You are on page 1of 35

Steganolysis-Implementing secure video Steganography

using
Reverse Stego Method(LSB Algorithm)
SUBMITED TO

P.V.K.N GOVERNMENT COLLEGE (A)


CHITTOOR, A.P
(Autonomous Institution)
(Affiliated to Sri Venkateswara University, Tirupati)
(Re-Accredited by NAAC with ‘A’ Grade)

In partial fulfillment of the requirements for the award of the degree of


MASTER OF SCIENCE
By
S.MEERA JASMIN(M210606508)
Under the guidance of
Mr. M. ISMAIL
Lecturer In Computer Science
AGENDA
• Abstract
• Introduction(About Project)
• Problem Statement
• Project Definition
• Project Objectives
• Scope of Project
• Motivation
• Introduction-Steganography
• LSB (Least Significant Bit) algorithm
• Steps
• About MATLAB
• Methodology
• System Analysis
• Expected Output
• Conclusion
• References
ABSTRACT

Information security has become the area of concern as a result of widespread use of
communication medium over the internet. This project focuses on the data security approach when combined
with encryption and steganography techniques for secret communication by hiding it inside the multimedia files.
The high results are achieved by providing the security to data before transmitting it over the internet. The files
such as images, audio, video contains collection of bits that can be further translated into images, audio and
video. The files composed of insignificant bits or unused areas which can be used for overwriting of other data.
This Project explains the proposed algorithm using video steganography for enhancing data security. The
Steganography, Cryptography and Digital Watermarking techniques can be used to obtain security and privacy of
data. The steganography is the art of hiding data inside another data such as cover medium by applying different
steganography techniques. While cryptography results in making the data human unreadable form called as
cipher thus cryptography is scrambling of messages. Whereas the steganography results in exploitation of human
awareness so it remains unobserved and undetected or intact. It is possible to use all file medium, digital data, or
files as a cover medium in steganography. Generally steganography technique is applied where the cryptography
is ineffective.
KEYWORDS: Steganography, cryptography, LSB method, Stego video,embedded video,extracted
video,alter,masking.
INTRODUCTION (ABOUT PROJECT)

 The growing use of Internet has many approaches that can transfer the data into different forms so
that their resultant data can be understood if it can be returned back into its original form. This
technique is known as encryption.
 However, a major disadvantage of this method is that the existence of data is not hidden. If
someone gives enough time then the unreadable encrypted data may be converted into its original
form.
 This problem can be solved by using an advanced cryptographic technique i.e., “steganography”. It
can be used to hide data in a cover media so that other cannot notice it. The characteristics of the
cover media depends on the amount of data that can be hidden, the perceptibility of the message and
its robustness.
PROBLEM STATEMENT

 This project addresses the security problem of transmitting the data over internet network, the
main idea coming when we start asking that how can we send a message secretly to the
destination? The science of steganography answers this question.
 Using steganography, information can be hidden in carriers such as images, audio files, text files,
videos and data transmissions.
 In this research, we proposed some methods and algorithms of an video steganography system to
hide a digital text of a secret message without losing video quality and providing more security.
PROJECT DEFINITION

• In this project, we propose to develop a system to hide and secure sensitive data by using
"STEGANOGRAPHY" technique .
• It's important to know what is the file type of the data that it shall be hidden and the cover
file type so it is possible to alter graphic or sound files slightly without losing their overall
viability for the viewer and listener.
• By the final of our research we developed a software uses an algorithm, to embed data in the
video; The purposed system is called "Steganography“.
• The aim of this project is to encrypt the data, in this system LSB is the algorithms that we
use to hide the data.
PROJECT OBJECTIVES

• In this project we primarily concentrated on the data security issues when sending the data over the
network using steganographic techniques.
• The main objectives of our project are to produce security tool based on steganography techniques to
hider message carried by stego-media which should not be sensible to human beings and avoid
drawing suspicion to the existence of hidden message.
SCOPE OF PROJECT:

• The project is developed for hiding information in any image or audio or video file. The scope of the
project is implementation of video steganography tool for hiding information includes any type of
information file and image files and the path where the user wants to save video and excluded file.
• In this project, the implementation has done to develop a pure and secure video steganographic
system.
Literature Review

• Abbas et al. presented a technique in video steganography by utilizing the Cuckoo search algorithm in
2015. In this technique, the secret message was separated into byte by byte then five different types
utilized for showing the bits of each byte.
• In 2015, Sahu and Mitra introduced a method in video steganography using the LSB method and
advanced encryption standard (AES) method .
• In 2016, Saleema and Amarunnishad introduced a technique in image steganography by utilizing an
arbitrary selection of image pixel utilized for embedding the secret message inside it and by utilizing
the LSB method for embedding the data inside the image and by utilizing hybrid Fuzzy Neural
Networks for improving the image quality after the embedding process.
• In 2016, Solichin and Painem introduced a method in video steganography called the less significant
frame (LSF) method [29]. In this method, the selection of the frame that had the secret message
depended on the movement of the frame using the features of optical stream.
• In 2017, Putu et al. introduced a technique in video steganography, by utilizing an AES-128 bit method
for encoding the image. After that, the LSB method was utilized for embedding the encoded image
inside the video.
• After that, the 2D DCT is utilized for embedding the secret data to increase the protection of the system
Motivation

