SlideShare a Scribd company logo
ROBUST VIDEO DATA
HIDING USING
FORBIDDEN ZONE DATA
HIDING AND SELECTIVE
EMBEDDING
Under the guidance of:
Prof. Rekha Patil
Team members:
Geeta S Savalgi
Pooja Lakha
Pooja S Patil
WHAT IS DATA SECURITY?
Protecting a database from
destructive forces and the
unwanted actions of
unauthorized users.
INTRODUCTION
DATA SECURITY TECHNOLOGIES
DISK
ENCRYPTION
HARDWARE BASED
MECHANISMS BACKUP
S
DATA
MASKING
DATA ERASUR
DATA HIDING
It is the process of embedding information into a host medium.
FORBIDDEN ZONE
It is defined as the host signal range where no alteration is allowed
during data hiding process.
 SELECTIVE EMBEDDING
Here host signal samples, which will be used in data hiding, are
determined adaptively. The selection is performed at four stages:
Frame selection, frequency band determination, block selection and
coefficient selection.
KEY TERMS USED IN PROJECT
 To achieve efficient data hiding in video sequence.
 To utilize systematic RA Codes to encode message
bits and frame bits.
 To allow handling de-synchronization between
embedder and decoder.
 To achieve certain level of robustness against frame
drop, repeat and insertion attacks.
 To use 3-D interleaving.
ISSUES AND CHALLENGES
 Successfully utilized in video data hiding
applications.
 Tamper detection in digital videos can be
performed efficiently.
 It is used in fragile applications such as
authentication.
 It provides excess control, copy control in DVD’s.
 Widely suitable for broader range of application.
APPLICATIONS
 The necessity for practical higher dimensional
data hiding codes.
 Adjusting trade-off between robustness(channel
code) and imperceptibility(source) by practical
means.
 Design of end-to-end real-life visual applications.
MOTIVATIONS
 During video data hiding the quality of the image
cannot be preserved.
 They cannot survive any format conversion or
transcoding, without any significant loss of perceptual
quality.
 Efficiently hide data in video and to preserve the
quality from the external attacks.
PROBLEM STATEMENT
 A new block based data hiding method which makes
use of erasure correction capability of repeat
accumulates codes.
 Uses superiority of forbidden zone for low embedding
distortion levels.
 Robust to frame manipulation attacks via frame
synchronization markers.
SCOPE OF WORK
The goal of the design process is to
produce a model of a system which can be
used later to build that system and use this
model to build the overall system.
DESIGN
 Parallel decoders are used to correct de-sync.
 The video data hiding methods utilize uncompressed video
data where insertions and erasures occur at decoder, causing
de-sync.
 Multiple hronization errors.
 This scheme is successful only when the number of selected
host signal samples is much less than the total number of
host signal samples.
EXISTING SYSTEM
ARCHITECTURE of proposed
system
EMBED
MESSAGE DATA FILE
OUTPUT FILE
MASTER FILE
ENCODEDVIDEO
COMPRESSION AND ENCRYPTION
DECODE
UNCOMPRESSION DECRYPTION
COMPRESSION AND
ENCRYPTION CHECK
ENCODEDVIDEO
RECEIVED
DECODED FILE
MESSAGE OR DATA FILE
SENDER
RECEIVER
ENCODER
DECODER
Substitute bytes
Shift rows
Add round key
Mix columns
Substitute bytes
Add round key
Mix columns
Shift keys
Add round key
Shift keys
Substitute bytes
Add round key
Add round key
Inverse mix columns
Add round key
Inverse sub bytes
Inverse shift rows
Inverse mix columns
Add round key
Inverse shift bytes
Inverse shift rows
Add round key
Inverse shift bytes
Inverse shift rows
EXPAND KEY
W(0,3)
KEY
Round 9 .
Round 10
Round 1
Round 9
ound 1
Implementation is the stage of the project when the
theoretical design is turned out into a working system.
The implementation stage involves careful planning,
investigation of the existing system and it’s constraints.
IMPLEMENTATION
Frame selection is performed and the selected
frames are processed block-wise.
The selection is performed at four stages:
 Frame selection
 Frequency band determination
 Block selection
 Coefficient selection
ENCRYPTION MODULE
Let fcur and fpre denote the current and previous
frame indices
 fcur > T, then skip this frame.
 If fcur = fpre, then skip this frame.
 Otherwise, process the current frame.
 fcur< fpre, then the end of the group of frames is
reached.
DECRYPTION MODULE
System flow diagram
System flow
Embed data
Spread frames
Actual video
User give input Msg or data as Data embedded video
input
Spread a video Encrypted video
Decrypt a video View original data or
msg
Encryption
Decryption
results
 New video data hiding framework that makes use of erasure
correction capability of RA codes and superiority of FZDH.
 It robust to frame manipulation attacks via frame
synchronization markers.
 Typical system parameter are reported for error-free decoding.
 The results indicate that the framework can be successfully
utilized in video data hiding applications.
 User cannot find the original data.
 It increases the security.
Conclusion
 Incorporation of human visual system based spatio
temporal adaption of data hiding method
parameters.
 New multilevel embedding technique .
 Increase block size to embed more data.
 Improve commercialization.
FUTURE WORK
THANK YOU FOR
YOUR
ATTENTION !

