1 Data Embedding in Scrambled Digital Video for Data Security & Authentication Jamna Kaur1 , Rachna Rajput2 1 M.Tech Student of Guru Kashi University, Talwandi Sabo, jamnaparmarg7@gmail.com 2 Assistant Prof. Guru Kashi University, Talwandi Sabo, Rachnacse12@gmail.com Abstract: As technology advances, multimedia applications increase exponentially in day-to-day life. Multimedia applications such as video telephony, video conferencing, TV, streaming video/audio online, and many other applications are in demand in video industry. Many different video codec standards such as H.261, MPEG-1, MPEG-2, H.263, and H.264 are implemented. The work of this is to first briefly describe about encoding and decoding process, and then it discusses more details about different modules of encoder and decoder, and the related algorithms. In this work video is encoded into different frames, and convert into images where the encoded key is hidden that the private key and security is provided by private key. When the decoding is performed then the encoded frame with private key is automatically selected. Also calculate the Parameter of video. The Dissertation is completed successfully by hiding Digital video data. Keyword: Discrete Cosine Transform, PSNR, MSE, LSB(Least Significant bit). I. INTRODUCTION In various multimedia technologies, security and privacy has become an important. The main goal of cryptography is keeping data secure form unauthorized attackers. Therefore data is encrypted through process of Encryption. Data cryptography mainly is the scrambling of the content of data, such as text, image, audio, video and so forth to make the data unreadable, invisible or unintelligible during transmission or storage called Encryption. The reverse of data encryption is data Decryption, which recuperate the original data. The reverse of data encryption is data decryption with digital video transmission, encryption technologies are needed that can protect digital video from attacks during transmission. Due to the huge size of digital videos, they are usually transmitted in compressed formats such as MPEG. A . Need of Video Encryption Requirements of Video Encryption Nowadays there are many traditional cryptography systems that provide powerfully security encryption methods. However, most of them are not appropriate for video since the amount of video data is much greater than text, for which the traditional cryptography systems were originally designed. The performance of video encryption methods must be evaluated from four requirements like security, complexity, compression overhead and format compliance.For preventing unwanted viewing of transmitted video, for example from law enforcement video surveillance being relayed back to a central viewing centre. To protect the private multimedia messages that is exchanged over the wireless or wired networks. Video Encryption is helpful in securing videos used in services like video on demand (VOD), Video conferencing- learning. B. Data Hiding Techniques (LSB) The least significant bit (in other words, the 8th bit) of some or all of the bytes inside an image is changed to a bit of the secret message. Digital images are mainly of two types (i) 24 bit images. (ii) 8 bit images. In 24 bit images we can embed three bits of information in each pixel, one in each LSB position of the three eight bit values. Increasing or decreasing the value by changing the LSB does not change the appearance of the image. so the resultant image looks almost same as the cover image. In 8 bit images, one bit of information can be hidden. The advantages of LSB techniques are: Popularity, Easy to understand and comprehend, High perceptual transparency, Low degradation in the image quality. However, there are few weaknesses of using LSB. It is very sensitive to any kind of filtering or manipulation of the image .Scaling, rotation, cropping, addition of noise, or lossy compression to the stego-image will destroy the message. On the other hand, for the hiding capacity, the size of information to be hidden relatively depends to the size of the cover- image. II. PARAMETERS USED A. PSNR (Peak Signal-to-Noise Ratio): A high quality image has small value of Peak Signal to Noise Ratio (PSNR) or PSNR is defined as the ratio of signal power to noise 2 power. It basically obtains the gray value difference between resulting image and original image. PSNR is most commonly used to measure the quality of reconstruction of lossy compression code (for image compression). The signal in this case is the original data, and the noise is the error introduced by compression. PSNR is defined as follow: Start Read the input video Dividing the video into frame B. MSE (Mean Square Error): MSE is the sum over all squared value differences divided by image size and by three. Calculate the Frame separation and Convert Frame to image file. n=size (Input Image); M=n(1); N=n(2); MSE = sum(sum((Input ImageReconstructed Image).^2))/(M*N); C. Proposed Algorithm Step 1: Start the program. Step 2: Reads the video and stores it as a image files in a folder Step 3: Calculate the Frame separation and Convert Frame to image file. Step 4: Write image file. Step 5: Apply Encoding on the frames of the video. Apply the LSB technique encoding the video stream after the frame separation. Step 6: Generate the Hexadecimal key for security. Step 7: Apply decoded frame to check for authentication and validation Step 8: Apply the decoding process on video Step 9: PSNR and MSE values and decoded time. Step 10: Stop. Apply the encoding frame and Apply the LSB technique encoding the video stream Generate the Security key Apply decoding on frame to check for authentication and validation Apply the decoding process on video Then Calculate the Parameter. PSNR and MSE values and decoded time. Figure 2: The basic working of the system. 