0% found this document useful (0 votes)
102 views6 pages

H41034449 PDF

This document summarizes a research article about a hash-based least significant bit technique for video steganography. The technique embeds a secret message into a video file by hiding bits of the message in the least significant bit positions of pixels in video frames. A hash function is used to select pixel positions randomly. This allows a large secret message to be hidden while maintaining high video quality. The encoding process embeds the secret data into frames, which are then recombined into a stego video. Decoding extracts the secret data from the stego video frames using the same hash-based technique. The technique aims to provide a simple yet secure method for video steganography.

Uploaded by

esr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
102 views6 pages

H41034449 PDF

This document summarizes a research article about a hash-based least significant bit technique for video steganography. The technique embeds a secret message into a video file by hiding bits of the message in the least significant bit positions of pixels in video frames. A hash function is used to select pixel positions randomly. This allows a large secret message to be hidden while maintaining high video quality. The encoding process embeds the secret data into frames, which are then recombined into a stego video. Decoding extracts the secret data from the stego video frames using the same hash-based technique. The technique aims to provide a simple yet secure method for video steganography.

Uploaded by

esr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Bhagyashri Rahangdale et al Int. Journal of Engineering Research and Applications www.ijera.

com
ISSN : 2248-9622, Vol. 4, Issue 1( Version 3), January 2014, pp.44-49

RESEARCH ARTICLE OPEN ACCESS

Hash Based Least Significant Bit Technique For Video


Steganography
Prof. Dr. P. R. Deshmukh , Bhagyashri Rahangdale

ABSTRACT
The Hash Based Least Significant Bit Technique For Video Steganography deals with hiding secret message or
information within a video.Steganography is nothing but the covered writing it includes process that conceals
information within other data and also conceals the fact that a secret message is being sent.Steganography is the
art of secret communication or the science of invisible communication. In this paper a Hash based least
significant bit technique for video steganography has been proposed whose main goal is to embed a secret
information in a particular video file and then extract it using a stego key or password. In this Least Significant
Bit insertion method is used for steganography so as to embed data in cover video with change in the lower
bit.This LSB insertion is not visible.Data hidding is the process of embedding information in a video without
changing its perceptual quality. The proposed method involve with two terms that are Peak Signal to Noise
Ratio (PSNR) and the Mean Square Error (MSE) .This two terms measured between the original video files and
steganographic video files from all video frames where a distortion is measured using PSNR. A hash function is
used to select the particular position for insertion of bits of secret message in LSB bits.
KEYWORDS - Cover Video,Hash Function,LSB Insertion,Secret Message,Stego Video,Video
Steganography.

I. INTRODUCTION

Now days as Internet and other digital media larger than audio and image files, so as it allow to
are getting very popular,so there is requirement to hide more information. The video steganography
transmit a data more securely. Steganography is a composed of two main phases in which first phase is
kind of art and science of hidding a secret to embed secret message in the video files and
message inside the other digital files as here a video second phase is the extraction of secret message
file in such a way that no one else apart from from video files.
intended recipient can realize presence of data within A video will be formed by playing fourteen
the video[1].The video steganography uses a images per second and when thirty images per second
particular portion of container file such as Video files are played then it becomes a good quality video.In
to embed the secret message.The steganography is this video steganography a video frame will be
term that derived from greek word: “Steganos” divided into number of frame and in this frame
means “covered” and “graphia” means secret data will be embedded[11]. Video cover file
“writing”.Steganography involves hiding information for hiding the secret data is famous as it can hide a
so it appears like that no information is hidden.So if large amount of secret message hiding data into video
any person view that video in which data is hidden file is the added security against the attack of the
but they have no idea that any hidden information is third party or unintended receiver due the complexity
within the video hence information will not be of the structure of video file as compared to image
decoded by hacker.Steganography is the process of file and audio file.Hash Based Least significant bit
invisible communication and it provide security by video steganography technique is a simple approach
obscuring data.The steganography technique will to hide data in video cover file.First of all video is
hide presence of data even from receiver but receiver converted into frames and then the least significant
can decode data as they know the stego key.A video bit of some of the bytes inside an image is changed to
file can hide large quantity of information as it carry a bit of each of the Red, Green and Blue color
large number of frame and its storage capacity is also components used.Hash Based least significant bit
more.So video steganography will have biggest video steganography technique is inspired from the
application in information simple LSB video steganography technique.This
hidding[9].Steganographic storage capacity (the technique was proposed due to the simplicity of the
amount of information that can be embedded) is LSB insertion.
always an important factor when developing a The hash based LSB technique is different
steganographic algorithm.Video files are significantly from LSB technique on basis of hash function as it

