International Journal of Science, Engineering and Technology Research (IJSETR) Volume 3, Issue5, May 2014 Secured Data Hiding System using Video Steganography Zun Moe Oo1, Su Wai Phyo2 Department of Information Technology Abstract—Computer technology and the Internet have made a breakthrough in the existence of data communication. This has opened a whole new way of implementing steganography to ensure secure data transfer. Steganography is the fine art of hiding the information. Hiding the message in the carrier file enables the deniability of the existence of any message at all. The proposed system designs a stego machine to develop a steganographic application to hide data containing text in a computer video file and to retrieve the hidden information. This can be designed by embedding text file in a video file in such a way that the video does not lose its functionality using Least Significant Bit (LSB) modification method. This method applies imperceptible modifications. This work proposes data security system using LSB based steganography and digital envelope. To create the digital envelope, RC4 and RSA algorithm are effectively combined in the proposed system. The system is implemented by C# programming language. Keywords- - Cryptography, Steganography, Least Significant Bit (LSB), RC4 stream cipher, Rivest-Sharmir-Adleman (RSA) Algorithm I. INTRODUCTION igital communication has become an essential part of infrastructure nowadays, a lot of applications are Internet-based and in some cases it is desired that communication be made secret. Consequently, the security of information has become a fundamental issue, many of the techniques are available to achieve this goal some of them are the Encryption and the steganography techniques. Using cryptography, the information is transformed into some other gibberish form and then the encrypted information is transmitted. Steganography is a process that involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then be sent to a receiver without anyone else knowing that it contains a hidden message [1]. Steganography is mostly used on computers with digital data being the carriers and networks being the high speed delivery channels. Modern steganography is generally understood to deal with electronic media rather than physical objects and texts. This makes sense for a number of reasons. First of all, because the size of the information is generally (necessarily) quite small compared to the size of the data in which it must be hidden (the cover file), electronic media are much easier to manipulate in order to hide data and extract messages. Secondly, extraction itself can be automated when the data is electronic, since computers can efficiently manipulate the data and execute the algorithms necessary to retrieve the messages. Electronic data also often includes redundant, unnecessary, and unnoticed data spaces which can be manipulated in order to hide messages [1]. D II.FRAMEWORK OF STEGANOGRAPHY MODEL In general, the basic framework of the steganography model consists of two main processes, namely the embedding process and the extracting process. The main function of the embedding process is to hide the secret message, called embedded message, in a given cover, called cover-file. In hidden communication techniques, the cover file is no more than an innocent (unrelated to the embedded message) piece of information that is used to hide the secret information. A secret key, called stego-key is used in the embedding process such that it makes the embedded message computationally infeasible to extract without possessing this key. The output of the embedding process is called stego-file, which is the original file holding the hidden secret message. This output becomes, at the other end, the input of the extracting process, in which the embedded message is extracted from the stego file to complete the hidden communication process. Since the stego-key is used in the embedding process, it needs to be used in the extracting process [3]. III. VIDEO STEGANOGRAPHY AND SECURITY Data Hiding is the process of secretly embedding information inside a data source without changing its perceptual quality. Data Hiding is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes there is a hidden message. Generally, in Data Hiding, the actual information is not maintained in its original format and thereby it is converted into an alternative equivalent multimedia file like image, video or audio which in turn is being hidden within