More Related Content

Viewers also liked

Audio Steganography synopsis
Audio Steganography synopsisAudio Steganography synopsis
Audio Steganography synopsis
kartikeya upadhyay
 
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMATDATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
alphin jose
 
Captcha as graphical passwords a new security primitive based on hard ai prob...
Captcha as graphical passwords a new security primitive based on hard ai prob...Captcha as graphical passwords a new security primitive based on hard ai prob...
Captcha as graphical passwords a new security primitive based on hard ai prob...
IGEEKS TECHNOLOGIES
 
Marketing 4.0
Marketing 4.0Marketing 4.0
Marketing 4.0
Irina Olanescu
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
priyanka reddy
 
Captcha as graphical password
Captcha as graphical passwordCaptcha as graphical password
Captcha as graphical password
Gopinath Ramanna
 
H.264 vs HEVC
H.264 vs HEVCH.264 vs HEVC
H.264 vs HEVC
Marcin Walendowski
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud ppt
priyanka reddy
 
Marketing 3.0
Marketing 3.0Marketing 3.0
Marketing 3.0
Richard Meyer
 
Steganography
Steganography Steganography
Steganography
Uttam Jain
 
Marketing mix
Marketing mixMarketing mix
Marketing mix
Bouziani Houssine
 
Estimize Bull speed using Back propagation
Estimize Bull speed using Back propagationEstimize Bull speed using Back propagation
Estimize Bull speed using Back propagation
IJMER
 
Why What & How of the Internet of Things
Why What & How of the Internet of Things Why What & How of the Internet of Things
Why What & How of the Internet of Things
THINK Interactive, inc.
 
Data-Driven Marketing And Sales Predictions 2014 - Lattice Engines
Data-Driven Marketing And Sales Predictions 2014 - Lattice EnginesData-Driven Marketing And Sales Predictions 2014 - Lattice Engines
Data-Driven Marketing And Sales Predictions 2014 - Lattice Engines
Lattice Engines
 
Best practice in sales and marketing alignment
Best practice in sales and marketing alignment Best practice in sales and marketing alignment
Best practice in sales and marketing alignment
B2B Marketing
 
The Indian History Quiz
The Indian History QuizThe Indian History Quiz
The Indian History Quiz
Sharanyan Ravi
 
AVR_Course_Day1 basic electronics
AVR_Course_Day1 basic electronicsAVR_Course_Day1 basic electronics
AVR_Course_Day1 basic electronics
Mohamed Ali
 
10 Ways to be a Marketing Genius Like Lady Gaga
10 Ways to be a Marketing Genius Like Lady Gaga10 Ways to be a Marketing Genius Like Lady Gaga
10 Ways to be a Marketing Genius Like Lady Gaga
Jesse Desjardins - @jessedee
 