www.ijera.com 44 |
Page
Bhagyashri Rahangdale et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 1( Version 3), January 2014, pp.44-49

takes eight bits of secret data at a time and hide them safe manner.The most secure and robust
in LSB of RGB pixel.Bits are distributed in 3,3,2 algorithm[10] of an effective hash-based algorithm
order.So there is random distribution of the bits into that uses a pure hash technique for coding and
those pixels takes place.After hiding information in decoding the information in a colour image. It
multiple frames of a video file,these frames are provide an approach is worked on perfect hash
combined together to make a stego video and this function. There is system for data hiding uses AES
video now can be used as a normal streaming for encryption for generating secret hash function or
video[3].On the receiver side the authorized receiver key[11]. A secured Hash based LSB technique [12]
has to perform the reverse process to decode the in which an efficient steganographic method for
hidden message or data.Stego video will be broken embedding secret messages into cover images
into frames and then using the password data is without producing any major changes has been
retrived from various frames.In this paper hash based accomplished through Hash LSB method.
least significant bit technique for video
steganography is going to be developed in III. SYSTEM ARCHITECTURE
MATLAB.
1. BLOCK DIAGRAM
II. LITERATURE REVIEW
The Hash Based Least Significant Bit For
There are various kinds of steganographic Video Steganography Technique has been proposed
methods have been proposed.Video file for hiding in which it perform encoding and decoding for
the secret data is most useful as it can hide a large hidding message and extracting message
amount of secret data. The basic requirement of respectively[4].First of all message file will be
hiding a data in cover file and the relation of embedded within the cover file by using the
steganography with cryptography is discussed[1].The steganographic tool as here use of MATLAB
steganography is art of hiding data within the video software.This steganographic file is again applied to
file or image file.An Efficient Method for steganographic tool to extract embedded data.A
Steganography in Videos in which Secret Message is cover video consists of collection of frames and the
first encrypted by using cryptography secret data is embedded in these frames as
algorithm.Steganography is an effective means of payload.Data hiding in video by encoding and
protecting the confidentiality of the data.By hiding retrieving data by decoding is explained below.
the data from unwanted or unauthorized viewing[2].
The technique of data hiding [3] for high resolution 1.1 ENCODING PROCESS
video is proposed.It provide proper protection on data For Encoding first a video file is selected
during transmission.It results in high data carrying then information about the cover video will be
capacities.The stego machine [4] to develop a collected.This frames of video are separated from
steganographic application to hide data containing each other then in this frame a secret message is
text in a computer video file and to retrieve the hidded using hash based least significant bit
hidden information is designed.This is designed by technique. As hash code is generated then it help to
embedding message file in a video file in such away embed data within the frame.Then it will find 4 LSB
that the video does not loose its functionality using position in the pixel in which the secret message will
Least Significant Bit modification method..High be embedded. Stego frame combine with other
Capacity and Security Steganography [5] using frames and then stego video is formed.This stego
Discrete wavelet transform algorithm is video will be transmitted to the intended
proposed.The capacity of the proposed algorithm is receiver.This encoding process which is used to hide
increased as the only approximation band of payload data will be given in fig 1.
is considered.The payload wavelet coefficients are
encrypted and fused with wavelet coefficients of 1.2 DECODING PROCESS
cover image to generate stego coefficients based on For decoding a stego video is taken and to
the embedding strength parameters alpha and beta. extract the secret data or information from video all
The data hiding method using the motion information about video is collected. This stego video
vector technique for the moving objects is frame will be applied to the desteganography tool to
introduced[8,9].In this compressed video is used for decode data.From this frame hidden information is
the data transmission since it can hold large volume taken out. The password will be used to decode the
of the data.The motion vector technique is found as data as it is known to intended receiver.Here
the better solution since it hides the data in the password also known as stego key. The decoding
moving objects.It provide efficient method for hiding process will be given in fig 2. In this way secret
the data from hackers and sent to the destination in a

www.ijera.com 45 | P a g e
Bhagyashri Rahangdale et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 1( Version 3), January 2014, pp.44-49

message will be extracted without disclosing it to the unintended receiver.

