Académique Documents
Professionnel Documents
Culture Documents
Presented By:
This paper proposes a novel Video Steganography which can hide an uncompressed secret video stream in a host video stream with almost the same size
Each frame of the secret video will be Non-uniform rectangular partitioned and the partitioned codes obtained can be an encrypted version of the original frame.
These codes will be hidden in the Least 4 Significant Bits of each frames of the host video.
Experimental results showed that this algorithm can hide a same-size video in the host video without obvious distortion in the host video.
Literature survey is the most important step in software development process. Before developing the tool it is necessary to determine the time factor, economy n company strength.
Once these things r satisfied, ten next steps are to determine which operating system and language can be used for developing the tool.
Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet.
For example, some applications may require absolute invisibility of the secret information, while others require a larger secret message to be hidden.
This paper intends to give an overview of image steganography, its uses and
techniques.
We then present a number of attacks, some new, on such information hiding schemes.
Finally, we show that public key information hiding systems exist, and are not necessarily constrained to the case where the warden is passive.
Data hiding in digital images and raw video have wide literature. In case the data is extracted, it will be encrypted. But still there is a chance that the intruder can break the code.
However, we find that in most existing approaches, the choice of embedding positions within a cover image
Mainly depends on a pseudorandom number generator without considering the relationship between the image content itself and the size of the secret message.
Proposed System
1. The method proposed in this paper is one kind of domain method which tries to get a data-hiding capacity without causing obvious distortion in the host video stream 2. Therefore a video stream can be embedded into the host video stream after encoding the secret video by applying the non-uniform rectangular partition.
3. The coding process can be controlled by some key parameters which can be treated as
the encryption key and this can increase the difficulty from being steg analyzed.
Software Requirement
Processor
Pentium-IV Or Latest
Speed
RAM
:
:
1.1GHz
512MB
Hard Disk
General
:
:
40GB
Keyboard, Monitor, Mouse
Encryption module Protection and Detection mode: Encoding and Decoding Image Steganography Data hiding through image: Video Steganography based on image Steganography
Allows trusted users to access sensitive information while traversing untrusted networks, it is highly useful for users
Easy testing of new rules in a live environment without disrupting the current
Rule sets are applied by deploying them in Protection mode to enforce secure behavior, permit or deny traffic and seal web application parameters against modification
Rule sets are tested by deploying them in Detection mode to evaluate them against traffic and log actions without enforcing them.
We have chosen this stage because its contents are processed internally during the image encoding/ decoding which makes it hard to be detected by image steganalysis methods .
The data bits of the message are hidden in some of the image whose magnitude is above a predefined threshold.
A single bit is hidden in the least significant bit of the larger component of each image.
Finally, Admin encrypt the key and embed in the image send to the newly
After receiving the key to the authenticated he has only the permission to take the key when extract the image.
We extend the image hidden technique to video one. Here we simply consider the steganography in the uncompressed video.
That means we try to hide a key in video with almost the same size. The main idea is that we treat each frame of the videos as the images and apply the image steganography for each frame with some necessary mechanism.