• The article of how alexa used video Steganography during the superbowl ads.
• privacy violation using video steganography.
• In order to move further step i decided to do my project on video steganography.
Secret message communication –Introduction

 Purpose:
Hiding sensitive information vital for security purposes.
Securing private files and documents.
 Secret message communication - 3 methods:
Cryptography, Steganography, Watermarking.
 Cryptography - Data to be hidden is codedseveral techniques; sophisticated
visually obvious to be encrypted; appears non-sensical.
 Watermarking - Applies a copyright label: prevents illegal use of content
Improper removal causes degradation of original information.
 Steganography -hiding information by using another information as a cover.
STEGANOGRAPHY-INTRODUCTION

 Steganography is analogous to cryptography, but it has another dimension.It is the art of


interacting in such a manner that no one can sense the existence of a hidden message.
 Steganography is a Greek term. which means;
 Steganos(“covered”) + graphein(“to write”)
=
covered writing(steganography).
 It is the art of interacting in such a manner that no one can sense the existence of a hidden
message
 Steganography ≠ cryptography
 Steganography hides data in plain view.
CRYPTOGRAPHY vs STEGANOGRAPHY

Steganography Cryptography
1. Steganography means covered writing. 1. Cryptography means secret writing.
2. Attack’s name in Steganography is 2. While in cryptography, Attack’s name is
Steganalysis. Cryptanalysis.
3. In steganography, structure of data is not 3. While in cryptography, structure of data is
usually altered. altered.
4. Steganography supports Confidentiality and 4. While cryptography supports Confidentiality
Authentication security principles. and Authentication security principles as well as
Data integrity and Non-repudiation.
5. In steganography, the fact that a secret
5. While in cryptography only secret message is
communication is taking place is hidden.
hidden.
6. In steganography, not much mathematical
6. Cryptography involves the use of number
transformations are involved.
theory, mathematics etc. to modify data
History-Steganography

• The first recorded case of steganography was traced back to 440


BC.
• In the fifth century BC, the Greek dictator Histiacus was
imprisoned by King Darius in Susa, who wanted to transmit
complex messages to his son-in-law, Aristagoras, in Miletus.
• To send the secret message, Histiacus used the scalp of his slave's
head to tattoo the secret information. He was waiting for the
slave's hair to cover the tattoo and, afterwards, he was sent to
Miletus to deliver the secret message (Johnson, 1995).
• In the earliest Greece, peeling the wax off a wax-covered tablet
was one of the techniques used to read and write secret messages.
The recipient of the message would merely dispose of the wax
from the tablet to read the hidden message.
Digital Steganography

• Digital Steganography can be devided into 4


types.
• Text Steganography
• image Steganography
• Audio Steganography
• video Steganography(our domain)
video steganography

• In this method a data file is embedded within a video


i.e. carrier file.
• Video steganography comprises two procedures
which are the embedder and detector. The embedder
has two data sources, which are payload implying
the amount of secret message inserted inside a cover,
and the cover video is utilized as a cover that
contains the message inside it.
• The correct selecting of pixels for hiding data
achieves a high quality and robustness.
• Steganography has many techniques to hide the
information.
Techniques

• LSB (Least Significant Bit) Insertion (Our domain)


• Masking and filtering
• Transform techniques
LSB algorithm(least significant bit)

• After the process of choosing pixels of frame, the LSB


method is utilized for the purpose of embedding an
encrypted secret message within it.The LSB method is
considered a famous and easy method in steganography.
• In this method, a video frame dealing is finished by
changing the least significant bits 7 and 8 to embed the
secret data to make the process of change in the video
frame hard to recognize by the human eye.
Steps

The steps of embedding process are:


• Input: cover video.
• Step 1: split the video files (.AVI) into frames.
• Step 2: convert the video frames into images.
• Step 3: select the images used as a cover randomly.
• Step4: determine the chosen pixels inside the video frame used for embedding the
secret message randomly.
• Step 5: LSB method is used to hide an encrypted secret message inside bits (7 and 8).
• Step 6: convert the image into the frame.
• Step 7: merge the video frames.
• Step 8: stego video.
• Output: stego video.
The steps of the extraction process are:
• Input: stego video
• Step 1: open the stego video and split it into frames.
• Step 2: convert the video frames into images.
• Step 3: determine the chosen images used as a cover.
• Step 4: determine pixels used for embedding the secret message using knight tour
algorithm.
• Step 5: LSB method used to recover an encrypted secret message from bits (7 and
8).
• Step 6: decrypt the secret message using subtraction method according to Eq. (6).
• Step 7: secret message.
• Output: secret message.
About MATLAB