50 Content Marketing Predictions for 2014
50 Content Marketing Predictions for 201450 Content Marketing Predictions for 2014
50 Content Marketing Predictions for 2014
Content Marketing Institute
 
The Evolution of SEO - 2014 and Beyond
The Evolution of SEO - 2014 and BeyondThe Evolution of SEO - 2014 and Beyond
The Evolution of SEO - 2014 and Beyond
Joe Griffin
 

Viewers also liked (20)

Audio Steganography synopsis
Audio Steganography synopsisAudio Steganography synopsis
Audio Steganography synopsis
 
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMATDATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
 
Captcha as graphical passwords a new security primitive based on hard ai prob...
Captcha as graphical passwords a new security primitive based on hard ai prob...Captcha as graphical passwords a new security primitive based on hard ai prob...
Captcha as graphical passwords a new security primitive based on hard ai prob...
 
Marketing 4.0
Marketing 4.0Marketing 4.0
Marketing 4.0
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Captcha as graphical password
Captcha as graphical passwordCaptcha as graphical password
Captcha as graphical password
 
H.264 vs HEVC
H.264 vs HEVCH.264 vs HEVC
H.264 vs HEVC
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud ppt
 
Marketing 3.0
Marketing 3.0Marketing 3.0
Marketing 3.0
 
Steganography
Steganography Steganography
Steganography
 
Marketing mix
Marketing mixMarketing mix
Marketing mix
 
Estimize Bull speed using Back propagation
Estimize Bull speed using Back propagationEstimize Bull speed using Back propagation
Estimize Bull speed using Back propagation
 
Why What & How of the Internet of Things
Why What & How of the Internet of Things Why What & How of the Internet of Things
Why What & How of the Internet of Things
 
Data-Driven Marketing And Sales Predictions 2014 - Lattice Engines
Data-Driven Marketing And Sales Predictions 2014 - Lattice EnginesData-Driven Marketing And Sales Predictions 2014 - Lattice Engines
Data-Driven Marketing And Sales Predictions 2014 - Lattice Engines
 
Best practice in sales and marketing alignment
Best practice in sales and marketing alignment Best practice in sales and marketing alignment
Best practice in sales and marketing alignment
 
The Indian History Quiz
The Indian History QuizThe Indian History Quiz
The Indian History Quiz
 
AVR_Course_Day1 basic electronics
AVR_Course_Day1 basic electronicsAVR_Course_Day1 basic electronics
AVR_Course_Day1 basic electronics
 
10 Ways to be a Marketing Genius Like Lady Gaga
10 Ways to be a Marketing Genius Like Lady Gaga10 Ways to be a Marketing Genius Like Lady Gaga
10 Ways to be a Marketing Genius Like Lady Gaga
 
50 Content Marketing Predictions for 2014
50 Content Marketing Predictions for 201450 Content Marketing Predictions for 2014
50 Content Marketing Predictions for 2014
 
The Evolution of SEO - 2014 and Beyond
The Evolution of SEO - 2014 and BeyondThe Evolution of SEO - 2014 and Beyond
The Evolution of SEO - 2014 and Beyond
 

Similar to Robust video data hiding using forbidden zone data hiding and selective embedding

CR_CSI_119
CR_CSI_119CR_CSI_119
CR_CSI_119
Rajkumar Rathod
 
A REAL-TIME H.264/AVC ENCODER&DECODER WITH VERTICAL MODE FOR INTRA FRAME AND ...
A REAL-TIME H.264/AVC ENCODER&DECODER WITH VERTICAL MODE FOR INTRA FRAME AND ...A REAL-TIME H.264/AVC ENCODER&DECODER WITH VERTICAL MODE FOR INTRA FRAME AND ...
A REAL-TIME H.264/AVC ENCODER&DECODER WITH VERTICAL MODE FOR INTRA FRAME AND ...
csandit
 
Enabling data integrity protection in regenerating coding-based cloud storage...
Enabling data integrity protection in regenerating coding-based cloud storage...Enabling data integrity protection in regenerating coding-based cloud storage...
Enabling data integrity protection in regenerating coding-based cloud storage...
Papitha Velumani
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
irjes
 
