International Journal of Engineering Trends and Technology (IJETT) – Volume22 Number3- April2015 Hidding data in video sequence using least significant bit Hembala katoch, M.tech student , Department of ECE, R.I.E.I.T. Railmajra,Ropar, Punjab (India) Dhiraj kumar, Assistant Professor, Department of ECE, R.I.E.I.T. Railmajra,Ropar, Punjab (India) ABSTRACT A new technique for transmitting secret information securely has been introduced in this paper. Security of information is major concern of information technology and communication. This paper introduces elliptical curve cryptography and Least Significant bit substitution technique for hiding data in video file. Secret message is encrypted using elliptic curve cryptography prior to being embedded in the cover video frames. This encrypted message is then embedded into the frames. The histograms values of the frames are calculated before and after embedding the message. At the receiving end, encrypted message is decrypted using the private key and the original message can be retrieved. Elliptic curve cryptography algorithm improves the embedding capacity of stego image, PSNR value for quality of image and stego video is also calculated. KEY WORDS Video stegnography, cryptography, image hiding, encryption, PSNR I INTRODUCTION Steganography and cryptography are the two main methods for information hiding and security. Although both are similar in the way as both are used to protect important and secrete information. Information hiding (steganography) aims at hiding the existence of the secret message itself [1]. It is done by hiding the secret data in any innocuous medium, so that is it not apparent that there is any data hidden in the cover medium. Cryptography is the technique which scrambles the secret information itself so that it cannot be understood without unscrambling it [1-2]. A cipher is usually applied in case of cryptography. An excellent way of information hiding is stegnography, to add various levels of security to a system it can be combined with cryptography [3]. In this paper we have discussed a LSB technique of video ISSN: 2231-5381 steganography combined with elliptic curve cryptography algorithm. Least Significant Bit (LSB) insertion is a common, simple approach to embedding information in a cover video. Here, the cover medium is the video file of 25fps and the secret message is an image. Frames are extracted from the video, As digital video consists of a set of frames (images) that are played back at certain frame rates based on the video standards. So, Quality of the digital video depends on a set of parameters such as the number of pixels in a frame, the fps (frames per second), and frame size. The fps parameter is almost standard (between 24 and 30 fps) in many common video formats, however, the other two parameters present several altered from one video standard to another [4-5]. The encrypted secret message with elliptic curve cryptography is hidden in these frames. An approach to public-key cryptography is elliptic curve cryptography which is based on the algebraic structure of elliptic curves over finite fields. In several integer factorization algorithms elliptic curves are used that have applications in cryptography. Public-key cryptography is mainly based on the high complexity of certain mathematical problems [6]. Early public-key systems are secure assuming that it is difficult to factor a large integer composed of two or more large prime factors. The entire security of ECC depends on the ability to compute a point multiplication and the inability to compute the multiplicand given the original and product points [7-8].Normally two keys are generated in this algorithm public key and private key, public key is known to public and the private key is known to the user only. The public key is used for encryption and the private key for decryption. http://www.ijettjournal.org Page 93 International Journal of Engineering Trends and Technology (IJETT) – Volume22 Number3- April2015 II LITERATURE REVIEW For studying the concepts of video steganography, we have surveyed many latest papers. In this section we have described the relevant papers of different authors. We thank these authors for providing the knowledge of video steganography. These papers were very important to us for studying the basic concept Arup Kumar Bhaumik, Minkyu Choi, Rosslin J.Robles, and Maricel O.Balitanas [9], the main requirements of any data hiding system are security, capacity and robustness It is very difficult to archive all these factors together because these are inversely proportional to each other. Authors have focuses on maximizing security and capacity factor of data hiding. The data hiding method uses high resolution digital video as a cover signal. It provides the ability to hide a significant quality of information making it different from typical data hiding mechanisms. They have used the large payloads like video in video and picture in video as a cover image. Ahmed Ch. Shakir [10], the confidential