 Initially the project is implemented with MATLAB tool of version 2021a.The


MATLAB tool is also used to design the user interface of this project. For the internal
computation of the project two algorithms are used. One is the DES algorithm to encrypt the
secret data and also for decryption at the receiver side. Second is the LSB.
 MATLAB® is a programming platform designed specifically for engineers and scientists
to analyze and design systems and products that transform our world.
 Common usage of the MATLAB application involves using the "Command Window" as
an interactive mathematical shell or executing text files containing MATLAB code.
MATLAB Window

The windows that are displayed on Figure Window


MATLAB window are:
1. Command Window
2. Editor Window
3. Figure Window
4. Help Window
5. Command History Window
6. Current Folder Window
7. Workspace Window
Methodology

• User needs to run the application. The user has two tab options - encrypt and decrypt. If user select
encrypt, application give the screen to select video file, information file and option to save the video
file. If user select decrypt, application gives the screen to select only image file and ask path where
user want to save the secrete file.

• This project has two methods - Encrypt and Decrypt.


 In encryption the secrete information is hiding in with any type of video file.
 Decryption is getting the secrete information from video file.
SYSTEM REQUIREMENTS

SOFTWARE REQUIREMENTS
 operating system - Windows 7
 software programming package - MATLAB R2021a

HARDWARE REQUIREMENTS
 processor type - Pentium-IV processor
 speed - 2.4 GHZ
 ram - 4 GB
 hard disk - 20 GB HD
Video Steganography - Architecture
MODULES

• embedded video
• exracted video
• stego video
• cover video
• encrypted key
SYSTEM ANALYSIS

 EXISTED SYSTEM
The researchers concentrated on enhancing the execution of video steganography by utilizing diverse
strategies.they utilized cryptographic algorithm and the genetic algorithms to hide the secret message that
was compressed to reduce the size.The matter of security becomes more future enhancement feature.
 PROPOSED SYSTEM
The primary objective of this method is to hide a lot of data with a high quality of stego video and
accomplish a high security for the information hiding inside the cover video.For this purpose we can
compute the pixel value by adding an extra bit after the embedding process.
Expected output:

VIDEO STEGOMETER
VIDEO STEGOMETER
Fig.1 Embedding and Extraction panel
Fig.2 Embedding Phase Fig.3 Extraction Phase
CONCLUSION

In this study, a novel method for video steganography is proposed by utilizing a the reverse stego
technique to enhance the LSB method for embedding the data inside the video frame by randomly
selecting the pixels that were utilized for embedding rather than serial selection in the traditional LSB to
increase the security and to prevent the hackers from discovering the pixels that have the secret data.
The experimental results depict that the proposed method is more reliable and secure.we observed
that the estimation of the PSNR is high, while the estimation of the MSE is low when embedding the
video.The estimation of the MSE is increasing, and the estimation of the PSNR is decreased when the
payloads are increasing.which implies that the quality of the video is decreased when the payload of
characters is increased.
In addition, the values of the correlation are near to 1, and this means that the stego videos are closer
to the cover videos.
REFERENCES

• Multidisciplinary Approach to Modern Digital Steganography


Pramanik, Sabyasachi, Ghonge, Mangesh Manikrao, Ravi, Renjith V. · 2021
• Steganography in Digital Media: Principles, Algorithms
Jessica Fridrich · 2010
• Steganography Techniques for Digital Images
Abid Yahya · 2018
• Applied Cryptography and Network Security: Second edition
Markus Jakobsson, Moti Yung, Jianying Zhou · 2004
• Information Hiding: Steganography and Watermarking-Attacks
Neil F. Johnson, Zoran Duric, Sushil Jajodia · 2012
• Advances in Cryptology – EUROCRYPT 2018
Jesper Buus Nielsen, Vincent Rijmen · 2018
• Critical Concepts, Standards, and Techniques in Cyber Forensics
Husain, Mohammad Shahid, Khan, Mohammad Zunnun · 2019
• Advanced Statistical Steganalysis
Rainer Böhme · 2010
• Cryptography and Steganography. A multilayer Data Security
Jagdish Chandra Patni, Hitesh Kumar Sharma · 2021
Information Hiding: 5th International Workshop, IH 2002, ... - Volume 5
Fabien A. P. Petitcolas · 2003Pramanik, Sabyasachi, Ghonge, Mangesh Manikrao,
Ravi, Renjith V. · 2021

You might also like