LAZY WAVELET TRANSFORM
BASED STEGANOGRAPHY IN
VIDEO
KRISHNA C (4)
RESHMA S (33)
RESHMA SUNNY (34)
SHAJANA K BASHEER (44)
S8 ECE B
PROJECT GUIDE : NIMMY M PHILIP
Lazy
wav
elet
tra
nsf
orm
bas
ed
steg
ano
grah
yin
vid
eo
1
CONTENTS1. INTRODUCTION
2. LITERATURE SURVEY
3. BLOCK DIAGRAM
4. METHODOLOGY
a. SOFTWARE DESCRIPTION
b. FLOW CHART
5. RESULTS
6. APPLICATIONS
7. CONCLUSION
8. FUTURE SCOPE
9. REFERENCES
Lazy
wav
elet
tra
nsf
orm
bas
ed
steg
ano
grah
yin
vid
eo
2
INTRODUCTION
• Information hiding – utmost importance in today’s world
• Data easily available in digital format
• Unauthorised copying on the rise
• Two disciplines of information hiding:
• Steganography
• Digital Watermarking
• Digital Watermarking:
• process of hiding digital information in a carrier signal.
• To verify authenticity.
• Maybe embedded in audio, video, text etc.
Lazy
wav
elet
tra
nsf
orm
bas
ed
steg
ano
grah
yin
vid
eo
3
• Steganography:
• Data maybe hidden in image, audio or video.
• Media used for hiding – cover.
• Hidden data – text, image, audio, video etc.
• Hidden message – imperceptible to viewers.
• Message encrypted hidden in the cover
• Our project deals with Steganography of video files into
video file.
Lazy
wav
elet
tra
nsf
orm
bas
ed
steg
ano
grah
yin
vid
eo
4
LITERATURE SURVEY1. An Overview of Steganography[2]
Shawn D. Dickman
• Steganography is a useful tool that allows transmission of
information over an communication channel.
• It comes from Greek language, “Stegos” meaning hidden, and
“Graphia” writing.
• Modifications to the data in the cover file must have insignificant
or no impact to the final presentation.
• Least significant bit of each sample- less impact to the graphical
representation of the data.
Lazy
wav
elet
tra
nsf
orm
bas
ed
steg
ano
grah
yin
vid
eo
5
• Using a 24-bit image, a bit of each of the red, green and blue
colour components can be used, since they are each
represented by a byte.
• A grid for 3 pixels of a 24-bit image can be as follows:
(00101101 00011100 11011100)
(10100110 11000100 00001100)
(11010010 10101101 01100011)
• When the number 200 (11001000-binary), is embedded into
the LSB of this part of the image, the resulting grid is :
(00101101 00011101 11011100)
(10100110 11000101 00001100)
(11010010 10101100 01100011)
Lazy
wav
elet
tra
nsf
orm
bas
ed
steg
ano
grah
yin
vid
eo
6
2. Integer Wavelet Transforms using the Lifting
Scheme[3]
• Conventional wavelet transform does not guarantee thereversibility.
• Lifting scheme is an algorithm to calculate wavelet transformsin an efficient way.
• Three steps
1. Lazy wavelet transform
2. Dual lifting
3. Primal lifting Lazy
wav
elet
tra
nsf
orm
bas
ed
steg
ano
grah
yin
vid
eo
7
• Lifting scheme can be modified easily to a transform that maps
integers to integers-hence reversible
• Input image divided into non-overlapping subbands and
embeds a secret data into the high frequency wavelet
coefficients.
Lazy
wav
elet
tra
nsf
orm
bas
ed
steg
ano
grah
yin
vid
eo
8
3. Overview: Main Fundamentals for Steganography
[4]
Steganography Types
1. Pure steganography : no stego key
2. Secret key steganography : stego key is exchanged
prior to communication.
3. Public key steganography : a public key and a private key
is used.
Lazy
wav
elet
tra
nsf
orm
bas
ed
steg
ano
grah
yin
vid
eo
9
Characterization of steganography systems
1. Capacity : Total number of bits hidden and successfully
recovered by the Stego system
2. Robustness : Ability of the embedded data to remain intact if
the stego-system undergoes transformation
3. Invisibility : Concept based on the properties of the human
visual system.
Average human subject is unable to distinguish between
carriers that do contain hidden information and those that do not.
4. Security : Embedded algorithm is secure if the embedded
information is not subject to removal after being discovered by
the attacker
Lazy
wav
elet
tra
nsf
orm
bas
ed
steg
ano
grah
yin
vid
eo
10
Steganography V/s Cryptography
Steganography
• Cover message + secret
message + key
• Does not alter structure of
secret message.
• Prevents the discovery of
existence of communication.
• Little known technology.
Cryptography
• Secret message + key
• Alters structure of secret
message.
• Prevents discovery of
contents of communication.
• Common technology.
Lazy
wav
elet
tra
nsf
orm
bas
ed
stre
gan
ogr
ahy
in v
ideo
11
BLOCK DIAGRAM
Lazy
wav
elet
tra
nsf
orm
bas
ed
steg
ano
grah
yin
vid
eo
12
• Cover video : Video used for hiding secret video (large size)
• Secret video : Secret message to be transmitted (small size)
• Lazy Wavelet Transform : Covert each frame in spatial
domain into frequency domain (Generate four subbands)
• LSB substitution : Replace each LSB of cover video with
secret video data.
• Inverse lazy wavelet transform : Combine four subbands
and covert each frame in frequency domain into spatial
domain.
