Hidding data in video sequence using least significant bit

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume22 Number3- April2015
Hidding data in video sequence using least significant bit
Hembala katoch, M.tech student , Department of ECE, R.I.E.I.T. Railmajra,Ropar, Punjab (India)
Dhiraj kumar, Assistant Professor, Department of ECE, R.I.E.I.T. Railmajra,Ropar, Punjab
(India)
ABSTRACT
A new technique for transmitting secret information
securely has been introduced in this paper. Security of
information is major concern of information technology
and communication. This paper introduces elliptical
curve cryptography and Least Significant bit
substitution technique for hiding data in video file.
Secret message is encrypted using elliptic curve
cryptography prior to being embedded in the cover
video frames. This encrypted message is then embedded
into the frames. The histograms values of the frames are
calculated before and after embedding the message. At
the receiving end, encrypted message is decrypted using
the private key and the original message can be
retrieved. Elliptic curve cryptography algorithm
improves the embedding capacity of stego image, PSNR
value for quality of image and stego video is also
calculated.
KEY WORDS
Video stegnography, cryptography, image hiding,
encryption, PSNR
I
INTRODUCTION
Steganography and cryptography are the two main
methods for information hiding and security.
Although both are similar in the way as both are
used to protect important and secrete information.
Information hiding (steganography) aims at hiding
the existence of the secret message itself [1]. It is
done by hiding the secret data in any innocuous
medium, so that is it not apparent that there is any
data hidden in the cover medium. Cryptography is
the technique which scrambles the secret
information itself so that it cannot be understood
without unscrambling it [1-2]. A cipher is usually
applied in case of cryptography. An excellent way
of information hiding is stegnography, to add
various levels of security to a system it can be
combined with cryptography [3]. In this paper we
have discussed a LSB technique of video
ISSN: 2231-5381
steganography combined with elliptic curve
cryptography algorithm. Least Significant Bit
(LSB) insertion is a common, simple approach to
embedding information in a cover video. Here, the
cover medium is the video file of 25fps and the
secret message is an image. Frames are extracted
from the video, As digital video consists of a set of
frames (images) that are played back at certain
frame rates based on the video standards. So,
Quality of the digital video depends on a set of
parameters such as the number of pixels in a frame,
the fps (frames per second), and frame size. The
fps parameter is almost standard (between 24 and
30 fps) in many common video formats, however,
the other two parameters present several altered
from one video standard to another [4-5]. The
encrypted secret message with elliptic curve
cryptography is hidden in these frames. An
approach to public-key cryptography is elliptic
curve cryptography which is based on the algebraic
structure of elliptic curves over finite fields. In
several integer factorization algorithms elliptic
curves are used that have applications in
cryptography. Public-key cryptography is mainly
based on the high complexity of certain
mathematical problems [6]. Early public-key
systems are secure assuming that it is difficult to
factor a large integer composed of two or more
large prime factors. The entire security of ECC
depends on the ability to compute a point
multiplication and the inability to compute the
multiplicand given the original and product points
[7-8].Normally two keys are generated in this
algorithm public key and private key, public key is
known to public and the private key is known to
the user only. The public key is used for encryption
and the private key for decryption.
http://www.ijettjournal.org
Page 93
International Journal of Engineering Trends and Technology (IJETT) – Volume22 Number3- April2015
II
LITERATURE REVIEW
For studying the concepts of video steganography,
we have surveyed many latest papers. In this
section we have described the relevant papers of
different authors. We thank these authors for
providing the knowledge of video steganography.
These papers were very important to us for
studying the basic concept Arup Kumar Bhaumik,
Minkyu Choi, Rosslin J.Robles, and Maricel
O.Balitanas [9], the main requirements of any data
hiding system are security, capacity and robustness
It is very difficult to archive all these factors
together because these are inversely proportional to
each other. Authors have focuses on maximizing
security and capacity factor of data hiding. The
data hiding method uses high resolution digital
video as a cover signal. It provides the ability to
hide a significant quality of information making it
different from typical data hiding mechanisms.
They have used the large payloads like video in
video and picture in video as a cover image.
Ahmed Ch. Shakir [10], the confidential
communications over public networks can be done
using digital media like text, images, audio and
video on the internet. Simply hiding the contents of
a message using cryptography was not adequate.
Hiding of message should provide an additional
layer of security. To provide the more security the
author suggested the new procedures in
steganography for hiding ciphered Information
inside a digital color bitmap image. He has used
quadratic method depending on the locations
concluded by the binary image, beside of public
key cryptography. He had concluded that the
conjunction
between
cryptography
and
steganography produce immune information.
Andreas Westfield and Gritta Wolf [11], in this
work author have described a steganographic
system which embeds secret messages into a video
stream. Normally the compression methods are
used in video conferences for securing acceptable
quality. But usually, compression methods are
lossy because reconstructed image may not be
identical with the original. There are some
drawback of compression and data embedding
method. Signal noise and irrelevance are common
examples of data embedding. But compression
methods try to remove signal noise and
ISSN: 2231-5381
irrelevance. If signal is compressed more, then
there are fewer possibilities of data embedding.