another object. This apparent message is sent through the network to the recipient, where the actual message is separated from it. The requirements of any data hiding system can be categorized into security, capacity and robustness. All these factors are inversely proportional to each other creating the so called data hiding dilemma. The focus of this paper aims at maximizing the first two factors of data hiding i.e. security and capacity. The proposed scheme is a data-hiding method that uses high resolution digital video as a cover signal. The proposed recipient need only process the required steps in order to reveal the message; otherwise the existence of the hidden information is virtually undetectable. The proposed scheme provides the ability to hide a significant quality of information making it different from typical data hiding mechanisms because this paper is focused on text-in-video. The purpose of hiding such information depends on the application and the needs of the owner/user of the digital media. Data hiding requirements include the following: a. Imperceptibility- The video with data and original data source should be perceptually identical. 1 All Rights Reserved © 2014 IJSETR International Journal of Science, Engineering and Technology Research (IJSETR) Volume 3, Issue5,Mayy 2014 b. Robustness- The embedded data should survive any processing operation the host signal goes through and preserve its fidelity. c. Capacity-Maximize data embedding payload. d. Security- Security is in the key. Data Hiding is the different concept than cryptography, but uses some of its basic principles [4]. In this system, RC4 encryption algorithm, RSA public key algorithm and LSB insertion techniques are used. simply iterate 256 times the following actions after initializing i and j to 0: compute j = j + S[i] + key[i mod key length] swap S[i] and S[j] increment i IV. SYMMETRIC KEY CRYPTOGRAPHY With symmetric key cryptography, a single key is used for both encryption and decryption. As shown in Figure 1. Secret key cryptography schemes are generally categorized as being either stream ciphers or block ciphers. Stream ciphers operate on a single bit (byte or computer word) at a time and block cipher encrypts one block of data at a time using the same key on each block. Once i has reached 256 (the 256 iterations were completed), the S array has been properly initialized. Now that the S array is generated, it is used in the next step of the RC4 algorithm to generate the keystream. Figure 1. Symmetirc key crypto system The sender uses the key to encrypt the plaintext and sends the cipher text to the receiver. The receiver applies the same key to decrypt the message and recover the plaintext. Because a single key is used for both functions, secret key cryptography is also called symmetric encryption. This system will use RC4 stream cipher algorithm and RSA public key algorithm. A. RC4 Algorithm RC4 like as a streaming cipher encrypts plaintext one byte at a time, but also can be designed to encrypt one bit a time or even units larger than a byte at a time. In this structure a key is input to a pseudorandom bit generator that produces a stream of 8-bit numbers that are supposed to be truly random, the pseudorandom stream can’t be predicted without knowledge of the input key. The output of the generator is called a key stream .It is combined one byte a time with the plain text stream using the bitwise exclusive-OR (XOR) operation [6]. RC4 is the most widely deployed commercial stream cipher, having applications in network protocols such as SSL, WEP, WPA and in Microsoft Windows, Apple OCE, Secure SQL etc. It was designed in 1987 by Ron Rivest for RSA Data Security. The cipher consists of two major components, the Key Scheduling Algorithm (KSA) and the Pseudo-Random Generation Algorithm (PRGA) [7]. 1) Key Scheduling Algorithm (KSA): As explained before, the key-scheduling algorithm is used to generate the permutation array. The first step of this algorithm consist in initializing the S table with the identity permutation: the values in the array are equal to their index. Once the S array is initialized, the next step consists in shuffling the array using the key to make it a permutation array [2]. To do so, one 2) Stream Generation: This step of the algorithm consists in generating a keystream of the size of the message to encrypt. This algorithm enables us to generate a keystream of any size. To do so, first initialize the two indexes to 0 and we then start the