Fig 1.Block Diagram Of Encoding Process

Fig 2. Block Diagram Of Decoding Process

2.ALGORITHM Hash based least significant bit technique


which produces hash function.This hash function
2.1 HASH FUNCTION deals with the LSB bit position within the pixel and

www.ijera.com 46 | P a g e
Bhagyashri Rahangdale et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 1( Version 3), January 2014, pp.44-49

the position of each hidden image pixel and also Return values :- x=1,2,3 for(R),
with the number of bits of LSB[12].Hash value x=4,1,2 for(G),
takes a variable size of input and returns a fixed x=3,4 for (B).
size of digital string as output.Hash function also
used for detecting duplicated record in large files. where x is LSB bit position per pixel.

Hash function generally given by


x= y % z (1)
where, x is LSB bit position within the pixel,y
represents the position of each hidden image pixel
R G B
and z is number of bits of LSB. 4 LSB bits
3 bits 3 bits 2 bits
2.2 LSB INSERTION
Secret
The least significant bit insertion method is
Message
simplest approach to hiding data within an video
file .This LSB insertion is a steganographic
algorithm that finds the least significant bit in some
bytes of the cover file and swaps them with a
sequence of bits present in the secret data or Fig 3.Distribution Of Secret Message bits
message. The hash based LSB technique is
different from LSB technique on basis of hash Mathematically,
function as the hash function hide eight bits of The perceptual quality of video studied by
secret data on a time and hide them in LSB using following parameter
positions of RGB pixels of carrier frame the
distribution of bits is of order 3,3,2 respectively H
and distributed in such a way that first 3 bits of MSE = 1 Σ ( P(i,j) – S(i,j) )2 (2)
the 8 bits secret message are inserted into R pixel H×W i=1
and other 3 bits of secret message into G pixels
and remaining 2 bits are inserted into B pixel. This H × W represents the Height and Width .
bits are inserted into LSB position on basis of the
returned value using hash function.As human eye The distortion is measured using peak signal to
has chromatic influence of the blue colour is more noise ratio.
than the red and green colour hence this order of
distribution takes place. In the LSB insertion PSNR = 10 log10 L2
technique, one can take the binary representation (3)
of the hidden data and overwrite the LSB of each MSE
byte in the cover file.The amount of change
occurred in cover file will be minimal and not
noticable to the human eye.
Here MSE is mean square error,PSNR is Peak
Signal to Noise Ratio and P(i,j) and S(i,j) are pixel
In following example there are 3 RGB
in original frame and stego frame respectively and
pixels in which secret data embedded.
L is peak signal level.

3. FLOWCHART

The flowchart of the Hash based least


significant bit technique for Video Steganography
Let a Secret message is 200 . is presented in Fig 4. In this method first the text
file is selected that is required to hide.As the text
Binary representation of secret message is file is selected then it goes to next stage.The next
(11001000). stage is to select video file in which secret message
has to get hide.After this number of frames will be
Distributed in order (3,3,2) as shown in fig 3,Using counted and it will export the desired frame from
the hash function. video in which secret message get embedded.Then
hash code will be generated and the text will be

www.ijera.com 47 | P a g e
Bhagyashri Rahangdale et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 1( Version 3), January 2014, pp.44-49

embedded within the desired frame using hash code


and this stego frame will be then exported and at
last all steganographic frame and other frames of
this all video frame are collected together.Finally Secret text derived
this steganographic video is exported.Stego key
applied to extract secret text from stego video and
original video will be exported.
End
Fig 4. Flowchart of hash based least significant bit
technique for video steganography
Start
4.APPLICATION
There are various application of hash based
least significant bit technique for video
Select the text file steganography which are as follows

No  Military and Industrial application:-In


Military there is requirement to hide secret
message from unintended receiver like
If text file is terrorist so that message will be hidded in
selected the video file.Similar way businessman
Yes can use this technique to hide a data from
business rivels.
 Protection against data alteration:-As the
Select the video file observer have no idea that a particular
message is hidden in a video file so there
No will be no chances to alter the data.
 Intelligence services:- In the Intelligence
services video steganography will be
If video file most useful.
is selected  Confidential communication and secret
Yes data storing:- This hash based least
significant bit technique for video
steganography help in confidential
communication.The secrecy of the
Desired frame exported embedded data is very important in this
area.Steganography provides large
capability to hide the existence of
Hash code generation confidential data.First select a video file
according to the size of the embedding
data.Then,embed the confidential data by
Text hidded in desired frame using an embedding program.When
extracting, use an extracting program to
recover the embedded data by using stego
Export the stego frame key.