JPD1406 Enabling Data Integrity Protection in Regenerating-Coding-Based Clou...
JPD1406  Enabling Data Integrity Protection in Regenerating-Coding-Based Clou...JPD1406  Enabling Data Integrity Protection in Regenerating-Coding-Based Clou...
JPD1406 Enabling Data Integrity Protection in Regenerating-Coding-Based Clou...
chennaijp
 
Hydan
HydanHydan
Fibonacci Video Encryption
Fibonacci Video EncryptionFibonacci Video Encryption
Fibonacci Video Encryption
Jun Steed Huang
 
1-160730050929.pptx dynamic hash table info
1-160730050929.pptx dynamic hash table info1-160730050929.pptx dynamic hash table info
1-160730050929.pptx dynamic hash table info
MdjunaidAli3
 
Image Compression Using Intra Prediction of H.264/AVC and Implement of Hiding...
Image Compression Using Intra Prediction of H.264/AVC and Implement of Hiding...Image Compression Using Intra Prediction of H.264/AVC and Implement of Hiding...
Image Compression Using Intra Prediction of H.264/AVC and Implement of Hiding...
ijsrd.com
 
V01 i010410
V01 i010410V01 i010410
V01 i010410
IJARBEST JOURNAL
 
ITDCC05.ppt
ITDCC05.pptITDCC05.ppt
ITDCC05.ppt
Maruthi Jâcs
 
Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud
allan sam
 
IRJET - Information Hiding in H.264/AVC using Digital Watermarking
IRJET -  	  Information Hiding in H.264/AVC using Digital WatermarkingIRJET -  	  Information Hiding in H.264/AVC using Digital Watermarking
IRJET - Information Hiding in H.264/AVC using Digital Watermarking
IRJET Journal
 
10.1.1.184.6612
10.1.1.184.661210.1.1.184.6612
10.1.1.184.6612
NITC
 
S.A.kalaiselvan- robust video data hiding at forbidden zone
S.A.kalaiselvan- robust video data hiding at forbidden zoneS.A.kalaiselvan- robust video data hiding at forbidden zone
S.A.kalaiselvan- robust video data hiding at forbidden zone
kalaiselvanresearch
 
Ameya_Kasbekar_Resume
Ameya_Kasbekar_ResumeAmeya_Kasbekar_Resume
Ameya_Kasbekar_Resume
Ameya Kasbekar
 
Final_year_project_documentation
Final_year_project_documentationFinal_year_project_documentation
Final_year_project_documentation
Ushnish Chowdhury
 
18 17 jan17 13470 rakesh ahuja revised-version(edit)
18 17 jan17 13470 rakesh ahuja revised-version(edit)18 17 jan17 13470 rakesh ahuja revised-version(edit)
18 17 jan17 13470 rakesh ahuja revised-version(edit)
IAESIJEECS
 
Final PPT.pptx (1).pptx
Final PPT.pptx (1).pptxFinal PPT.pptx (1).pptx
Final PPT.pptx (1).pptx
gopikahari7
 
Ensuring d.s
Ensuring d.sEnsuring d.s
Ensuring d.s
karthi j
 

Similar to Robust video data hiding using forbidden zone data hiding and selective embedding (20)

CR_CSI_119
CR_CSI_119CR_CSI_119
CR_CSI_119
 
A REAL-TIME H.264/AVC ENCODER&DECODER WITH VERTICAL MODE FOR INTRA FRAME AND ...
A REAL-TIME H.264/AVC ENCODER&DECODER WITH VERTICAL MODE FOR INTRA FRAME AND ...A REAL-TIME H.264/AVC ENCODER&DECODER WITH VERTICAL MODE FOR INTRA FRAME AND ...
A REAL-TIME H.264/AVC ENCODER&DECODER WITH VERTICAL MODE FOR INTRA FRAME AND ...
 
