Sunteți pe pagina 1din 8

International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & ISSN

0976 6375(Online) Volume 4, Issue 4, July-August (2013), IAEME

TECHNOLOGY (IJCET)

ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4, Issue 4, July-August (2013), pp. 240-247 IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2013): 6.1302 (Calculated by GISI) www.jifactor.com

IJCET
IAEME

INFORMATION HIDING IN EDGE LOCATION OF VIDEO USING AMALGAMATE FFT AND CUBIC SPLINE
1

Dr. Hanaa M. A. Salman

Computer Science Department, University of Technology, Baghdad

ABSTRACT This paper presents the concealment of information based on the use videos as a cover to hide the existence of the secret message. The secret message is encrypted using RSA before being embedded in the cover video. This encrypted secret message is then embedded in predetermine locations using Lest Significant Bits (LSB), and real part of Fast Fourier Transform (FFT). Finally inverse Discrete Fourier Transform (IDFT) is applied. The locations are cubic spline control points which are derived from detection the edge upon using (prewitt and canny). These control points are dynamically changed with each video frame to reduce the possibility of statistically identifying the locations of the secret message bits, even if the original cover video is made available to the interceptor. The proposed method is evaluated in terms of the Average Peak Signal to Noise Ratio (APSNR), as well as the Average Mean Square Error (AMSE) measured between the original and steganography video. Results show minimal degradation of the steganography video for secret message. Keywords: Video steganography, Edge detection, FFT, Cubic spline, PSNR, AMSE 1. INTRODUCTION One of the most important challenges facing the process of sending and displaying the hidden information, especially in public places is the presence of the intruder. The intruder starts to processes such as Interruption, modification, fabrication and Interception. One of the solutions to this problem is to use steganography. Steganography is a process of hiding information in cover media, in a way to keep others from thinking that the information even exists. There are basically three types[1] of steganography protocols used, these are: Pure Steganography, Secret Key Steganography, Public Key Steganography. Steganography is mad of three parties: sender, receiver, and communication channel. The sender performs the embedding process over the carrier by using the secret information and the key to generate the stego-carrier. The receiver performs the extraction process over the stego-carrier by using the key to extract the secret information. The channel, it
240

International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 6375(Online) Volume 4, Issue 4, July-August (2013), IAEME provides secure communicating between parties. Steganography [2] was normally combined with cryptography to further add another layer of security. A video file is generally a collection of images and sounds. The great advantages of video are the large amount of data that can be hidden inside and the fact that it is a moving stream of images and sounds. Therefore, any small but otherwise notice able distortions might go by unobserved by humans because of the continuous flow of information [3].Video steganography methods are broadly classified into (temporal domain and spatial domain), or (compressed video, and uncompressed video). Several researchers have addressed the problem of video steganography. In [4] a comparative analysis between Picture (JPEG) steganography and Video (AVI) steganography by quality and size was performed. The authors propose to increase the strength of the key by using UTF-32 encoding in the swapping algorithm and lossless steganoraphic technique in the AVI file. However, payload capacity is low. In [5] an adaptive invertible information hiding method for Moving Picture Expert Group (MPEG) video is proposed. Hidden data can be recovered without requiring the destination to have a prior copy of the covert video and the original MPEG video data can be recovered if needed. This technique works in frequency domain only. It has the advantages of low complexity and low visual distortion for covert communication applications. However, it suffers from low payload capacity. In[6], presents a steganoraphic model which utilizes cover video files to conceal the presence of other sensitive data regardless of its format. The model presented is based on pixel-wise manipulation of colored raw video files to embed the secret data. The secret message is segmented into blocks prior to being embedded in the cover video. These blocks are then embedded in pseudo random locations. The locations are derived from a re-orderings of a mutually agreed upon secret key. Furthermore, the re-ordering is dynamically changed with each video frame to reduce the possibility of statistically identifying the locations of the secret message blocks, even if the original cover video is made available to the interceptor. The author also presents a quantitative evaluation of the model using four types of secret data. The model is evaluated in terms of both the average reduction in Peak Signal to Noise Ratio (PSNR) compared to the original cover video; as well as the Mean Square Error (MSE) measured between the original and steganoraphic files averaged over all video frames. Results show minimal degradation of the steganoraphic video file for all types of data, and for various sizes of the secret messages. Finally, an estimate of the embedding capacity of a video file is presented In [7] authors search how the edges of the images can be used to hiding text message in gray image. The authors tried to give the depth view of image steganography and Edge detection Filter techniques. In [8] authors proposed a new technique using the motion vector, to hide the data in the moving objects. Moreover, to enhance the security of the data, the data is encrypted by using the AES algorithm and then hided. The data is hided in the horizontal and the vertical components of the moving objects. The PSNR value is calculated so that the quality of the video after the data hiding is evaluated. In [9] authors describe how motion vector can be used as a carrier to hide data. The secret message bit stream is first encrypted by using RSA algorithm and the encrypted is embedded in the least significant bit by using Least Significant Bit and also use edge detection mechanism for selecting the pixel. The performance is calculated by using Peak to Signal Noise Ratio. The performance analysis shows that the algorithm ensures better security against attackers An amalgamate method of Parametric Spline and DFT for video steganography is applied, instead of embedding secret information in all over the selected frame of video, an edge detection is applied followed by a curve selection method is applied as positions where, the secret bits to be
241

