Audio Video Sem1

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 23

A PROJECT DEMO

ON

Reversible Data Hiding Methods Based on


Audio and Video Synchronization in MP4 Container
CONTENT

 INTRODUCTION
 CURRENT TECHNIQUE IN USE
 MOTIVATION
 OBJECTIVE
 ALGORITHMS
 SYSTEM DESIGN
 PROJECT SCOPE
 TESTING SCENARIO
 EXPECTED CHANGES OR ENHANCEMENT
 RESULTS
 CONCLUSION
 REFERENCES
INTRODUCTION
 Steganography is the method of hiding any secret information
like password, text and image,audio behind original cover file .
Original message is converted into cipher text by using secret
key and then hidden into the LSB of original image.
 Suitable algorithm such as LSB is used for image
steganography suitable parameter of security and authentication
like PSNR, histogram are obtained at receiver and transmitter
side which are exactly identical , hence data security can be
increased.
CURRENT TECHNIQUE IN
USE

 Steganography

 Cryptography
MOTIVATION

 In early days cryptography is used for encryption of data and


provides data security,Though your code may be
unbreakable, any hacker can look and see you’ve sent a
message.
 To overcome this drawback steganography is used for
sending data like image and audio and make hidden.

 The proposed system provides audio-video


cryptostegnography which is the combination of image
steganography and audio steganography using Forensics
Technique as a tool to authentication.
OBJECTIVE

 The main aim is to hide secret information


behind image and audio of video file. As video is
the application of many still frames of images
and audio, we can select any frame of video and
audio for hiding our secret data.

 This project focus the idea of computer forensics


technique and its use of video steganography in
both investigative and security manner
ALGORITHMS USED :

 Least Significant Bit (LSB) based


steganography
The simplest and most common type of
steganography is LSB (least significant bit). The
one’s bit of a byte is used to encode the hidden
information.
 Phase Coding algorithm :

Phase coding algorithm used for audio


steganography
SYSTEM DESIGN
MATHEMATICAL MODEL:

 Let S is the Whole System Consist of


 S= {I, P, O}
 I = Input.
 I = {AF, VF,}
 AF = Audio File.
 VF = Video File.
 P = Process
 P = { 4LSB, phase coding algo., LSB }
 4LSB = Is used for image steganography.
 Phase coding: Is used for audio steganography.
 LSB = Least Significant Bit: use of (LSB) algorithm for embedding the data into the bit map image
(.bmp).
 Step1: selecting audio-video file.
 Step2: video steganography.
 Step3: Creating stego audio file.
 Step4: Authentication (at receiver side).
 Step5: Audio recovery.
 Step6: COMPUTER FORENSICS AND AUTHENTICATION
Project scope

 Add Public/Private Key encryption.


PROJECT FLOW

 Selecting Video File


 Data Encryption using AES Algorithm
 Encrypted Data Hiding in video using LSB
steganography
 Creating Satego Audio File
 Authentication
 Audio Recovery
Selecting Video File

 Select AVI video file, behind which user want to hide


data.
 Separate audio and video from selected video file using
available software.
 Save audio file as .wav file which is the original
separated audio file.
Data Encryption Using AES Algorithm

 AES algorithm is applied before


embedding data in an image.
 Data encrypted before sending to
server using AES algorithm.
Encrypted Data Hiding in video Using LSB steganography

 Select original video file (.AVI).


 Separate all frames of video file.
 Get frame number to from user behind
which an authentication image is to be
hidden.
 Read authentication image.
 Create new steno video file in which
authentication images is hidden.
Creating stego audio file

 Combine stego audio and stego video file using ‘cute


audio video merger’ software.
 This forms the stego audio vedio file at transmitter site
which has hidden text and image in it.
Authentication(at receiver side)

 After transmission of the stego audio


video file obtained at receiver side.
 Read the stego audio video file.
 Authentication image data is available
at LSB of frame is recovered.
Testing scenario
GUI Testing-
Test case Login Screen- Sign up
Objective Click on sign up button then check all required/ mandatory fields with leaving all fields
blank

 
Expected Result All required/ mandatory fields should display with symbol “*”.
Instruction line “* field(s) are mandatory” should be displayed

Test case Create a Password >>Text Box

Confirm Password >>Text Box  

 
Objective Check the validation message for Password and Confirm Password field
 
 

Expected Result Correct validation message should be displayed accordingly or


“Password and confirm password should be same” in place of
“Password mismatch”.
 
 
Test case Display Menu

Objective Click on On Off Button

Expected Result It will give menu Various Option


System testing

Test case Browse video

Objective To Select the Video.

Expected Result Videoe should be selected by the user

Test case Framing

Objective To divide the frame

Expected Result Framing should be proper.


Test case Encrypt data .

Objective To Select the encrypt data.

Expected Result Encrypt data should be proper.

Test case Create stego audio file

Objective To select stego audio file

Expected Result Stego audio should be proper.

Test case Enter frame number for decryption

Objective To enter correct frame number/

Expected Result Frame number should be proper and decode data.


CONCLUSION

 Information security using data hiding audio video


steganography with the help of computer forensic
techniques provide better hiding capacity and security
 Hiding image and text behind audio and video file and
extracted from an AVI file using 4LSB insertion method
for video steganography and phase coding
REFERENCES

 [1]Praveen .P, Arun .R, "Audio Video Crypto Steganography using LSB
substitution and advance chatoic algorithm", International Journal of
Engineering Inventions 2014.
 [2]Pathak P,A.K.;Nag.A”A new Audio steganography scheme based on
Location with Enhanced Security ”, ACES First International
Conference 2014.
 [3]BassemBakhache,Joseph M. Ghazal,and Safwan EI
Assad,”Improvement of the Security of Zigbee by a New Chaotic
Algorithm”, IEEE System Journal 2013.
 [4]V.Sathyal, K. Balasuhramaniyam, N. Murali, M. Rajakumaran,
Vigneswari, “data hiding in audio signal,video signaltext and jpeg
images”, IEEE-International Conference on Advances in Engineering,
Science and Management(ICAESM-2012).
 [5]Sghaier Guizani, Nidal Nasser, "An Audio/Video Crypto Adaptive
Optical Steganography Technique" IEEE 2012,pp, 1057-1062.
 [6]P.PBalguruji, S.K.Jagtap, “Intelligent processing, An approach of
Audio Steganography”, IEEE 2012 ICCICT, Oct 19-20, Mumbai,
India,pp.1-6.
 [7]FatihaDjebbar, BeghdadAyad,HabibHamamandKarim abed-Meraim,”A
view on latest audio steganography technique ”, International Coference
on innovacations in Information Technology 2011.
 [8]K.A Navas, Vidya.V, Sonia. V.Dass,”High security data embedding in
video”, Recent Advances in Intelligent Computational
Systems(RAICS),2011 IEEE.
 [9]George Abboud< Jeffery Marean, "Steganography and cryptography in
computer Forensics." 2010 IEEE, Fifth International workshop on
systematic application to digital Forensic application. pp.25-30
 [10]S.Gao, R.M.Hu.W.Zeng H.Jai, “A Detection algorithm of audio
spread spectrum data hiding”, 2008 IEEE-International Conference, ppl-
4.

You might also like