Enabling data integrity protection in regenerating coding-based cloud storage...
Enabling data integrity protection in regenerating coding-based cloud storage...Enabling data integrity protection in regenerating coding-based cloud storage...
Enabling data integrity protection in regenerating coding-based cloud storage...
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
JPD1406 Enabling Data Integrity Protection in Regenerating-Coding-Based Clou...
JPD1406  Enabling Data Integrity Protection in Regenerating-Coding-Based Clou...JPD1406  Enabling Data Integrity Protection in Regenerating-Coding-Based Clou...
JPD1406 Enabling Data Integrity Protection in Regenerating-Coding-Based Clou...
 
Hydan
HydanHydan
Hydan
 
Fibonacci Video Encryption
Fibonacci Video EncryptionFibonacci Video Encryption
Fibonacci Video Encryption
 
1-160730050929.pptx dynamic hash table info
1-160730050929.pptx dynamic hash table info1-160730050929.pptx dynamic hash table info
1-160730050929.pptx dynamic hash table info
 
Image Compression Using Intra Prediction of H.264/AVC and Implement of Hiding...
Image Compression Using Intra Prediction of H.264/AVC and Implement of Hiding...Image Compression Using Intra Prediction of H.264/AVC and Implement of Hiding...
Image Compression Using Intra Prediction of H.264/AVC and Implement of Hiding...
 
V01 i010410
V01 i010410V01 i010410
V01 i010410
 
ITDCC05.ppt
ITDCC05.pptITDCC05.ppt
ITDCC05.ppt
 
Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud
 
IRJET - Information Hiding in H.264/AVC using Digital Watermarking
IRJET -  	  Information Hiding in H.264/AVC using Digital WatermarkingIRJET -  	  Information Hiding in H.264/AVC using Digital Watermarking
IRJET - Information Hiding in H.264/AVC using Digital Watermarking
 
10.1.1.184.6612
10.1.1.184.661210.1.1.184.6612
10.1.1.184.6612
 
S.A.kalaiselvan- robust video data hiding at forbidden zone
S.A.kalaiselvan- robust video data hiding at forbidden zoneS.A.kalaiselvan- robust video data hiding at forbidden zone
S.A.kalaiselvan- robust video data hiding at forbidden zone
 
Ameya_Kasbekar_Resume
Ameya_Kasbekar_ResumeAmeya_Kasbekar_Resume
Ameya_Kasbekar_Resume
 
Final_year_project_documentation
Final_year_project_documentationFinal_year_project_documentation
Final_year_project_documentation
 
18 17 jan17 13470 rakesh ahuja revised-version(edit)
18 17 jan17 13470 rakesh ahuja revised-version(edit)18 17 jan17 13470 rakesh ahuja revised-version(edit)
18 17 jan17 13470 rakesh ahuja revised-version(edit)
 
Final PPT.pptx (1).pptx
Final PPT.pptx (1).pptxFinal PPT.pptx (1).pptx
Final PPT.pptx (1).pptx
 
Ensuring d.s
Ensuring d.sEnsuring d.s
Ensuring d.s
 

Recently uploaded

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 

Recently uploaded (20)

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 

Robust video data hiding using forbidden zone data hiding and selective embedding