International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 6375(Online) Volume 4, Issue 4, July-August (2013), IAEME embedding. Thus if the intruder knows the set of control points it may lead to discover the secret message. An improvement is made by: 1. Extraction the intensity values of pixels for these control points along the frame of video. 2. Applying the DFT for the result intensity vector values. 3. Embedding information into the LSB's of the real part of DFT. 4. Apply IDFT. This paper is organized as follows: Section 2 introduces the proposed video based steganoraphic algorithm, and then presents the steps of embedding and extraction process. Section 3 presents the experimental results and finally, conclusions and future work are presented in section 4. 2. PROPOSED ALGORITHM The proposed video steganoraphic scheme is based on locations of the cubic spline interpolation control points over the hybrid edge detection methods; the Prewitt and the Canny. This proposed method consist of embedding phase as presented in section 3.1, and extraction phase as presented in section 3.2 3.1 EMBEDING PHASE The input to this phase is: secret message, video as cove media, and RSA public key of the receiver, while the output is the stego video. The block diagram of the embedding phase is shown in Figure (1), and the algorithm consists of the following steps described below. Step1: Secret message processing: convert the secret message into digits using Table (1). Apply RSAencryption algorithm as in [9]. Step2: Cover video processing: Split the cover video into a sequence of frames, each video frame dimension is H W Pixels. For each randomly selected frame convert into grayscale frame, then apply edge detection using (Prewitt and Canny) algorithm as in [8, 7, 9]. Apply cubic spline interpolation algorithm as in [10] over the generated edge. Find control points to the generated cubic spline curve. Determined pixels value that corresponding location of these control points over the input frame. Step3: Embed processing: While the extracted frame pixels is not empty get the extracted frame byte .While the hidden message bits, is not empty get a bit and assigned it to the first bit of the real part of the DFT of the frame byte. Apply the IDFT. End of while hidden message. End of while extracted frame byte. Step4: End. Table 1 Number corresponds to each Litter Litter A B C D E F G Number 00 01 02 03 04 05 06 Litter H I J K L M N Number 07 08 09 10 11 12 13
242

Litter O P Q R S T U

Number 14 15 16 17 18 19 20

Litter V W X Y Z -

Number 21 22 23 24 25 26

International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 6375(Online) Volume 4, Issue 4, July-August (2013), IAEME

Cover Video

Split into Frames

Frame

RGB to Grayscale

Prewitt Edge Detection

Canny Edge Detection

Cubic Spline Control Secret Message Public Key FFT RSA Encryption Encrypted Message LSB IFFT Stego Video

