This document discusses video steganography techniques. It begins with an introduction to steganography, which is hiding information within other information. Images are well-suited for steganography due to redundant pixel data. The document then discusses various video and image steganography methods, including least significant bit (LSB) substitution and modifying pixel values. Evaluation metrics for steganography like mean square error and peak signal to noise ratio are also mentioned. Examples are provided to illustrate how messages can be hidden in the LSB of image pixel values. The document concludes with references for further reading on steganography implementations and evaluations.
4. Steganography is an art of hiding information inside
information.
The main objective of Steganography is mainly concerned
with the protection of contents of the hidden
information.
Images are ideal for information hiding because of the
large amount of redundant space is created in the storing
of images.
5. Steganography literally means “covered writing”
Definition: It is an art and science of hiding information by
embedding it in some other data.
Goals: To hide a secret message within an object. Do it such a
way that the presence of message is not visible.
6. Vid = mmreader('video.avi');
numFrames = vid.NumberOfFrames;
n = numFrames; for i = 1:2:n frames = read( vid, i);
imwrite (frames,['Image' int2str( i ), '.jpg']);
im(i)=image(frames);
end
Video to Image frame converter Using MatLab
14. By using LSB(Least Significant Bit algorithm)
The most common and popular method of modern day steganography is
to make use of LSB of picture’s pixel information.
This technique works best when the file is longer than the message file
and if image is grayscale.
When applying LSB techniques to each byte of a 24 bit image, three bits
can be encoded into each pixel.
15. Data Embedding Algorithm
Step 1: Extract the pixels of the cover image.
Step 2: Extract the characters of the text le.
Step 3: Extract the characters from the Stego key.
Step 4: Choose first pixel and pick characters of the Stego key and place it in first
component of pixel.
Step 5: Place some terminating symbol to indicate end of the key. 0 has been used as a
terminating symbol in this algorithm.
Step 6: Insert characters of text le in each rst Component of next pixels by replacing it.
Step 7: Repeat step 6 till all the characters has been
embedded.
16. Data Extraction Algorithm
Step 1: Extract the pixels of the stego image.
Step 2: Now, start from first pixel and extract stego key characters from first
component of the pixels. Follow
Step3: up to terminating symbol, otherwise follow step 4.
Step 4: If this extracted key matches with the key entered by the receiver, then
follow Step 5, otherwise terminate the program
Step 5: If the key is correct, then go to next pixels and extract secret message
characters from first component of next pixels. Follow Step 5 till up to terminating
symbol, otherwise follow step 6.
Step 6: Extract secret message
17. Example: We can use images to hide things if we replace the last bit of every byte with
a bit from the message.
Message A-01000001
Image with 3 pixels
Pixel 1: 11111000 11001001 00000011
Pixel 2: 11111000 11001001 00000011
Pixel 3: 11111000 11001001 00000011
Now we hide our message in the image.
Message: 01000001
Pixel 1: 11111000 11001001 00000010
Pixel 2: 11111000 11001000 00000010
Pixel 3: 11111000 11001001 00000011
19. Pixel Indicator
This method uses the least two significant bits of one of the channels to indicate
existence of data in the other two channels.
Stego Color Cycle
The SCC technique uses the RGB images to hide the data in different channels.
It keeps cycling the hidden data between the Red, Green and Blue channels, utilizing
one channel at a cycle time.
Triple-A
Triple-A technique uses the same principle of LSB, where the secret is hidden in the
least significant bits of the pixels, with more randomization randomization in selection
of the number of bits used and the color channels that are used
20. Max-bit
This method measures the intensity intensity of the pixel and then
hides data by random pixel selection random pixel selection with a goal
to hide maximum data in each pixel.
This method is divided into three parts:
1.Encryption
2.Image Intensity Calculation
3.Steganography.
Optimum Pixel Adjustment Procedure
Optimal Pixel adjustment Procedure (OPAP) reduces the distortion
caused by the LSB substitution method
21. Inverted Pattern
This inverted pattern (IP) LSB substitution approach uses the idea of processing
secret messages prior to embedding
IP Method Using Relative Entropy
Relative entropy measures the information discrepancy between two different
sources with an optimal threshold obtained by minimizing relative entropy
Pixel Value Differencing
Pixel Value Differencing (PVD) is able to provide a high quality stego image in spite
of the high capacity of the concealed information.
24. Most Significant Bit(MSB)
This is usually the bit farthest to the left, or the bit transmitted first in a
sequence. For example, in the binary number 1000, the MSB is 1, and in
the binary number 0111, the MSB is 0. The most significant byte, also
abbreviated MSB, is the byte in a multiple-byte word with the largest
value.
How to calculate MSB?
The MSB in an 8-bit binary number represents a value of 128 decimal.
The LSBrepresents a value of 1. In computing, the least significant bit
(LSB) is the bit position in a binary integer giving the units value, that
is, determining whether the number is even or odd.
32. References
Implementation of LSB Steganography and its Evaluation for Various File
Formats. Int. J. Advanced Networking and Applications 868
Introduction to image Steganography youtube video.
Cryptography and network security by William Stallings 3rd edition.