generation of the keystream one byte at a time until we reached the size of the message to encrypt. For each new byte to compute, the following actions will do [2]: Compute new value of i and j: i := (i + 1) % 256 j := (j + S[i]) % 256 Swap S[i] and S[j] to have a dynamic state (it makes it obviously harder to crack than if the state was computed only once and use for the generation of the whole keystream) Retrieve the next byte of the keystream from the S array at the index S[i]+S[j]% 256 3) Encryption and Decryption of RC4: Once the keystream has been generated, the encryption of the plaintext is really simple: it simply consists of a XOR between the plaintext and the keystream. As for the decryption, it is as simple as the encryption, the ciphertext with the keystream. V.PUBLIC KEY CRYPTOGRAPHY Public-key cryptography is also known as asymmetric-key cryptography, to distinguish it from the symmetric-key cryptography. Encryption and decryption are carried out 2 All Rights Reserved © 2014 IJSETR International Journal of Science, Engineering and Technology Research (IJSETR) Volume 3, Issue5, May 2014 using two different keys. The two keys in such a key pair are referred to as the public key and the private key. (10100110 (11010010 11000100 10101101 00001100) 01100011) When the letter A, which binary representation is 01000001 and is embedded into the least significant bits of this part of the image, the resulting grid is as follows: Figure 2 . Public Key Cryptography A. RSA Public Key Algorithm Ron Rivest, Adi Shamir and Len Adleman developed the algorithm and gave the implementation details in the year 1978. Since then, Rivest-Shamir-Adleman (RSA) scheme it is considered as the only widely accepted and implemented general-purpose approach to public-key encryption [5]. RSA algorithm is a block cipher technique in which plain text and ciphertext are integers between ‘0’ and ‘n-1’ from some ‘n’. In RSA algorithm encryption and decryption are of following form, for some plain text M and cipher text C: C = Me mod n M = Cd mod n Both sender and receiver must know the value of ‘n’. The sender knows the value of ‘e’ and only receiver knows the value of‘d’. Thus, this is a public-key encryption algorithm with a public key of KU= {e, n} and private key of KR={d, n}. For the algorithm to be satisfactory for public-key encryption, the following requirement must be met 1. It is possible to find values of e, d, n such that M^ed = M mod n for all M<n. 2. It is relatively easy to calculate M^e and C^d for all values of M<n. 3. It is infeasible to determine d given e and n. The key generation process is as follows Select p and q (p and q are prime numbers) Calculate n = p x q Calculate ϕ (n) = (p-1) x (q-1) Select integer e gcd(ϕ (n),e)=1; 1<e< ϕ (n); e and ϕ (n) are relative prime Calculate d where d = e-1 mod ϕ (n) Public key KU = {e,n} Private key KR = {d,n} VI.LEAST SIGNIFICANT BIT INSERTION METHOD Least Significant Bit (LSB) insertion is a common, simple approach to embedding information in a cover video. Video is converted into a number of frames, and then convert each frame into an image. After that, the Least Significant Bit of some or all of the bytes inside an image is changed to a bit of each of the Red, Green and Blue color components can be used, since they are each represented by a byte. In other words one can store 3 bit in each pixel. An 800*600 pixel image can store a total amount of 1,440,000 bits or 180,000 bytes of embedded data. For example a grid for 3 pixels of a 24 bit image can be as follows: (00101101 00011100 11011100) (00101100 00011101 11011100) (10100110 11000100 00001100) (11010010 10101101 01100011) Although the letter was embedded into the first 8 bytes of the grid, only the 2 highlighted bits need to be changed according to the embedded message. On average only half of the bit in an image will need to be modified to hide a secret message using the maximum cover size. This paper is designed to embed the text into the video signal and to convert the text data into the binary format. Binary conversions is done by taking the ASCII value of the character and converting those ASCII values into binary format and takes the binary representation of samples of cover signal and insert the binary representation of text into that cover signal. The LSB bits of video signals are substituted by the binary bits of data and this encoded signal is called stego signal is ready for transmission. For the steganography the important video format is Audio