Figure 1: Schematic block diagram for the embedding process 3.2 EXTRACTION PHASE The input to the extraction phase is the stego video, and RSA privet key of the receiver, while the output is the hidden secret message. The block diagram of the extraction processes is shown in Figure (2) and the algorithm consists of the following steps described below: Step1: Stego video preprocessing: split the stego video into a sequence of frames, each stego video frame dimension is H W Pixels. For each randomly selected frame convert into grayscale frame, then apply edge detection using (Prewitt and Canny) algorithm. Apply cubic spline interpolation algorithm over the generated edge. Find control points to the generated cubic spline curve. Step2: Extract processing: Extract the stegovideo frame pixels in which the interplant curve pass by. While the extracted stego video frame pixels are not empty, get the first bit of each byte. End of while. End of frames. Step3: Decrypted message processing: Combined each seven bits of the extracted bits into digital number. Apply RSAdecryption Algorithm as in [9].Convert the result digit of size two into character using Table (1). The result is the secret message. Step4: END.
243

International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 6375(Online) Volume 4, Issue 4, July-August (2013), IAEME
Stego Video

Split Frames

Frame

RGB to Grayscale

Prewitt Edge Detection

Canny Edge Detection

Cubic Spline Control Points

RSA Secret Key

LSB Extraction

RSA Decryption

Secret Message

Figure 2: Schematic block diagram for the extracting process 3. PERFORMANCE EVALUATION EXPERIMENTAL RESULTS Steganography depends on the availability of two parameters, namely; imperceptibility and capacity. The perceptual imperceptibility of the embedded information is measured by comparing the original video to its stego counterpart so that their visual differences, if any, can be determined. Additionally, as an objective measure, Average Peak Signal to Noise Ratio (APSNR) between the cover and stego video may be calculated. These parameters are given by [6]: ,. (1) Where and respectively. are the pixel values at row i and column j of the cover frame and stego frame

The Average Mean Square Error (AMSE) is given by: ,.... (2) Where N is the number of frames for each video
244

International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 6375(Online) Volume 4, Issue 4, July-August (2013), IAEME The Peak Signal to Noise Ratio (PSNR) defined as [6]: ,... (3) Where L is the peak signal level (L = 255 for 8-bit gray scale frames). The Average Peak Signal to Noise Ratio (APSNR) is given by:

,..... (4) Where N is the number of frames for each video The maximum capacity of cover video file is given by[6]: ,... (5)

The proposed algorithm has been implemented using Matlab, and Visual Basic, as shown in Figure (3).For all tests contained in this paper, we used N = 256. The experiments were conducted on 4 Video to test the robustness of the proposed algorithm by imperceptibility. The Experimental results show high imperceptibility where there is no noticeable difference between the stego video and the original.

Figure 3 the proposed method implementation

245

International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 6375(Online) Volume 4, Issue 4, July-August (2013), IAEME Table (2) shows the calculate AMSE, and APSNR value between the original video and stego video for applying the proposed method to four test video. Table 2 AMSE and APSNR Resolution (WH) Frame /sec. No.of frames Average PSNR Average MSE

Covervideo

Size(MB)

Video 1

288352

15

167

48.4

71.61

0.31

Video 2

288352

15

190

55.1

73.52

0.32

Video 3

288352

15

190

55.1

72.29

0.29

Video 4

288352

15

189

55.1

72.30

0.36

In all experiments, the APSNR is greater than 72dB and AMSE is below 0.30. Therefore experimental results show that the proposed method is effective. It maintains the quality of the video and no variation between the cover data and stego data that can be detected by the human vision system. 4. CONCLUSIONS AND FUTURE WORK We proposed a method to hide secret message inside the Video, in frequency domain and without the need to have the original Video at the extraction phase. The sender encrypts the secret message by the RSA public key of the recipient and then embedded it using LSB of the pixels that located by the edge method (prewitt and canny) over the original video frame specified by the control points of cubic spline interpolation method, after conversion it into DFT and then IDFT applied to the real part of DFT, where the secret message is embedded using LSB insertion method. This process is repeated for each selected frame of the cover video. The receiver extract the LSB of the pixels that located by the edge method (prewitt, and canny) over the stego video frame specified by the control points of cubic spline interpolation method. This process is repeated for each selected frame of the stego cover video until all the embedded bits are extracted. The receiver revel the encrypted secret message with his RSA secret key .The proposed method relies on a set of parameters of secrecy, making it more resistant to attack by intruders. From these parameters: RSA secret key, which is used to decrypt the encrypted secret message, the number of control points which is used for each cubic spline that correspond to each edge in each used frame. These parameters must be known to intruders to extract secret message from the stego video file even he know the proposed algorithm. Future directions are: the use of other ways to find the edges, the use of other interpolation methods, or the adoption of other places for embedding, the use of wavelet transform.
246