IV. CONCLUSION
Collect the video frame Data hiding in a video is performed using
Hash based least significant bit technique for video
steganography.This technique will successfully
hide an text file in video by using Hash based LSB
Export the stego video insertion technique during encoding process and
some stego key or password will be used for
decoding of secret message.In this way this
Apply stego key to extract text technique for video steganography transmit the
secret data or information through video
transmission.The Encoding and Decoding program
in matlab software hide data and retrieve the same
Export Original video file data successfully. So it help to hide data securely

www.ijera.com 48 | P a g e
Bhagyashri Rahangdale et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 1( Version 3), January 2014, pp.44-49

by embedding it in a video file and without Pp.1641-1644 1641 Vol. 3, Issue 1,


disclosing to the unintended receiver. January -February 2013.
This project uses text file to hide in video [10] Satya Kumari, K.John Singh, A Robust
file as an secret message using LSB insertion and And Secure Steganograph Approach
hash function,but in future image file can also be Using Hash Algorithm, International
hidded in the video file. The proposed technique Journal Of Latest Research In Science
will be applied to the AVI file.The other format of And Technology Volume 2,Issue 1 :Page
video files which are other than avi format can also No.573-576 , January-February (2013).
be used with some modification. [11] Vipula Madhukar Wajgade, Dr. Suresh
Kumar,Enhancing Data Security Using
REFERENCE Video Steganography,International
[1] Kefa Rabah, Steganography The Art Of Journal of Emerging Technology and
Hiding ,Information Technology Journal: Advanced Engineering ,ISSN 2250-2459,
3(3),245-269,2004. ISO 9001:2008 Certified Journal, Volume
[2] Gil-Choel Park,,A Study on 3, Issue 4, pp 549, April 2013 .
Steganography and Steganalysis, Journal [12] Anil Kumar, Rohini Sharma, A Secure
of Security Engineering, Vol. 3, No. 4,pp Image Steganography Based On RSA
35, November 2006. Algorithm And Hash LSB Technique,
[3] A.K. Bhaumik, M. Choi, R.J. Robles and International Journal Of Advanced
M.O. Balitanas, Data Hiding in Video, in Research In Computer Science And
International Journal of Database Theory Software Engineering, Volume 3, Issue 7,
and Application Vol. 2, No. 2, pp. 9-16, July 2013.
June 2009.
[4] Mritha Ramalingam, Stego Machine
Video Steganography using Modified
LSB Algorithm, in World Academy of
Science, Engineering and Technology 50
2011, pp. 497-500, 2011.
[5] H.S. Majunatha Reddy and K.B.
Raja,High capacity and security
steganography using discrete wavelet
transform, International Journal of
Computer Science and Security, 3(6), pp.
462-472, June, 2011.
[6] ShengDun Hu, KinTak U,A Novel Video
Steganography Based On Non-Uniform
Rectangular Partition, IEEE International
Conference On Computational Science
And Engineering CSE,pp 57, 2011.
[7] Ankit Chaudhary, J. Vasavada, J.L.
Raheja, Sandeep Kumar, Manmohan
Sharma, A Hash Based Approach For
Secure Keyless Steganography In Lossless
Rgb Images, The 22nd International
Conference On Computer Graphics And
Vision,pp 80-83, October 01, 2012.
[8] P.Paulpandi1, Dr.T.Meyyappan, Hiding
Messages Using Motion Vector Technique
In Video Steganography International
Journal of Engineering Trends and
Technology,Volume3,Issue3,pg 361-365,
2012 .
[9] Pritish Bhautmage, Prof. Amutha
Jeyakumar, Ashish Dahatonde,
International Journal Of Engineering
Research And Applications (IJERA) ,

www.ijera.com 49 | P a g e

You might also like