Professional Documents
Culture Documents
using
Reverse Stego Method(LSB Algorithm)
SUBMITED TO
Information security has become the area of concern as a result of widespread use of
communication medium over the internet. This project focuses on the data security approach when combined
with encryption and steganography techniques for secret communication by hiding it inside the multimedia files.
The high results are achieved by providing the security to data before transmitting it over the internet. The files
such as images, audio, video contains collection of bits that can be further translated into images, audio and
video. The files composed of insignificant bits or unused areas which can be used for overwriting of other data.
This Project explains the proposed algorithm using video steganography for enhancing data security. The
Steganography, Cryptography and Digital Watermarking techniques can be used to obtain security and privacy of
data. The steganography is the art of hiding data inside another data such as cover medium by applying different
steganography techniques. While cryptography results in making the data human unreadable form called as
cipher thus cryptography is scrambling of messages. Whereas the steganography results in exploitation of human
awareness so it remains unobserved and undetected or intact. It is possible to use all file medium, digital data, or
files as a cover medium in steganography. Generally steganography technique is applied where the cryptography
is ineffective.
KEYWORDS: Steganography, cryptography, LSB method, Stego video,embedded video,extracted
video,alter,masking.
INTRODUCTION (ABOUT PROJECT)
The growing use of Internet has many approaches that can transfer the data into different forms so
that their resultant data can be understood if it can be returned back into its original form. This
technique is known as encryption.
However, a major disadvantage of this method is that the existence of data is not hidden. If
someone gives enough time then the unreadable encrypted data may be converted into its original
form.
This problem can be solved by using an advanced cryptographic technique i.e., “steganography”. It
can be used to hide data in a cover media so that other cannot notice it. The characteristics of the
cover media depends on the amount of data that can be hidden, the perceptibility of the message and
its robustness.
PROBLEM STATEMENT
This project addresses the security problem of transmitting the data over internet network, the
main idea coming when we start asking that how can we send a message secretly to the
destination? The science of steganography answers this question.
Using steganography, information can be hidden in carriers such as images, audio files, text files,
videos and data transmissions.
In this research, we proposed some methods and algorithms of an video steganography system to
hide a digital text of a secret message without losing video quality and providing more security.
PROJECT DEFINITION
• In this project, we propose to develop a system to hide and secure sensitive data by using
"STEGANOGRAPHY" technique .
• It's important to know what is the file type of the data that it shall be hidden and the cover
file type so it is possible to alter graphic or sound files slightly without losing their overall
viability for the viewer and listener.
• By the final of our research we developed a software uses an algorithm, to embed data in the
video; The purposed system is called "Steganography“.
• The aim of this project is to encrypt the data, in this system LSB is the algorithms that we
use to hide the data.
PROJECT OBJECTIVES
• In this project we primarily concentrated on the data security issues when sending the data over the
network using steganographic techniques.
• The main objectives of our project are to produce security tool based on steganography techniques to
hider message carried by stego-media which should not be sensible to human beings and avoid
drawing suspicion to the existence of hidden message.
SCOPE OF PROJECT:
• The project is developed for hiding information in any image or audio or video file. The scope of the
project is implementation of video steganography tool for hiding information includes any type of
information file and image files and the path where the user wants to save video and excluded file.
• In this project, the implementation has done to develop a pure and secure video steganographic
system.
Literature Review
• Abbas et al. presented a technique in video steganography by utilizing the Cuckoo search algorithm in
2015. In this technique, the secret message was separated into byte by byte then five different types
utilized for showing the bits of each byte.
• In 2015, Sahu and Mitra introduced a method in video steganography using the LSB method and
advanced encryption standard (AES) method .
• In 2016, Saleema and Amarunnishad introduced a technique in image steganography by utilizing an
arbitrary selection of image pixel utilized for embedding the secret message inside it and by utilizing
the LSB method for embedding the data inside the image and by utilizing hybrid Fuzzy Neural
Networks for improving the image quality after the embedding process.