International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 6375(Online) Volume 4, Issue 4, July-August (2013), IAEME REFERENCES [1] [2] Sheelu, BabitaAhuja, An Overview of Steganography, Journal of Computer Engineering, Volume 11, Issue 1, PP 15-19,Jun. 2013. Ajit Singh Swati Malik,Securing Data by Using Cryptography with Steganography, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 5, PP 404-409, May 2013. AyushiJuneja , Sunita , TarunAhuja, Dynamic Least Significant Bit (DLSB) Technique forVideo Steganography, International Journal of Computer Science & Management Studies, Vol. 13, Issue 05, PP 52-56, July 2013. R.Kavitha and A. Murugan, "Lossless Steganography on AVI File using Swapping Algorithm", InternationalConference on Computational Intelligence and Multimedia Applications, pp. 83-88, Sivakasi-TamilNadu, Dec. 2007 Yueyun Shang, "A New Invertible Data Hiding in Compressed Videos or Images.", Third International Conference on Natural Computation (ICNC 2007), Vol. 4,PP.576-580, Haikou, Aug 2007. Amr A. Hanafy, Gouda I. Salama and Yahya Z. Mohasseb, "A Secure Covert Communication Model Based on Video Steganography, in Military Communications Conference, 2008. MILCOM. IEEE on 16-19 Nov. 2008. NitinJain SachinMeshram ShikhaDubey, Image Steganography Using LSB and Edge Detection Technique, International Journal of Soft Computing & Engineering, Volume: 2; Issue: 3,PP. 217- ,2012. P. Paulpandi, Dr. T. Meyyappan, Hiding Messages Using Motion Vector Technique in Video Steganography, International Journal of Engineering Trends and Technology, Volume3, Issue3, 2012, P. SunithaKency Paul, P.FascaGilgy Mary, J. Dheeba, A Data Hiding scheme in motion vector of videos by LSB Substitution., International Journal of Science, Engineering and Technology Research (IJSETR) Volume 2, Issue 5, PP 1111-1118, May 2013. Shao-Hua Hong, Lin Wang, Trieu-Kien Truong, Tsung-Ching Lin, Lung-Jen Wang: Novel Approaches to the Parametric Cubic-Spline Interpolation. IEEE Transactions on Image Processing, Volume 22, Issue 3, PP: 1233-1241,March 2013. M. Nagaraju Naik and P. Rajesh Kumar, Spectral Approach to Image Projection with Cubic B-Spline Interpolation, International Journal of Electronics and Communication Engineering & Technology (IJECET), Volume 3, Issue 3, 2012, pp. 153 - 161, ISSN Print: 0976- 6464, ISSN Online: 0976 6472. Sonali Patil, Kapil Tajane and Janhavi Sirdeshpande, Analysing Secure Image Secret Sharing Schemes Based on Steganography, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 2, 2013, pp. 172 - 178, ISSN Print: 0976 6367, ISSN Online: 0976 6375. Geetha C.R. and Dr.Puttamadappa C., Modified Weighted Embedding Method for Image Steganography, International Journal of Electronics and Communication Engineering & Technology (IJECET), Volume 4, Issue 3, 2013, pp. 154 - 161, ISSN Print: 0976- 6464, ISSN Online: 0976 6472. Vismita Nagrale, Ganesh Zambre and Aamir Agwani, Image Stegano-Cryptography Based on LSB Insertion & Symmetric Key Encryption, International Journal of Electronics and Communication Engineering & Technology (IJECET), Volume 2, Issue 1, 2011, pp. 35 - 42, ISSN Print: 0976- 6464, ISSN Online: 0976 6472.

[3]

[4]

[5]

[6]

[7]

[8]

[9]

[10]

[11]

[12]

[13]

[14]

247

S-ar putea să vă placă și