data hiding approach are increase in data size and drop in reconstruction quality. www.ijera.com In this paper, we take a different approach directed towards achieving a minimum distortion to the quality and the data size overhead. This approach is based on the quantization algorithm for providing security by encryption and decryption.” III. Proposed Approach Architecture Thus we are proposing Advanced Encryption Standard (AES) encryption and decryption for security. AES is a specification for the encryption of electronic data. The algorithm described by AES is a symmetric-key algorithm, meaning the same key is used for both encrypting and decrypting the data. A greedy adaptive threshold is searched for every frame to achieve robustness while maintaining a low prediction error level. Our data-hiding algorithm is applied at the encoder side, uses the regular pair produced, tampers to become, and thus replaces them by the pair for each P and B-frame in the GOP as in Algorithm 1. The secret message is organized as a bit stream: message length. A subset of is selected to be the CMV. The selection of (line 6 of Algorithm 1) is performed if their associated macro block prediction error measured in PSNR is below an initial threshold value. The least significant bit (LSB) of both components, are replaced by bits of the message after data embedding. 1123 | P a g e
  • 2. P K Reddy. M et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1123-1125 www.ijera.com 3.3 Phase 3- Data Extraction The data extractor operates to extract the hidden message as a special decoder and our proposal is straightforward. After data extraction from the consecutive GOPs the hidden message is reconstructed back by concatenation of the extracted bit stream. Fig 3.1 Data Hiding and Data Extraction in Compressed video using Quantization Algorithm In this approach, the motion vectors are used to encode and reconstruct both the forward predictive (P)-frame and bidirectional (B)-frames in compressed video. The proposed approach is divided into 3 phases. 3.1 Phase 1- Conversion of video into frames In phase-1 the video input is given to the system initially for data hiding and then the input video is converted into the frames. In this phase the frames are only converted and it doesn’t any features of the video. Fig 3.2 Input and output of phase 1 3.2 phase 2- Data Hiding in Group of Pictures Data hiding in motion vectors at the encoder replaces the regular pair, due to tampering the motion vectors, where the superscript denotes hiding. We define data hiding in motion vectors of compressed video in the context of super-channel; the secret message is hidden in the host video signal to produce the composite signal. The composite signal is subject to video lossy compression to become. The message should survive the video lossy compression and can be identically extracted. This robustness constraint should have low distortion effect on the reconstructed video as well as low effect on the data size (bit rate). Here we use two metrics to evaluate data-hiding algorithms in compressed video which are: 1) Increase in data size 2) Drop in the reconstruction quality The proposed data-hiding algorithm is applied at the encoder side, uses the regular pair produced, tampers to become, and thus replaces them by the pair for each P and B-frame in the GOP as in Algorithm 1. Fig 3.3 Input and Output of Phase 2 www.ijera.com Fig 3.4 Input and Output of Phase 3 3.4 Calculation of Motion Vector If the reconstructed prediction error maintains the same criterion, then identify the data extractor for the given value. If any macro block associated with fails to maintain the criterion (line 5 of Algorithm 2), then will not be identified by the data extract or and the message will not be extracted correctly. Hence, we propose to use an adaptive threshold by iteratively decrementing by 1 decibel (dB) for this frame until either the criterion is satisfied for all macro blocks or the stopping value is reached for which we embed no data in this frame (line 19 in Algorithm 1). Since the threshold used for each frame is different, we hide their eight values for that GOP in the I-frame using any robust image data-hiding technique or sending them on a separate channel based on the application. Algorithm 1 Input: , , Output: Key found, Compress using JPEG compression to produce Decompress to obtain lossy Set key found =true While key found &(i,j) do If then key found =false decrement end end Algorithm 2 input:GOP( , ),K Output: message bit stream m Extract the threshold for all frames in GOP form I-frame or use them for other channel For each frame P and B do Decompress to obtain and identify the Candidate motion vectors: : For each (i,j) ,do) Extract two message bits m(k)=LSB 1124 | P a g e
  • 3. P K Reddy. M et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1123-1125 m(k+1)=LSB( ) K=k+2 If B-frame then Extract from backward compensation Motion vectors 2message bits m(k)= m(K+1= k=k+2 end end end. IV. Experimental Analyses The experimental analysis describes the implementation of proposed approach and its comparison with existing approach. The proposed approach is implemented using Mat lab software. Video Size In PSNR ratio in PSNR ratio in MB Existing Proposed System(in dbs) System(in dbs) 3MB 0.4 0.61 0.42 10MB 0.93 selection on attributes of the motion vectors, we chose a different approach that selects those motion vectors whose associated macro blocks prediction error is high (low PSNR) to be the candidates for hiding a bit in each of their horizontal and vertical components for achieving low distortion in quality and size. A greedy adaptive threshold is searched for every frame to achieve robustness while maintaining a low prediction error level. The secret message bit stream is embedded in the least significant bit of both components of the candidate motion vectors. The method is implemented and tested for hiding data in natural sequences of multiple groups of pictures and the results are evaluated. In future work we can use any other encryption standards for more security else define any Steganography techniques.” References [1] 0.27 6MB 0.65 [2] [3] Table1: Comparison of PSNR ratio between existing system and Proposed System Clearly from table 1 the PSNR (Peak Signal To Noise Ratio) from existing system Approach to the proposed system decreased. [4] PSNR value 1 [5] 0.9 0.8 0.7 [6] 0.6 0.5 proposed 0.4 existing www.ijera.com F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding—A survey,” Proc. IEEE, vol. 87, no. 7, pp. 1062–1078, Jul.2004. J. Zhang, J. Li, and L. Zhang, “Video watermark technique in motion vector,” in Proc. XIV Symp. Computer Graphics and Image Processing, Oct. 2001, pp. 179–182. D.-Y. Fang and L.-W. Chang, “Data hiding for digital video with phase of motion vector,” in Proc. Int. Symp. Circuits and Systems (ISCAS), 2006, pp. 1422–1425. X. He and Z. Luo, “A novel steganographic algorithm based on the motion vector phase,” in Proc. Int. Conf. Comp. Sc. and Software Eng., 2008, pp. 822–825. S. K. Kapotas, E. E. Varsaki, and A. N. Skodras, “Data hiding in H.264 encoded video sequences,” in IEEE 9th Workshop on Multimedia Signal Processing (MMSP07), Oct. 2007, pp. 373–376. B. Chen and G. W. Wornell, “Quantization index modulation for digitalwatermarking and information embedding of multimedia,” J. VLSI Signal Process., vol. 27, pp. 7–33, 2001. 0.3 0.2 0.1 x axis 0 3MB 6MB 10MB video size in MB Figure 4.1 Comparison of PSNR ratio with varied size of video with existing and proposed system. V. Conclusion and Future Work The Quantization algorithm is a symmetrickey algorithm, which uses the same key for both encrypting and decrypting the data. Unlike most datahiding methods in the motion vectors that rely their www.ijera.com 1125 | P a g e