communications over public networks can be done using digital media like text, images, audio and video on the internet. Simply hiding the contents of a message using cryptography was not adequate. Hiding of message should provide an additional layer of security. To provide the more security the author suggested the new procedures in steganography for hiding ciphered Information inside a digital color bitmap image. He has used quadratic method depending on the locations concluded by the binary image, beside of public key cryptography. He had concluded that the conjunction between cryptography and steganography produce immune information. Andreas Westfield and Gritta Wolf [11], in this work author have described a steganographic system which embeds secret messages into a video stream. Normally the compression methods are used in video conferences for securing acceptable quality. But usually, compression methods are lossy because reconstructed image may not be identical with the original. There are some drawback of compression and data embedding method. Signal noise and irrelevance are common examples of data embedding. But compression methods try to remove signal noise and ISSN: 2231-5381 irrelevance. If signal is compressed more, then there are fewer possibilities of data embedding. The author have solved this problem, they have investigated a typical signal path for data embedding. Shailender Gupta et al. [12] have proposed an information hiding scheme for the least significant bit steganography along with cryptographic method. In this proposed scheme,the raw data was encrypted before embedding it into the image. This system makes use of Rivest, Shamir, Adleman (RSA) algorithm and the Diffie Hellman algorithm to encrypt the secret information. To provide higher security, the secret value is encrypted and then it was converted to binary form. Meanwhile, the image pixels were also converted to binary form and then the encrypted secret information was embedded into the image by an LSB encoder. LaxmanTawade et al. [13] have proposed an efficient data hiding scheme using secret reference matrices. The data was hidden in 8 bit grayscale image using 256 X 256 matrix which was constructed by using 4 x 4 table with unreported digits from 0~15.The proposed method was to improve the holding capacity of cover image and increase the complexity to crack the Secret Reference Matrix (SRM). They also proposed a new spatial domain data hiding scheme by using a secret reference matrix (SRM) for data embedding and extraction. VikasTyagi et al. [14] have proposed a steganographic method using Least Significant Bit (LSB) along with a cryptographic algorithm. The symmetric cryptographic algorithm was used for encryption of the secret message. This algorithm uses random size of the key. After converting the information into secret code or encrypted form it was patched into the image. For patching the secret data, the least significant bit of the image was used. III PROPOSED METHOD The method we propose here effectively hides the secret data into a video using the existing Steganographic techniques combined with elliptic curve cryptography. A video file is usually composed of several frames, this method uses some frames (or images) of the video to hide the encrypted secret message. The encrypted secret data is not hidden in sequential frames. Rather, http://www.ijettjournal.org Page 94 International Journal of Engineering Trends and Technology (IJETT) – Volume22 Number3- April2015 they are placed in random frames. Hence the changes in histograms values of each frame that contains the secret data can be calculated. Finally the hidden encrypted image is decrypted .This provides additional security to the secret data. Cover video Split into frames Frames LSB Encrypted message Elliptic curve cryptography (encryption) Public key Secret message Stego video Fig .1:FLOW CHART OF PROPOSED ALGORITHM TO ENCRYPT THE DATA Stego video Split into frames Frames Elliptic curve cryptography (decryption) LSB Secret message Fig. 2: FLOW CHART OF PROPOSED ALGORITHM TO DECRYPT THE DATA IV SIMULATION RESULTS In this proposed paper simulation results have been evaluated on several cover videos like Xylophone, Tennis player, Mother and daughter ISSN: 2231-5381 .The hidden image are Cat, Lena, ect of size 320x240.The image is secured (encrypted) by elliptic curve cryptography algorithm. The encrypted image can be hidden in frames of video file by using LSB techniques, so that the secret’s very existence is concealed, also the histograms http://www.ijettjournal.org Page 95 International Journal of Engineering Trends and Technology (IJETT) – Volume22 Number3- April2015 value are calculated. Finally the hidden encrypted image is decrypted and the original image is retrieved. Fig.3 shows the cover video which is of 1sec.Fig.4 shows the extracted frames 25fps. In fig .5 the calculated histogram values of the frames are displayed. The hidden image is shown in fig.6.The histogram of the frames after hiding the FIG.3: