Advanced Technique For Video Steganography With An Encryption Using LSB Replacement Algorithm.
Advanced Technique For Video Steganography With An Encryption Using LSB Replacement Algorithm.
------------------------------------------------------------------------------------***--------------------------------------------------------------------------------------------
Abstract - Recently, more and more attention is paid to requirement is reduced. The existing techniques
reversible data hiding (RDH) in encrypted videos, since it manipulate the respective video compression techniques
maintains the excellent property that the original cover can for reducing the size with minimal impact on the visual
be losslessly recovered after embedded data is extracted quality. Multiple video codec standards and algorithms are
while protecting the video contents confidentiality. All used for transmitting the video in digital form.
previous methods embed data by reversibly vacating room
from the encrypted videos, which may be subject to some Video Steganography :
errors on data extraction and/or video restoration. In this Video Steganography is a technique to hide any type
paper, we propose a novel method for hiding the data with a of files into a carrying Video file. The dividation of
traditional RDH algorithm, and thus it is easy for the data video into audio and images or frames results in the
hider to reversibly embed data in the encrypted video. For efficient method for data hiding. The use of video files
hiding the data behind video we are finding space in pixel by
as a carrier medium for steganography is more
using Least significant algorithm (LSB). Experiments show
that this novel method can embed more than 10 times as compatible as compared to other techniques, because
large payloads for the same video quality as the previous of its size and memory requirements .
methods.The objective of the present work was to be predict Video is a sequence of still images. Steganographic
to hide the data behind the video by using advance data embedding in video is very similar to images.
technique for video steganography with an encryption using However, there are many differences between data
LSB replacement algorithm and performing cryptography to hiding in images and video.
hidden data. To hide the data in particular bit using public
key, original messages can be easily extracted. The receiver Encryption :
decrypts the original video and embedded data using the The message to be hidden inside the carrier file is
single key. In the existing System more attention is paid to
encrypted along with a key to avoid the too
reversible data hiding (RDH) in encrypted videos, since it
maintains the property that the original cover can be inquisitive eyes of nosy people. This is to enhance the
losslessly recovered after embedded data is extracted while security during data transmission. This strong
protecting confidentiality. encryption method provides robust to the Stego
Key Words : Data hiding, LSB Algorithm, Video machine. In this module, the input message is first
steganography, Encryption, Decryption, Privacy converted to byte value. The key is obtained from the
protection. user which is added to the respective byte and stored
in a separate byte array which is then converted to
INTRODUCTION: character to get the encrypted form of message. The
input to this function is the plain text message and a
Digital video represents the visual images moving in the
key value to encrypt the message.
form of digital data. Whereas, the analog video represents
the moving images in analog video format. Video
compression is a technology which is used for Decryption
transforming the video signals with the maintenance of the The hidden message is decrypted using the key, as
original quality under various situations like storage once the algorithm gets allow to be seen all encrypted
constraint, time delay constraint and power constraint . By data with the algorithm could be decrypted. This
manipulate the data redundancy between consecutive module first converts the input message to byte
frames and computational resources, thus the storage value. The key is obtained from the user which is
2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 20
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | March -2017 www.irjet.net p-ISSN: 2395-0072
2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 21