Vous êtes sur la page 1sur 23

A Novel Video Stegonography based on Non Uniform Rectangular Partition

Presented By:

This paper proposes a novel Video Steganography which can hide an uncompressed secret video stream in a host video stream with almost the same size

Each frame of the secret video will be Non-uniform rectangular partitioned and the partitioned codes obtained can be an encrypted version of the original frame.

These codes will be hidden in the Least 4 Significant Bits of each frames of the host video.

Experimental results showed that this algorithm can hide a same-size video in the host video without obvious distortion in the host video.

Literature survey is the most important step in software development process. Before developing the tool it is necessary to determine the time factor, economy n company strength.

Once these things r satisfied, ten next steps are to determine which operating system and language can be used for developing the tool.

AN OVERVIEW OF IMAGE STEGANOGRAPHY


Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information.

Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet.

For example, some applications may require absolute invisibility of the secret information, while others require a larger secret message to be hidden.

This paper intends to give an overview of image steganography, its uses and
techniques.

On The Limits of Steganography


In this paper, we clarify what steganography is and what it can do. We contrast it with the related disciplines of cryptography and traffic security, present a unified terminology agreed at the first international workshop on the subject.

We then present a number of attacks, some new, on such information hiding schemes.

Finally, we show that public key information hiding systems exist, and are not necessarily constrained to the case where the warden is passive.

Data hiding in digital images and raw video have wide literature. In case the data is extracted, it will be encrypted. But still there is a chance that the intruder can break the code.

However, we find that in most existing approaches, the choice of embedding positions within a cover image

Mainly depends on a pseudorandom number generator without considering the relationship between the image content itself and the size of the secret message.

Proposed System

1. The method proposed in this paper is one kind of domain method which tries to get a data-hiding capacity without causing obvious distortion in the host video stream 2. Therefore a video stream can be embedded into the host video stream after encoding the secret video by applying the non-uniform rectangular partition.

3. The coding process can be controlled by some key parameters which can be treated as
the encryption key and this can increase the difficulty from being steg analyzed.

Software Requirement

Operating System Software Protocol IDE

: Windows XP : Java,Jdk 1.6 : TCP/IP : Eclipse

Processor

Pentium-IV Or Latest

Speed
RAM

:
:

1.1GHz
512MB

Hard Disk
General

:
:

40GB
Keyboard, Monitor, Mouse

Encryption module Protection and Detection mode: Encoding and Decoding Image Steganography Data hiding through image: Video Steganography based on image Steganography

Allows trusted users to access sensitive information while traversing untrusted networks, it is highly useful for users

The services and users are limited in their tunnel traffic

Easy testing of new rules in a live environment without disrupting the current

security policy is supported.

Rule sets are applied by deploying them in Protection mode to enforce secure behavior, permit or deny traffic and seal web application parameters against modification

Rule sets are tested by deploying them in Detection mode to evaluate them against traffic and log actions without enforcing them.

We have chosen this stage because its contents are processed internally during the image encoding/ decoding which makes it hard to be detected by image steganalysis methods .

The data bits of the message are hidden in some of the image whose magnitude is above a predefined threshold.

A single bit is hidden in the least significant bit of the larger component of each image.

Finally, Admin encrypt the key and embed in the image send to the newly

registered member who is the authenticated.

After receiving the key to the authenticated he has only the permission to take the key when extract the image.

We extend the image hidden technique to video one. Here we simply consider the steganography in the uncompressed video.

That means we try to hide a key in video with almost the same size. The main idea is that we treat each frame of the videos as the images and apply the image steganography for each frame with some necessary mechanism.

Vous aimerez peut-être aussi