  • 1. ROBUST VIDEO DATA HIDING USING FORBIDDEN ZONE DATA HIDING AND SELECTIVE EMBEDDING Under the guidance of: Prof. Rekha Patil Team members: Geeta S Savalgi Pooja Lakha Pooja S Patil
  • 2. WHAT IS DATA SECURITY? Protecting a database from destructive forces and the unwanted actions of unauthorized users. INTRODUCTION
  • 3. DATA SECURITY TECHNOLOGIES DISK ENCRYPTION HARDWARE BASED MECHANISMS BACKUP S DATA MASKING DATA ERASUR
  • 4. DATA HIDING It is the process of embedding information into a host medium. FORBIDDEN ZONE It is defined as the host signal range where no alteration is allowed during data hiding process.  SELECTIVE EMBEDDING Here host signal samples, which will be used in data hiding, are determined adaptively. The selection is performed at four stages: Frame selection, frequency band determination, block selection and coefficient selection. KEY TERMS USED IN PROJECT
  • 5.  To achieve efficient data hiding in video sequence.  To utilize systematic RA Codes to encode message bits and frame bits.  To allow handling de-synchronization between embedder and decoder.  To achieve certain level of robustness against frame drop, repeat and insertion attacks.  To use 3-D interleaving. ISSUES AND CHALLENGES
  • 6.  Successfully utilized in video data hiding applications.  Tamper detection in digital videos can be performed efficiently.  It is used in fragile applications such as authentication.  It provides excess control, copy control in DVD’s.  Widely suitable for broader range of application. APPLICATIONS
  • 7.  The necessity for practical higher dimensional data hiding codes.  Adjusting trade-off between robustness(channel code) and imperceptibility(source) by practical means.  Design of end-to-end real-life visual applications. MOTIVATIONS
  • 8.  During video data hiding the quality of the image cannot be preserved.  They cannot survive any format conversion or transcoding, without any significant loss of perceptual quality.  Efficiently hide data in video and to preserve the quality from the external attacks. PROBLEM STATEMENT
  • 9.  A new block based data hiding method which makes use of erasure correction capability of repeat accumulates codes.  Uses superiority of forbidden zone for low embedding distortion levels.  Robust to frame manipulation attacks via frame synchronization markers. SCOPE OF WORK
  • 10. The goal of the design process is to produce a model of a system which can be used later to build that system and use this model to build the overall system. DESIGN
  • 11.  Parallel decoders are used to correct de-sync.  The video data hiding methods utilize uncompressed video data where insertions and erasures occur at decoder, causing de-sync.  Multiple hronization errors.  This scheme is successful only when the number of selected host signal samples is much less than the total number of host signal samples. EXISTING SYSTEM
  • 12. ARCHITECTURE of proposed system EMBED MESSAGE DATA FILE OUTPUT FILE MASTER FILE ENCODEDVIDEO COMPRESSION AND ENCRYPTION DECODE UNCOMPRESSION DECRYPTION COMPRESSION AND ENCRYPTION CHECK ENCODEDVIDEO RECEIVED DECODED FILE MESSAGE OR DATA FILE SENDER RECEIVER
  • 14. Substitute bytes Shift rows Add round key Mix columns Substitute bytes Add round key Mix columns Shift keys Add round key Shift keys Substitute bytes Add round key Add round key Inverse mix columns Add round key Inverse sub bytes Inverse shift rows Inverse mix columns Add round key Inverse shift bytes Inverse shift rows Add round key Inverse shift bytes Inverse shift rows EXPAND KEY W(0,3) KEY Round 9 . Round 10 Round 1 Round 9 ound 1
  • 15. Implementation is the stage of the project when the theoretical design is turned out into a working system. The implementation stage involves careful planning, investigation of the existing system and it’s constraints. IMPLEMENTATION
  • 16. Frame selection is performed and the selected frames are processed block-wise. The selection is performed at four stages:  Frame selection  Frequency band determination  Block selection  Coefficient selection ENCRYPTION MODULE
  • 17. Let fcur and fpre denote the current and previous frame indices  fcur > T, then skip this frame.  If fcur = fpre, then skip this frame.  Otherwise, process the current frame.  fcur< fpre, then the end of the group of frames is reached. DECRYPTION MODULE
  • 18. System flow diagram System flow Embed data Spread frames Actual video User give input Msg or data as Data embedded video input Spread a video Encrypted video Decrypt a video View original data or msg Encryption Decryption
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.  New video data hiding framework that makes use of erasure correction capability of RA codes and superiority of FZDH.  It robust to frame manipulation attacks via frame synchronization markers.  Typical system parameter are reported for error-free decoding.  The results indicate that the framework can be successfully utilized in video data hiding applications.  User cannot find the original data.  It increases the security. Conclusion
  • 25.  Incorporation of human visual system based spatio temporal adaption of data hiding method parameters.  New multilevel embedding technique .  Increase block size to embed more data.  Improve commercialization. FUTURE WORK