ORIGINAL VIDEO 500 500 500 500 0 0 0 0 0 100 200 0 100 200 0 100 200 500 500 500 0 0 0 0 0 100 200 0 100 200 0 100 200 500 500 500 0 0 0 0 0 100 200 0 100 200 0 100 200 500 500 500 0 0 0 0 100 200 0 100 200 0 100 200 500 500 500 0 0 0 0 0 100 200 0 100 200 0 100 200 200 0 100 200 0 100 200 0 100 200 0 100 200 0 100 200 0 100 200 500 0 100 200 500 0 0 500 100 500 0 500 0 0 0 500 FIG .4 EXTRACTION OF FRAMES FROM THE VIDEO 500 0 500 secret encrypted message (steganographic video) is given in fig.7. Obtained results are shown in Table: 1 from the obtained results we can conclude that the embedding capacity in the proposed algorithm is very good .also, the PSNR in the table shows the video and image quality is very good. 100 200 500 0 0 100 200 FIG.5: HISTOGRAME OF THE FRAMES ISSN: 2231-5381 FIG.6: SECRET MESSAGE TO BE HIDDEN http://www.ijettjournal.org Page 96 International Journal of Engineering Trends and Technology (IJETT) – Volume22 Number3- April2015 500 500 500 500 0 0 0 0 0 100 200 500 0 100 200 0 0 100 200 500 100 200 100 200 0 100 200 500 100 200 0 100 200 500 0 100 200 100 200 0 100 200 500 500 500 0 0 0 200 0 100 200 0 100 200 200 0 100 200 0 100 200 0 100 200 0 100 200 500 0 0 100 200 0 100 200 500 0 0 100 200 500 0 100 0 100 0 0 0 500 0 500 0 200 500 500 0 100 0 0 0 0 0 0 500 500 0 0 200 0 0 500 0 100 500 500 0 0 500 0 500 0 0 100 200 FIG.7: HISTOGRAMES OF FRAMES AFTER HIDDING MESSAGE Pixel faded in Frames Proposed algorithm hidding file size(byte) PSNR Proposed coding PSNR 1,710 48.11 19,200 52.08 26,265 48.32 38,400 53.41 52,044 48.45 76,800 54.34 Table 1: Obtained results showing the comparison of embedding capacity and PSNR IV CONCLUSION REFRENCES In this paper a novel method for integrating cryptography and steganography has been presented. The goal of proposed algorithm is to encrypt the secret message using elliptic curve cryptography and a then hide that encrypted message in the video frames using least significant bit algorithm. The results showed that the proposed algorithm makes the secret message more secure, improves the embedding capacity and PSNR is very good. ISSN: 2231-5381 [1]Sashikala Channalli and Ajay Jadhav, “Steganography An Art of Hiding Data”, International Journal on Computer Science and Engineering Vol.1(3), 2009, 137-141. [2]O.CETIIN and A.OZCERIT, “A new Steganography Algorithm Based on Color Histograms for Data Embedding into Raw Video Streams”, Elsevier Ltd ,Computers & Security, Sakarya University, Turkey,Vol.28, pp. 670-682 , 2009. [3] M. H. S. Shahreza and M. S. Shahreza, "Arabic/Persian TextSteganographyUtilizing Similar Letters With Different Codes", the Arabian Journal for Science and Engineering, Volume 35, Number 1b pp. 213 - 222, April 2010. [4]Yang C.H., and Tsai M.H.: `Improving Histogram-based Reversible Data Hiding by Interleaving Predictions’, IET Image Processing, 2010, 4, pp. 223-234 [5]Sharma V.K., Shrivastava V.,“A steganography algorithm for hiding image in image by improved LBS substitution by http://www.ijettjournal.org Page 97 International Journal of Engineering Trends and Technology (IJETT) – Volume22 Number3- April2015 minimize detection”, Journal of Theoretical and Applied Information Technology, Vol. 36, No. 1,pp. 1-8, 2012. [6] Vijay Kumar Sharma ,Vishal Shrivastav” A steganography algorithm for hiding image in image by improved LSB substitution by minimize detection “Journal of Theoretical and Applied Information Technology 15th February 2012. [7]Ashwak M. AL-Abiachi, Faudziah Ahmad and Ku Ruhana ―A Competitive Study of Cryptography Techniques over Block Cipher‖ UKSim 13th IEEE International Conference on Modelling and Simulation 2011 [8]Kallam Ravindra Babu, Dr. S.Udaya Kumar, Dr. A.Vinaya Babu, “A Survey on Cryptography and Steganography Methods for Information Security”, Internaltional Journal of Computer Applications(0975-8887), Volume 12 – No. 2,November 2010 [9]Ahmed Ch. Shakir,” Steno Encrypted Message in Any Language for Network Communication Using Quadratic Method”, Journal of ComputerScience 6 (3): 320-322, 2010 ISSN 1549-3636 © 2010 Science Publications. ISSN: 2231-5381 [10]Ahmed Ch. Shakir,” Steno Encrypted Message in Any Language for Network Communication Using Quadratic Method”, Journal of ComputerScience 6 (3): 320-322, 2010 ISSN 1549-3636 © 2010 Science Publications. [11] Andreas Westfeld and Gritta Wolf,” Steganography in a Video Conferencing System”, Information Hiding 1998, LNCS 1525, pp. 32-47, 1998. Springer-Verlag Berlin Heidelberg 1998. [12]Shailender Gupta formation Hiding Using Least Significant Bit Steganography and Cryptography I.J.Modern Education and Computer Science, 2012, 6, 27-34 June 2012 [13]LaxmanTawade” Efficient & Secure Data Hiding Using Secret Reference Matrix International Journal of Network Security & Its Applications” (IJNSA), Vol.4, No.1, January 2012 [14] Mr . Vikas Tyagi” image Steganographyusng least significant bit with cryptography “Journal of Global Research in Computer Science Volume 3, No. 3, March 2012 http://www.ijettjournal.org Page 98