Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: Data Hiding in Video using Least Bit Technique
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Data Hiding in Video using Least Bit Technique


[attachment=52339]
INTRODUCTION

STEGANOGRAPHY is an ancient art of conveying messages in a secret way that only the receiver knows the existence of message. The subject of steganography has been brought into the limelight by several intelligence agencies and the news media in recent times. Apart from using state of the art, communication technologies and media, the agencies are using cryptography as well as steganography to aid themselves with their objectives. So, a fundamental requirement for a steganographic method is imperceptibility; this means that the embedded messages should not be discernible to the human eye [1].
The word steganography derives from the Greek word steganos, which means covered or secret, and graphs which mean writing or drawing. Steganography is also referred to as Stego. The concept of steganography has existed for thousands of years. The Greek used to pass secret information by writing in wax-covered tablets: wax was first scraped off a tablet, the secret message was written on the tablet, and then the tablet was covered again with the wax [2]. Another technique was to shave a messenger’s head, tattoo a message or image on the bald head, and let hair grow again so that the tattoo could not be seen. Shaving the head again revealed the tattoo [2]. The use of invisible ink was also used extensively during the World War II. The invisible ink method and other traditional stego methods were extensively used but the invisible secret message gets revealed when heated. Then the image files are used to hide messages. But image files are not the only carriers [3]. Secret information can be hidden in computer image files (JPEG, GIF, BMP), audio files (WAV, MP3) [4], video files (MPEG, AVI), or even text files. Provided the steganographic algorithm is good enough and a Stego’d video along with the original video, even an adept steganography expert would be unable to detect the hidden information from the image. Making use of the Internet, secret information hidden in the carrier can be transmitted quickly, secretly, and securely. Over the past few years, numerous Steganography techniques that embed hidden messages in multimedia objects have been proposed. This is largely due to the fact that multimedia objects often have a highly redundant representation which usually permits the addition of significantly large amounts of stego-data by means of simple and subtle modifications that preserve the perceptual content of the underlying cover object [3]. Hence they have been found to be perfect candidates for use as cover messages. A message, either encrypted or unencrypted, can be hidden in a computer video file (containing the picture of, for instance, an innocent 2 year old baby) and transmitted over the Internet, a CD or DVD, or any other medium [5]. The image file, on receipt, can be used to extract the hidden message. This design incorporates the most powerful modified LSB algorithm to encode the message into video file.


II. PROPOSED SYSTEM

The existing systems lack good user interface, non-provision of choosing the key and more encode-decode time consumption. There are lots of steganographic programs available. A few of them are excellent in every respect; unfortunately, most of them lack usable interfaces, or contain too many bugs, or unavailability of a program for other operating systems. Steganography in video can be divided into two main classes. One is embedding data in uncompressed raw video, which is compressed later [7][8].
The other, tries to embed data directly in compressed video stream. The proposed application will take into account these shortcomings, and since it will be written in Java, operability over multiple operating systems and even over different hardware platforms would not be an issue. This proposed stego machine provides easy way of implementing the methods. The idea behind this design is to provide a good, efficient method for hiding the data from hackers and sent to the destination securely. This system would be mainly concerned with the algorithm ensuring the secure data transfer between the source and destination. This proposed system is based on video Steganography for hiding data in the video image, retrieving the hidden data from the video using LSB (Least Significant Bit) modification method. This design looks at a specific class of widely used image based steganographic techniques, namely LSB steganography and investigate under what conditions can an observer distinguish between stego-images (images which carry a secret message) and cover-images (images that do not carry a secret message).


File Handling:

In file handling, The AVI (Audio/Visual interleaved) file header is skipped and its contents are opened in an ASCII format for processing. This reads the AVI file in terms of byte corresponding to the header and creates a Key file. The text file which is to be embedded is converted into binary value. Then each bit in the binary value is then converted to 8 bit value which is done by appending zeros in front of the bit.
C. Encryption:
The message to be hidden inside the carrier file is encrypted along with a key to disappoint the prying eyes of nosy people. This is to enhance the security during data transmission. This strong encryption method provides robustness to the Stego machine. In this module, the input message is first converted to byte value. The key is obtained from the user which is added to the respective byte and stored in a separate byte array which is then converted to character to get the encrypted form of message. The input to this function is the plain text message and a key value to encrypt the message.

Steganography – Conceal data:

This module performs the process of steganography. Here the carrier file (AVI file) length is obtained and checked for whether it is eight times greater than that of the text file. Find the starting point of the data in the AVI file and create a key file by writing the content of the AVI file starting from the data to the end. The carrier file is converted into binary. The result is overwritten to the data part of the AVI file and as well as written into the newly created text file. The output obtained for this system is a stego’d video file, and a key file which is to be shared by a secure channel. Fig. 2 depicts the clear picture of concealing the data