• Embedded Video : Cover video + Secret video
Lazy
wav
elet
tra
nsf
orm
bas
ed
stre
gan
ogr
ahy
in v
ideo
13
METHODOLOGY
A) SOFTWARE DESCRIPTION
• Software used: MATLAB.
• MATLAB:
• Fourth generation programming language.
• Developed by MathWorks.
• High performance language for technical computing.
• Allows interfacing of programs written in other
programming languages like C, C++, Java etc.
Lazy
wav
elet
tra
nsf
orm
bas
ed
steg
ano
grah
yin
vid
eo
14
• Wide variety of inbuilt functions.
-VideoReader : Read video
- rgb2gray : Covert RGB image to Gray scale image
- lwt2 : Do lazy wavelet transformation
• User-defined functions can also be used.
• Some user-defined functions used in our program
• Stegno: Performing steganography on subbands of video frames.
• Datahiding: hiding data into LSB of the selected sub band.
• Destegno: for extracting the hidden video file.
• Dataextract: for extracting data from LSB of sub band.
Lazy
wav
elet
tra
nsf
orm
bas
ed
steg
ano
grah
yin
vid
eo
15
B) FLOW CHART
Lazy
wav
elet
tra
nsf
orm
bas
ed
steg
ano
grah
yin
vid
eo
16
Lazy
wav
elet
tra
nsf
orm
bas
ed
steg
ano
grah
yin
vid
eo
17
Lazy
wav
elet
tra
nsf
orm
bas
ed
steg
ano
grah
yin
vid
eo
18
RESULTS
1. LWT OUTPUT
Lazy
wav
elet
tra
nsf
orm
bas
ed
steg
ano
grah
yin
vid
eo
19
2. COMPARISON
Histogram before hiding Histogram after hiding
Lazy
wav
elet
tra
nsf
orm
bas
ed
steg
ano
grah
yin
vid
eo
20
First frame before hiding First frame after hiding
Lazy
wav
elet
tra
nsf
orm
bas
ed
steg
ano
grah
yin
vid
eo
21
3. PSNR
Peak signal to noise ratio of First frame after hiding:
87.0820 dB
Lazy
wav
elet
tra
nsf
orm
bas
ed
steg
ano
grah
yin
vid
eo
22
APPLICATIONS• Confidential communication and secret data storing
• Protection of data alteration
• Access control system for digital content distribution
• Media Database systems
Fields of application
• Defense and intelligence
• Medical
• On-line banking
• On-line transaction
• To stop music piracy
• Other financial and commercial purposes
Lazy
wav
elet
tra
nsf
orm
bas
ed
steg
ano
grah
yin
vid
eo
23
CONCLUSION
Lazy
wav
elet
tra
nsf
orm
bas
ed
steg
ano
grah
yin
vid
eo
24
• The project provides a new method for video steganography
• The method considers the visual part of the video as a set of
images or frames in which the secure data which is encrypted is
actually stored.
• Steganography in our current digital age can be attributed to the
desire of individuals to hide communication through a medium
rife with potential listener.
• This increased interest is evidenced in the sheer number of
available tools to provide easy steganographic techniques to the
end user.
• In areas where cryptography and strong encryption are being
outlawed, steganography used to circumvent such policies and
pass messages.
• The battle between cryptographers and cryptanalysis, security
experts and hackers, steganography and Steganalysis will
continually develop new techniques to counter each other.
Lazy
wav
elet
tra
nsf
orm
bas
ed
steg
ano
grah
yin
vid
eo
25
FUTURE SCOPE
Lazy
wav
elet
tra
nsf
orm
bas
ed
steg
ano
grah
yin
vid
eo
26
• Voice over Internet protocol (VoIP) used for steganographyowing to its difficulty in detecting hidden information in VoIPstreams.
• Steganography is capable of mitigating piracy by aidingcopyright marking.
• Digital camera manufacturers could implement steganographicfeatures as a part of camera firmware to annotate pictures withthe photographer's copyright information.
Lazy
wav
elet
tra
nsf
orm
bas
ed
steg
ano
grah
yin
vid
eo
27
•The other areas that could conceivably be employed to hide
messages are:
Holography technology.
Infrared (e.g. programmable IR hand controls for computers
Pagers).
Colored glasses that filter all but intended wavelengths to make
hidden messages visible.
Ink, magnetic, thermochromic, photochromic.
DNA message hiding.
REFERENCES
[1]Lazy Wavelet Transform Based Steganography in Video
Khushman Patel,Kul Kauwid Rora, Kamini Singh,Shekhar Verma Deptof CSE, IIIT Allahabad, Allahabad (U.P.),2014
[2] An overview of image steganography
T. Morkel 1, J.H.P. Eloff 2, M.S. Olivier 3,Information and Computer Security Architecture (ICSA) Research Group Department of Computer Science University of Pretoria, South Africa
[3] Integer Wavelet Transforms using the Lifting Scheme
Geert uytterhoeven dirk roose adhemar bultheel Department of Computer Science Katholieke University
[4] Overview: Main Fundamentals for Steganography
Zaidoon Kh. AL-Ani, A.A.Zaidan, B.B.Zaidan and Hamdan.O.Alanazi
Journal of computing, volume 2, issue 3, march 2010, issn 2151-9617
Lazy
wav
elet
tra
nsf
orm
bas
ed
steg
ano
grah
yin
vid
eo
28
Top Related