The author have solved this problem, they have
investigated a typical signal path for data
embedding. Shailender Gupta et al. [12] have
proposed an information hiding scheme for the
least significant bit steganography along with
cryptographic method. In this proposed scheme,the
raw data was encrypted before embedding it into
the image. This system makes use of Rivest,
Shamir, Adleman (RSA) algorithm and the Diffie
Hellman algorithm to encrypt the secret
information. To provide higher security, the secret
value is encrypted and then it was converted to
binary form. Meanwhile, the image pixels were
also converted to binary form and then the
encrypted secret information was embedded into
the image by an LSB encoder. LaxmanTawade et
al. [13] have proposed an efficient data hiding
scheme using secret reference matrices. The data
was hidden in 8 bit grayscale image using 256 X
256 matrix which was constructed by using 4 x 4
table with unreported digits from 0~15.The
proposed method was to improve the holding
capacity of cover image and increase the
complexity to crack the Secret Reference Matrix
(SRM). They also proposed a new spatial domain
data hiding scheme by using a secret reference
matrix (SRM) for data embedding and extraction.
VikasTyagi et al. [14] have proposed a
steganographic method using Least Significant Bit
(LSB) along with a cryptographic algorithm. The
symmetric cryptographic algorithm was used for
encryption of the secret message. This algorithm
uses random size of the key. After converting the
information into secret code or encrypted form it
was patched into the image. For patching the secret
data, the least significant bit of the image was used.
III PROPOSED METHOD
The method we propose here effectively hides the
secret data into a video using the existing
Steganographic techniques combined with elliptic
curve cryptography. A video file is usually
composed of several frames, this method uses
some frames (or images) of the video to hide the
encrypted secret message. The encrypted secret
data is not hidden in sequential frames. Rather,
http://www.ijettjournal.org
Page 94
International Journal of Engineering Trends and Technology (IJETT) – Volume22 Number3- April2015
they are placed in random frames. Hence the
changes in histograms values of each frame that
contains the secret data can be calculated. Finally
the hidden encrypted image is decrypted .This
provides additional security to the secret data.
Cover video
Split into
frames
Frames
LSB
Encrypted
message
Elliptic
curve
cryptography
(encryption)
Public key
Secret message
Stego video
Fig .1:FLOW CHART OF PROPOSED ALGORITHM TO ENCRYPT THE DATA
Stego video
Split into
frames
Frames
Elliptic curve
cryptography
(decryption)
LSB
Secret message
Fig. 2: FLOW CHART OF PROPOSED ALGORITHM TO DECRYPT THE DATA
IV SIMULATION RESULTS
In this proposed paper simulation results have
been evaluated on several cover videos like
Xylophone, Tennis player, Mother and daughter
ISSN: 2231-5381
.The hidden image are Cat, Lena, ect of size
320x240.The image is secured (encrypted) by
elliptic curve cryptography
algorithm. The
encrypted image can be hidden in frames of video
file by using LSB techniques, so that the secret’s
very existence is concealed, also the histograms
http://www.ijettjournal.org
Page 95
International Journal of Engineering Trends and Technology (IJETT) – Volume22 Number3- April2015
value are calculated. Finally the hidden encrypted
image is decrypted and the original image is
retrieved. Fig.3 shows the cover video which is of
1sec.Fig.4 shows the extracted frames 25fps. In fig
.5 the calculated histogram values of the frames
are displayed. The hidden image is shown in
fig.6.The histogram of the frames after hiding the
FIG.3: ORIGINAL VIDEO
500
500
500
500
0
0
0
0
0
100
200
0
100
200
0
100
200
500
500
500
0
0
0
0
0
100
200
0
100
200
0
100
200
500
500
500
0
0
0
0
0
100
200
0
100
200
0
100
200
500
500
500
0
0
0
0
100
200
0
100
200
0
100
200
500
500
500
0
0
0
0
0
100
200
0
100
200
0
100
200
200
0
100
200
0
100
200
0
100
200
0
100
200
0
100
200
0
100
200
500
0
100
200
500
0
0
500
100
500
0
500
0
0
0
500
FIG .4 EXTRACTION OF FRAMES FROM
THE VIDEO
500
0
500
secret encrypted message (steganographic video)
is given in fig.7. Obtained results are shown in
Table: 1 from the obtained results we can conclude
that the embedding capacity in the proposed
algorithm is very good .also, the PSNR in the table
shows the video and image quality is very good.