• In 2016, Solichin and Painem introduced a method in video steganography called the less significant
frame (LSF) method [29]. In this method, the selection of the frame that had the secret message
depended on the movement of the frame using the features of optical stream.
• In 2017, Putu et al. introduced a technique in video steganography, by utilizing an AES-128 bit method
for encoding the image. After that, the LSB method was utilized for embedding the encoded image
inside the video.
• After that, the 2D DCT is utilized for embedding the secret data to increase the protection of the system
Motivation
• The article of how alexa used video Steganography during the superbowl ads.
• privacy violation using video steganography.
• In order to move further step i decided to do my project on video steganography.
Secret message communication –Introduction
Purpose:
Hiding sensitive information vital for security purposes.
Securing private files and documents.
Secret message communication - 3 methods:
Cryptography, Steganography, Watermarking.
Cryptography - Data to be hidden is codedseveral techniques; sophisticated
visually obvious to be encrypted; appears non-sensical.
Watermarking - Applies a copyright label: prevents illegal use of content
Improper removal causes degradation of original information.
Steganography -hiding information by using another information as a cover.
STEGANOGRAPHY-INTRODUCTION
Steganography Cryptography
1. Steganography means covered writing. 1. Cryptography means secret writing.
2. Attack’s name in Steganography is 2. While in cryptography, Attack’s name is
Steganalysis. Cryptanalysis.
3. In steganography, structure of data is not 3. While in cryptography, structure of data is
usually altered. altered.
4. Steganography supports Confidentiality and 4. While cryptography supports Confidentiality
Authentication security principles. and Authentication security principles as well as
Data integrity and Non-repudiation.
5. In steganography, the fact that a secret
5. While in cryptography only secret message is
communication is taking place is hidden.
hidden.
6. In steganography, not much mathematical
6. Cryptography involves the use of number
transformations are involved.
theory, mathematics etc. to modify data
History-Steganography
• User needs to run the application. The user has two tab options - encrypt and decrypt. If user select
encrypt, application give the screen to select video file, information file and option to save the video
file. If user select decrypt, application gives the screen to select only image file and ask path where
user want to save the secrete file.
SOFTWARE REQUIREMENTS
operating system - Windows 7
software programming package - MATLAB R2021a
HARDWARE REQUIREMENTS
processor type - Pentium-IV processor
speed - 2.4 GHZ
ram - 4 GB
hard disk - 20 GB HD
Video Steganography - Architecture
MODULES
• embedded video
• exracted video
• stego video
• cover video
• encrypted key
SYSTEM ANALYSIS
EXISTED SYSTEM
The researchers concentrated on enhancing the execution of video steganography by utilizing diverse
strategies.they utilized cryptographic algorithm and the genetic algorithms to hide the secret message that
was compressed to reduce the size.The matter of security becomes more future enhancement feature.
PROPOSED SYSTEM
The primary objective of this method is to hide a lot of data with a high quality of stego video and
accomplish a high security for the information hiding inside the cover video.For this purpose we can
compute the pixel value by adding an extra bit after the embedding process.
Expected output:
VIDEO STEGOMETER
VIDEO STEGOMETER
Fig.1 Embedding and Extraction panel
Fig.2 Embedding Phase Fig.3 Extraction Phase
CONCLUSION
In this study, a novel method for video steganography is proposed by utilizing a the reverse stego
technique to enhance the LSB method for embedding the data inside the video frame by randomly
selecting the pixels that were utilized for embedding rather than serial selection in the traditional LSB to
increase the security and to prevent the hackers from discovering the pixels that have the secret data.
The experimental results depict that the proposed method is more reliable and secure.we observed
that the estimation of the PSNR is high, while the estimation of the MSE is low when embedding the
video.The estimation of the MSE is increasing, and the estimation of the PSNR is decreased when the
payloads are increasing.which implies that the quality of the video is decreased when the payload of
characters is increased.
In addition, the values of the correlation are near to 1, and this means that the stego videos are closer
to the cover videos.
REFERENCES