Video Interleave (AVI). The message to hide is converted into ASCII and then converted into its binary representation with each word consist of 8 bits. These bits are substituted in the Least Significant Bits of binary representation of each image ample [8]. VII. AUDIO VIDEO INTERLEAF (AVI) FORMAT AVI means Audio Video Interleave, is a multimedia container format introduced by Microsoft in November 1992 as part of its Video for Windows technology. AVI files can contain both audio and video data in a file container that allows synchronous audio-with-video playback. Like the DVD video format, AVI files support multiple streaming audio and video, although these features are seldom used. The AVI file type is primarily associated with 'Audio Video Interleave File'. Recent files might be compressed with one or another codecs (like DivX and XviD). It can also be seen with VLC Player, MPlayer and KMPlayer. VIII. PROPOSED SYSTEM DESIGN The proposed system design involves two parts sender side and receiver side. In the sender side (Figure 3), the sender firstly encrypts the message using RC4 stream cipher. And then the RC4 key is encrypted using RSA public key cryptosystem with receiver public key. Finally the encrypted message and RC4 key are embedded into the AVI video using LSB based video stegnography and then sent to the receiver. Figure 3. Encryption process of system design 3 All Rights Reserved © 2014 IJSETR International Journal of Science, Engineering and Technology Research (IJSETR) Volume 3, Issue5,Mayy 2014 In the receiver side (Figure 4), firstly it is extracted the encrypted message and RC4 key from the AVI video file. And then the RC4 key is recovered by using RSA public key cryptosystem and receiver’s private key. After that the receiver decrypts the message with RC4 key to recover the original message. Figure 4. Decryption Process of System Design IX. TEST AND RESULT The following results are generated by implementing the proposed system. In this paper, the results are displayed a series of interface by choosing manuscript. Figure 7. Message and Key Encryption with RC4 and RSA Algorithm The embedding processing is shown in Figure 8. Figure 5. Welcome Form Figure 8. Hiding Message into Cover AVI File Firstly, the user can see the welcome form as main interface and can continue RSA Key Generation form by choosing keys on the menu and keys are auto generated by pressing Generate button and can save the public and private keys using Save buttons as shown in figure 6. X. CONCLUSION Many data from where such as military, hospital, bank and business need security while communicating between people and activities. Symmetric encryption algorithms can solve the problems of the information security with the security keys. Symmetric key algorithms are faster and easier to be implemented than the asymmetric key algorithms. This system proves which algorithm is appropriate for each data type. XI.REFERENCES Figure 6. RSA Key Generation Form As figure, the user can choose sender side by clicking Sender on the menu and the encryption processes are appeared as in Figure 7. [1] T. Morkel, J.H.P. Eloff and M.S. Olivier, “An Overview of Image Steganography”, in Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005), Sandton, South Africa, June/July 2005. [2] Quentin Galvane, Baptiste Uzel, “Cryptography-RC4 Alogrithm”, February 18,2012. [3] A. H. Ouda and M. R. El-Sakka, “A Step Towards Practical Steganography Systems”, Computer Science Department, University of Western Ontario, London, Ontario, Canada, ICIAR 2005, LNCS 3656, pp. 1158 – 1166, 2005. [4] Arup Kumar Bhaumik, Minkyu Choi, Rosslin J.Robles and Maricel O.Ba Litanas, “Data Hiding in Video”,Vol.2, No.2, June 2009. [5] Bhaskar Bora, “Implementation of RSA Algorithm”, March 2,2003,Bangalore, India. [6] Alaa M.Riad, A., Elminir K.Hamdy, M.,Taha R.Ibrahim, “EVALUATION OF THE RC4 ALGORITHM AS A SOLUTION FOR CONVERGE NETWORKS”,Vol.60,No.3,2009,155-160. 4 All Rights Reserved © 2014 IJSETR International Journal of Science, Engineering and Technology Research (IJSETR) Volume 3, Issue5, May 2014 [7] Souuav Sen Gupta, S., Gowtam Paul, S., “(Non-) Random Sequences from (Non-) Random Permutations-Analysis of RC4 Stream Cipher”, FSE, SAC, 2011. [8] MrithaRamalingam, “Stegomachine – Video Steganography using Modified LSB Algorithm”, 2011 [9] http://www.winxdvd.com/resource/avi.htm. Authors First Author – Zun Moe Oo,zunmoechaw@gmail.com Second Author- Su Wai Phyo, suwaiphyo@gmail.com 5 All Rights Reserved © 2014 IJSETR