Asst. Prof. Yask Patel Show Assistant Professor, Computer Science & Engineering Department, PIET Limda, Gujarat, India Video Steganography is a technique to hide any kind of files in any extension into a carrying Video file. This project is the application developed to embed any kind of data (File) in another file, which is called carrier file. The carrier file must be a video file. It is concerned with embedding information in an innocuous cover media in a secure and robust manner. This system makes the Files more secure by using the concepts Steganography and Cryptography. Steganography is the technique of hiding confidential information within any media. Steganography is often confused with cryptography because the two are similar in the way that they both are used to protect confidential information. The difference between the two is in the appearance in the processed output; the output of steganography operation is not apparently visible but in cryptography the output is scrambled so that it can draw attention. Steganlysis is process to detect of presence of steganography. In this article we have tried to elucidate the different approaches towards implementation of steganography using multimedia file (text, static image, audio and video) and Network IP datagram as cover. Also some methods of steganalysis will be discussed. Introduction Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. The word steganography is of Greek origin and means "concealed writing" from the Greek words steganos meaning "covered or protected", and graphei meaning "writing". The first recorded use of the term was in 1499 by Johannes Trithemius in his Steganographia, a treatise on cryptography and steganography disguised as a book on magic. Generally, messages will appear to be something else: images, articles, shopping lists, or some other cover text and, classically, the hidden message may be in invisible ink between the visible lines of a private letter. The advantage of steganography over cryptography alone is that messages do not attract attention to themselves. Plainly visible encrypted messages no matter how unbreakablewill arouse suspicion, and may in themselves be incriminating in countries where encryption is illegal Therefore, Whereas cryptography protects the contents of a message, steganography can be said to protect both messages and communicating parties. Steganography includes the concealment of information within computer files. In digital steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program or protocol. Media files are ideal for steganographic transmission because of their large size. As a simple example, a sender might start with an innocuous image file and adjust the color of every 100th pixel to correspond to a letter in the alphabet, a change so subtle that someone not specifically looking for it is unlikely to notice it. 1.1 History of steganography It is believed that steganography was first practiced during the Golden Age in Greece. An ancient Greek record describes the practice of melting wax off wax tablets used for writing messages and then inscribing a message in the underlying wood. The wax was then reapplied to the wood, giving the appearance of a new, unused tablet. The resulting tablets could be innocently transported without anyone suspecting the presence of a message beneath the wax. An ancient Greek record describes the practice of melting wax off wax tablets used for writing messages and then inscribing a message in the underlying wood. The wax was then reapplied to the wood, International Journal of Computer Applications (0975 8887) Volume 9 No.7, November 2010 20 giving the appearance of a new, unused tablet. The resulting tablets could be innocently transported without anyone suspecting the presence of a message beneath the wax. Later on Germans developed microdot technology which FBI Director J. Edgar Hoover referred to as "the enemy's masterpiece of espionage. Microdots are photographs the size of a printed period having the clarity of standard-sized typewritten pages. The first microdots were discovered masquerading as a period on a typed envelope carried by a German agent in 1941. The message was not hidden, nor encrypted. It was just so small as to not draw attention to itself. Besides being so small, microdots permitted the transmission of large amounts of data including drawings and photographs. Another common form of invisible writing is through the use of Invisible inks. Such inks were used with much success as recently as WW-II. An innocent letter may contain a very different message written between the lines. Early in WW-II steganographic technology consisted almost exclusively of invisible inks. Common sources for invisible inks are milk, vinegar, fruit juices and urine. All of these darken when heated. Requirements of hiding nformation digitally There are many different protocols and embedding techniques that enable us to hide data in a given object. However, all of the protocols and techniques must satisfy a number of requirements so that steganography can be applied correctly.
Table 1 shows comparison of various methods of stegnography Steganography and cryptography
Steganalysis Steganalysis is "the process of detecting steganography by looking at variances between bit patterns and unusually large file sizes. It is the art of discovering and rendering useless covert messages. The goal of steganalysis is to identify suspected information streams, determine whether or not they have hidden messages encoded into them, and, if possible, recover the hidden information.Unlike cryptanalysis, where it is evident that intercepted encrypted data contains a message. Steganalysis generally starts with several suspect information streams but uncertainty whether any of these contain hidden message. The steganalyst starts by reducing the set of suspect information streams to a subset of most likely altered information streams. This is usually done with statistical analysis using advanced statistics techniques. Types of Steganography
Proposed work for Steganography The main goal of this method is to hide information on the output image of the instrument (such as image displayed by an electronic advertising billboard). This method can be used for announcing a secret message in a public place. In general, this method is a kind of steganography, but it is done in real time on the output of a device such as electronic billboard. Following are the steps involved in embedding the secret information within a cover media. Figure: Block Diagram of Proposed ideas Conclusion The Module (create, delete & modify advertisemenr) is basically used to create a data base for the advertisement and send it to the second system, where the data is to be hidden. The stego image from the second system is sent to the display board. This image is captured by the camera & the decode module decodes the given information. The results shown consist of the image that is directly saved on to the desktop Steganography transmits secrets through apparently the near future, the most important use of steganographic techniques will probably be lying in the field of digital watermarking. Content providers are eager to protect their copyrighted works against illegal distribution and digital watermarks provide a way of tracking the owners of these materials. Steganography might also become limited under laws, since governments already claimed that criminals use these techniques to communicate. References Mohammad Shirali-Shahreza , A new method for real time steganography,ICSP 2006 Proceedings of IEEE . Yuk Ying Chung, fang Fei Xu , Development of video watermarking for MPEG2 video City university of Hong Kong ,IEEE 2006. Jonathan Cummins, Patrick Diskin, Samuel Lau and Robert Parlett, Steganography and digital watermarking School of Computer Science, The University of Birmingham. 2003. www.cs.unibo.it/people/phdstudents/scacciag/home _files/teach/datahide.pdf. MartÃn Alvaro, Sapiro Guillermo and Seroussi Gadiel, Is Image Steganography Natural? IEEE Transactions On Image Processing, Vol. 14, No. 12, December, 2005. Cvejic N. and Seppänen T. Increasing the capacity of LSB based audio steganography, Proc. 5th IEEE International Workshop on Multimedia Signal Processing, St. Thomas, VI, December 2002, pp. 336-338. Lee, Y. K. and Chen L. H. High Capacity Image Steganographic Model. IEEE Proceedings Vision, Image and Signal Processing, pp. 288-294, 2000. Computational Intelligence in Scheduling (SCIS 07), IEEE Press, Dec. 2007, pp. 57-64, doi:10.1109/SCIS.2007.357670. Which data hiding technique places data from the secret file into the host file?Steganography is the technique of hiding secret data within an ordinary, non-secret, file or message in order to avoid detection; the secret data is then extracted at its destination. The use of steganography can be combined with encryption as an extra step for hiding or protecting data.
What are data hiding techniques?Data- hiding techniques include hiding entire partitions, changing file extensions, setting file attributes to hidden, bit-shifting, using encryption, and setting up password protection.
Which data hiding technique changes data from readable code to data?Bit-shifting changes data from readable code to data that looks like binary executable code.
What technique has been used to protect copyrighted material by inserting digital watermarks?[14], watermarking technique has been used to protect the copyright data. Watermark embedding and extraction is performed based on DWT (Discrete Wavelet Transform) method. Encryption process is also done to make the data more protective. The main purpose of this paper is to give more protection to authenticity.
|