Abstract - Technofist

A Novel Video Stegonography based on Non Uniform
Rectangular Partition
This paper proposes a novel Video Steganography which can hide an uncompressed secret video
stream in a host video stream with almost the same size. Each frame of the secret video will be
Non-uniform rectangular partitioned and the partitioned codes obtained can be an encrypted
version of the original frame. These codes will be hidden in the Least 4 Significant Bits of each
frames of the host video. Experimental results showed that this algorithm can hide a same-size
video in the host video without obvious distortion in the host video.
Literature Survey:
Steganography is the art of hiding the fact that communication is taking place, by hiding
information in other information. Many different carrier file formats can be used, but digital
images are the most popular because of their frequency on the Internet. For hiding secret
information in images, there exists a large variety of steganographic techniques some are more
complex than others and all of them have respective strong and weak points. Different
applications have different requirements of the steganography technique used. For example,
some applications may require absolute invisibility of the secret information, while others
require a larger secret message to be hidden. This paper intends to give an overview of image
steganography, its uses and techniques. It also attempts to identify the requirements of a good
steganographic algorithm and briefly reflects on which steganographic techniques are more
suitable for which applications.
2. On The Limits of Steganography
In this paper, we clarify what steganography is and what it can do. We contrast it with the related
disciplines of cryptography and traffic security, present a unified terminology agreed at the first
international workshop on the subject, and outline a number of approaches |many of them
developed to hide encrypted copyright marks or serial numbers in digital audio or video. We then
present a number of attacks, some new, on such information hiding schemes. This leads to a
discussion of the formidable obstacles that lie in the way of a general theory of information
hiding systems (in the sense that Shannon gave us a general theory of secrecy systems).
However, theoretical considerations lead to ideas of practical value, such as the use of parity
checks to amplify covertness and provide public key steganography. Finally, we show that public
key information hiding systems exist, and are not necessarily constrained to the case where the
warden is passive.
Existing System:
DATA hiding in digital images and raw video have wide literature. In case the data is extracted,
it will be encrypted. But still there is a chance that the intruder can break the code.
However, we find that in most existing approaches, the choice of embedding positions within a
cover image mainly depends on a pseudorandom number generator without considering the
relationship between the image content itself and the size of the secret message.
We find that the existing PVD (Pixel value differentiation)-based approaches cannot make full
use of edge information for data hiding, and they are also poor at resisting some statistical
Proposed System:
The method proposed in this paper is one kind of domain method which tries to get a data-hiding
capacity without causing obvious distortion in the host video stream. Therefore a video stream
can be embedded into the host video stream after encoding the secret video by applying the nonuniform rectangular partition. The coding process can be controlled by some key parameters
which can be treated as the encryption key and this can increase the difficulty from being steg
The implementation process is almost totally different for the two following main points:
a. Adaptive non-uniform rectangular partition is used (i.e) key is embed in the video frames.
b. Partition information of the hidden image is recorded and carried by the open host image.
Image Steganography algorithm:
In order to investigate the feasibility and effect of the proposed image Steganography algorithm,
many experiments have been done. Each group gives (a) the hidden image, that is the original
image itself, (b) the disguising image or host image, chosen arbitrarily and is significantly
different from the hidden image, (c) the disguising image with information of the hidden image,
(d) the reconstructed image, whose quality depends on the actual problem and the subjective
1 Encryption module:
Allows trusted users to access sensitive information while traversing untrusted networks, it is
highly useful for users. The services and users are limited in their tunnel traffic.
2. Protection and Detection mode:
Easy testing of new rules in a live environment without disrupting the current security policy is
supported. Rule sets are applied by deploying them in Protection mode to enforce secure
behavior, permit or deny traffic and seal web application parameters against modification. Rule
sets are tested by deploying them in Detection mode to evaluate them against traffic and log
actions without enforcing them.
3. Encoding and Decoding Image Steganography:
We have chosen this stage because its contents are processed internally during the image
encoding/ decoding which makes it hard to be detected by image steganalysis methods and is
lossless coded, thus it is not prone to quantization distortions. The data bits of the message are
hidden in some of the image whose magnitude is above a predefined threshold. A single bit is
hidden in the least significant bit of the larger component of each image.
4 Data hiding through image:
Finally, Admin encrypt the key and embed in the image send to the newly registered member
who is the authenticated. After receiving the key to the authenticated he has only the permission
to take the key when extract the image.
5 Video Steganography based on image Steganography:
We extend the image hidden technique to video one. Here we simply consider the steganography
in the uncompressed video. That means we try to hide a key in video with almost the same size.
The main idea is that we treat each frame of the videos as the images and apply the image
steganography for each frame with some necessary mechanism.
System Requirements:
Hardware Requirements:
: Pentium IV 2.4 GHz.
Hard Disk
: 40 GB.
Floppy Drive
: 1.44 Mb.
: 15 VGA Colour.
: Logitech.
: 512 Mb.
Software Requirements:
Operating system
: – Windows XP.
Coding Language
: Java
Data Base
: File System