3 RESULT & ANALYSIS Their are different figures that shows how the video is processed and how the system tools works in MATLAB.In this we upload the digiat video. III. Figure 3.4: Frame selection of input video We select a frame frome number of frame .After this Encoding is performed frame. Figure 3.1: First input video that is used to hide the data Figure 3.2: Second input video that is used to hide the data. In this we select the input video and perform frame sepration into 8 8 block .After frame separation number of frames are made . Figure 3.5: Encoding the selected frame When encoding is perform on frame then we encode the video frame by frame.In this Private Key for video security we Generate. By pressing the button Key and this Key is embeded with the encoded frame. Figure 3.3: Browsing the Input video . Figure 3:6: Value of Private Key Private Key = 405fdb1a05093b98 4 encoded key is hidden that the private key. When the decoding is performed then the encoded frame with private key is automatically selected and gives the original frame of the input video that is shown in above snap shorts. In this we calculate decoding time of digital video and also the PSNR and MSE of the digital video after the data scrambling. Video Name Decoding Time PSNR MSE matchvideo.mp4 3.920764 sec 22.2859 384.1368 Pacific Ocean.mp4 14.142753 sec 20.2996 606.9017 Illusion video.mp4 3.833233 sec 5.6684e+03 10.5962 Figure 3.7: Decoded the frame In this after Private Key Generation.We decoded the frame. Result Table: Table of Decoding Time, PSNR and MSE value. IV. Figure 3.8: Decode the video frame by frame. After this validation is performed .if validation is accurate then calculate the parameter of video. Figure 3.9:Calculate the Decoding Time, PSNR and MSE value. In this research work video is encoded into different frames, after encoding the frame is converted into images where the LITERATURE SURVEY There are many algorithms in existence for scrambling of the video frames and to encrypt them. The proposed scheme treats the video as a framing sequence. Secondly an index number is provided for each frame. Then the frames are encrypted to hide the information using thresholding method. Proper keys are used to scramble the frames of the video initially. The content of the frames remains the same. The Grouping Of Pictures (GOP) provides a feature of categorizing the frames and pictures of same size under a particular group.[ref 1]. The watermark embedding is processed in the DCTD. To achieve high performance, the proposed system architecture employs pipeline structure and uses parallelism. This system based watermarking system features low power consumption, low cost implementation, high processing speed, and reliability. In this study we should concentrate on applying the watermarking algorithm to other modern video compression standards, such as MPEG-4/H.264.[ref.2].In This we focuses on the various methods for video Encryption. Fro analysis of Amongst the all different different approaches. According the analysis of Pure 5 Permutation Algorithm , Zig-Zag Permutation Algorithm, Chaos Based Encryption Algorithms, Deformation & formation Algorithms, Video Encryption algorithm (VEA).This analysis selective encryption takes less time as compared to full encryption. Zigzag method & chaos based method are hot research topics for encryption of video but takes more time. Therefore a encryption algorithm based on I-frames & xor has been defined.[ref.3].This technique that uses watermark nesting and encryption. Nesting means it embeds an extra watermark into the main watermark and then embeds the main watermark into the cover image. For encryption XOR operation is used. For embedding watermarked in Cover Image by DWT based technique. By using watermark nesting we can embed more number of bits in the cover image as compare to without watermark nesting. Due to nesting feature we can embed some metadata about watermark also. This technique uses encryption, so it increases the security of watermarks. For instance if watermarking key is hacked still the attacker will not be able to identify the watermark because it is encrypted. [ref.5] V. CONCLUSION The work in this dissertation in terms of the various parameters that have been considered while scrambling the digital video for security.The fact that the proposed method embeds the data directly in the spatial domain (pixel values) makes it immune to some very common errors, which appear in other competitive data hiding techniques working in the compressed domain. In conclusion, the main advantages of the proposed method are its low complexity and the possibility of using the compressed stream for hiding different data many times, without first decoding and then re-encoding the video sequence. This makes the method appropriate for real-time applications. Future work might involve a real time implementation of the system so that the maximum number of videos is enhanced with the help of different filters. In the future work DWT is implemented with hard and soft threshold for data scrambling in digital videos authentications and security. REFERENCES [1] A.Shiva Krishna Reddy ,K. Srimathi, R. Rajalakshmi, “ The Indexing Algorithm for Scrambled Frames in Video Encryption ” International Journal of Advanced Research in Computer Science and Software Engineering Volume 4,February 2014. [2] Sivakami, R. Nagakrishnan, Ellammal “A Digital Watermarking System For Video Authentication using DCT ”,Integrated Journal of Engineering Research and Technology (IJERT) Vol 01 Jan-Feb 2014. [3] Yogita Negi ,”A Survey on Video Encryption Techniques”, International Journal of Emerging Technology and Advanced Engineering Vol 3, Issue 4, April 2013. [4] Mayank Arya Chandra, Ravindra Purwar, Navin Rajpal,”A Novel Approach of Digital Video Encryption”, International Journal of Computer Applications Vol 49, July 2012. [5] Preeti GuptA, “ Cryptography based digital image watermarking algorithm to increase security of watermark data”, International Journal of Scientific & Engineering Research, Vol 3, September 2012. [6] G.Madhuri, B.VijayKumar, V. Sudheer Raja, M. Shasidhar “Data Embedding in Scrambled Digital Video for Security”, Int. J. on Recent Trends in Engineering and Technology, Vol. 6, Nov 2011. [7] Amit Pande, Prasant Mohapatra, Joseph Zambreno,” Using Chaotic Maps for Encrypting Image and Video Content”, IEEE International Symposium on Multimedia, 2011. [8] M. Abomhara,, Omar Zakaria, Othman O. Khalifa, “An Overview of Video Encryption Techniques”, International Journal of Computer Theory and Engineering, Vol. 2, February, 2010. [19] M. Zeghid, M. Machhout, L. Khriji, A. Baganne, and R. Tourki,” A Modified AES Based for Image Encryption”, World Academy of Science, Engineering and Technology , 2007.