09-11-2016, 10:29 AM
1467352584-AbstractEmbeddingVideoSteganography.docx (Size: 29.65 KB / Downloads: 3)
ABSTRACT
Computer technology and the Internet have made a breakthrough in the existence of data communication. This has opened a whole new way of implementing steganography to ensure secure data transfer. Steganography is the fine art of hiding the information. Hiding the message in the carrier file enables the deniability of the existence of any message at all. This paper designs a stego machine to develop a steganographic application to hide data containing text in a computer video file and to retrieve the hidden information. This can be designed by embedding text file in a video file in such a way that the video does not lose its functionality using Least Significant Bit (LSB) modification method. This method applies imperceptible modifications. This proposed method strives for high security to an eavesdropper’s inability to detect hidden information.
INTRODUCTION:
Steganography is the practice of hiding or camouflaging secret data in an innocent looking dummy container. This container may be a digital still image, audio file, video file, or even a printed image. Once the data has been embedded, it may be transferred across insecure lines or posted in public places. Therefore, the dummy container should seem innocent under most examinations. In previous steganographic algorithms, bit-plane decomposition was commonly used combined with the simple approach of replacing the binary data in the least significant bit-planes of a dummy image with secret binary data. We previously presented a sophisticated steganography method, called Least Significant Bit (LSB) steganography, which makes use of bit-plane decomposition and the characteristics of the human vision system. Noting that human cannot perceive any shape information in a very complicated binary pattern, we can replace noise-like regions in the bit-planes of the dummy image with secret data without deteriorating the image quality. The original Least Significant Bit (LSB) steganography could not be applied to lossy compressed data.
Steganography is an ancient art of conveying messages in a secret way that only the receiver knows the existence of message. The subject of steganography has been brought into the limelight by several intelligence agencies and the news media in recent times. Apart from using state of the art, communication technologies and media, the agencies are using cryptography as well as steganography to aid themselves with their objectives. So, a fundamental requirement for a steganographic method is imperceptibility; this means that the embedded messages should not be discernible to the human eye.
The word steganography derives from the Greek word steganos, which means covered or secret, and graphy which means writing or drawing. Steganography is also referred to as Stego. The concept of steganography has existed for thousands of years. The Greek used to pass secret information by writing in wax-covered tablets: wax was first scraped off a tablet, the secret message was written on the tablet, and then the tablet was covered again with the wax. Another technique was to shave a messenger’s head, tattoo a message or image on the bald head, and let hair grow again so that the tattoo could not be seen. Shaving the head again revealed the tattoo. The use of invisible ink was also used extensively during the World War II. The invisible ink method and other traditional stego methods were extensively used but the invisible secret message gets revealed when heated. Then the image files are used to hide messages. But image files are not the only carriers. Secret information can be hidden in computer image files (JPEG, GIF, BMP), audio files (WAV, MP3), video files (MPEG, AVI), or even text files. Provided the steganographic algorithm is good enough and a Stego’d video along with the original video, even an adept steganography expert would be unable to detect the hidden information from the image. Making use of the Internet, secret information hidden in the carrier can be transmitted quickly, secretly, and securely.
Over the past few years, numerous Steganography techniques that embed hidden messages in multimedia objects have been proposed. This is largely due to the fact that multimedia objects often have a highly redundant representation which usually permits the addition of significantly large amounts of stego-data by means of simple and subtle modifications that preserve the perceptual content of the underlying cover object. Hence they have been found to be perfect candidates for use as cover messages. A message, either encrypted or unencrypted, can be hidden in a computer video file (containing the picture of, for instance, an innocent 2 year old baby) and transmitted over the Internet, a CD or DVD, or any other medium. The image file, on receipt, can be used to extract the hidden message. This design incorporates the most powerful modified LSB algorithm to encode the message into video file. Steganography Vs Cryptograpy -Steganography is not an alternative to cryptography. Steganography is the dark cousin of cryptography. While cryptography provides privacy, steganography is intended to provide secrecy. In other words, cryptography works to mask the content of a message; steganography works to mask the very existence of the message.
EXISTING SYSTEM:
The existing systems lack good user interface, non provision of choosing the key and more encode-decode time consumption. There are lots of steganographic programs available. A few of them are excellent in every respect; unfortunately, most of them lack usable interfaces, or contain too many bugs, or unavailability of a program for other operating systems. Data hiding is a characteristic of object-oriented programming. Because an object can only be associated with data in predefined classes or templates, the object can only "know" about the data it needs to know about.
There is no possibility that someone maintaining the code may inadvertently point to or otherwise access the wrong data unintentionally. Thus, all data not required by an object can be said to be "hidden". Data hiding in media, in images, video and audio, is of interest for the protection of copyrighted digital media, and to the government for information systems security and for covert (steganographic) communications. It can also be used in forensic applications for inserting hidden data into audio files for the authentication of spoken words and other sounds, and in the music business for the monitoring of the songs over broadcast radio. The technology enables the insertion and recovery of hidden data in audio files through manipulation of the relative phase of harmonically related components of a host audio signal. Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message.
PROPOSED SYSTEM:
The proposed application will take into account these shortcomings, and since it will be written in Java, operability over multiple operating systems and even over different hardware platforms would not be an issue. This proposed stego machine provides easy way of implementing the methods. The idea behind this design is to provide a good, efficient method for hiding the data from hackers and sent to the destination securely. This system would be mainly concerned with the algorithm ensuring the secure data transfer between the source and destination.
This proposed system is based on video Steganography for hiding data in the video image, retrieving the hidden data from the video using LSB (Least Significant Bit) modification method. This design looks at a specific class of widely used image based steganographic techniques, namely LSB steganography and investigate under what conditions can an observer distinguish between stego images (images which carry a secret message) and cover images (images that do not carry a secret message).
ADVANTAGES OF PROPOSED SYSTEM:
The advantages of the proposed stego machine are:
A very usable and good looking wizard based GUI (Graphical User Interface) for the system.
Ability to operate the system with no prior training and consultation of any help files.
Ability to conceal and reveal the exact hidden data from video file without disturbing the running application or new application.
Ability to encrypt and decrypt the data with the images.
With this system, an image, after hiding the data, will not degrade in quality
SYSTEM SPECIFICATION:
HARDWARE SPECIFICATION:
Processor : Intel Pentium-IV
Speed : 1.1GHz
RAM : 512MB
Hard Disk : 40GB
General : Key Board, Monitor, Mouse
SOFTWARE SPECIFICATION:
Operating System : Windows XP
Software : JAVA (JDK 1.5.0)