100
200
500
0
0
100
200
FIG.5: HISTOGRAME OF THE FRAMES
ISSN: 2231-5381
FIG.6: SECRET MESSAGE TO BE
HIDDEN
http://www.ijettjournal.org
Page 96
International Journal of Engineering Trends and Technology (IJETT) – Volume22 Number3- April2015
500
500
500
500
0
0
0
0
0
100
200
500
0
100
200
0
0
100
200
500
100
200
100
200
0
100
200
500
100
200
0
100
200
500
0
100
200
100
200
0
100
200
500
500
500
0
0
0
200
0
100
200
0
100
200
200
0
100
200
0
100
200
0
100
200
0
100
200
500
0
0
100
200
0
100
200
500
0
0
100
200
500
0
100
0
100
0
0
0
500
0
500
0
200
500
500
0
100
0
0
0
0
0
0
500
500
0
0
200
0
0
500
0
100
500
500
0
0
500
0
500
0
0
100
200
FIG.7: HISTOGRAMES OF FRAMES AFTER
HIDDING MESSAGE
Pixel faded in Frames
Proposed algorithm
hidding file
size(byte)
PSNR
Proposed coding
PSNR
1,710
48.11
19,200
52.08
26,265
48.32
38,400
53.41
52,044
48.45
76,800
54.34
Table 1: Obtained results showing the comparison of embedding capacity and PSNR
IV CONCLUSION
REFRENCES
In this paper a novel method for integrating
cryptography and steganography has been
presented. The goal of proposed algorithm is to
encrypt the secret message using elliptic curve
cryptography and a then hide that encrypted
message in the video frames using least significant
bit algorithm. The results showed that the proposed
algorithm makes the secret message more secure,
improves the embedding capacity and PSNR is
very good.
ISSN: 2231-5381
[1]Sashikala Channalli and Ajay Jadhav, “Steganography An
Art of Hiding Data”, International Journal on Computer
Science and Engineering Vol.1(3), 2009, 137-141.
[2]O.CETIIN and A.OZCERIT, “A new Steganography
Algorithm Based on Color Histograms for Data Embedding
into Raw Video Streams”, Elsevier Ltd ,Computers &
Security, Sakarya University, Turkey,Vol.28, pp. 670-682 ,
2009.
[3] M. H. S. Shahreza and M. S. Shahreza, "Arabic/Persian
TextSteganographyUtilizing Similar Letters With Different
Codes", the Arabian Journal for Science and Engineering,
Volume 35, Number 1b pp. 213 - 222, April 2010.
[4]Yang C.H., and Tsai M.H.: `Improving Histogram-based
Reversible Data Hiding by Interleaving Predictions’, IET
Image Processing, 2010, 4, pp. 223-234
[5]Sharma V.K., Shrivastava V.,“A steganography algorithm
for hiding image in image by improved LBS substitution by
http://www.ijettjournal.org
Page 97
International Journal of Engineering Trends and Technology (IJETT) – Volume22 Number3- April2015
minimize detection”, Journal of Theoretical and Applied
Information Technology, Vol. 36, No. 1,pp. 1-8, 2012.
[6] Vijay Kumar Sharma ,Vishal Shrivastav” A steganography
algorithm for hiding image in image by improved LSB
substitution by minimize detection “Journal of Theoretical and
Applied Information Technology 15th February 2012.
[7]Ashwak M. AL-Abiachi, Faudziah Ahmad and Ku Ruhana
―A Competitive Study of Cryptography Techniques over
Block Cipher‖ UKSim 13th IEEE International Conference
on Modelling and Simulation 2011
[8]Kallam Ravindra Babu, Dr. S.Udaya Kumar, Dr. A.Vinaya
Babu, “A Survey on Cryptography and Steganography
Methods for Information Security”, Internaltional Journal of
Computer Applications(0975-8887), Volume 12 – No.
2,November 2010
[9]Ahmed Ch. Shakir,” Steno Encrypted Message in Any
Language for Network Communication Using Quadratic
Method”, Journal of ComputerScience 6 (3): 320-322, 2010
ISSN 1549-3636 © 2010 Science Publications.
ISSN: 2231-5381
[10]Ahmed Ch. Shakir,” Steno Encrypted Message in Any
Language for Network Communication Using Quadratic
Method”, Journal of ComputerScience 6 (3): 320-322, 2010
ISSN 1549-3636 © 2010 Science Publications.
[11] Andreas Westfeld and Gritta Wolf,” Steganography in a
Video Conferencing System”, Information Hiding 1998,
LNCS 1525, pp. 32-47, 1998. Springer-Verlag Berlin
Heidelberg 1998.
[12]Shailender Gupta formation Hiding Using Least
Significant Bit Steganography and Cryptography I.J.Modern
Education and Computer Science, 2012, 6, 27-34 June 2012
[13]LaxmanTawade” Efficient & Secure Data Hiding Using
Secret Reference Matrix International Journal of Network
Security & Its Applications” (IJNSA), Vol.4, No.1, January
2012
[14] Mr . Vikas Tyagi” image Steganographyusng least
significant bit with cryptography “Journal of Global Research
in Computer Science Volume 3, No. 3, March 2012
http://www.ijettjournal.org
Page 98
Download