XOR Encryption Based Video Steganography

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

International Journal of Science and Research (IJSR)

ISSN (Online): 2319-7064


Index Copernicus Value (2013): 6.14 | Impact Factor (2014): 5.611

XOR Encryption Based Video Steganography


Ramandeep Kaur1, Pooja2
1
Research Scholar, CSE, CT Group of Institutions, Shahpur, Jalandhar, Punjab, India
2
Assistant Professor, CSE, CT Group of Institutions, Shahpur, Jalandhar, Punjab, India

Abstract: In this paper, an XOR encryption based video steganography scheme is put forward which encrypts the text secret message
(.txt) and hide it using 1LSB substitution method behind the random frames of video file (.avi). The main motive of this methodology is
to protect the confidential information from the attackers by hiding its presence from the human visual system (HVS) and secure the
text data from cyber criminals. There are several algorithms are proposed in previous works which are not enough capable to secure the
hidden data and are not much efficient for embedding high amount data behind career medium. So this work is used for embedding
high payload and to provide security to text data. The result values are simulated on the basis of quality metrics such as PSNR, MSE,
BER and histogram analysis.

Keywords: Least Significant Bits (LSB), Encryption, Payload Capacity, Human Visual System (HVS), Embedding, Secret Message,
Random and dynamic frame selection, Secret Key.

1. Introduction 1.1.1 Embedding Process (Sender Side)


This process is carried out at sender side in which, a secret
Nowadays in a digitized world, security of private message is embedded inside the cover video using
information is a major issue over the internet. To protect the embedding algorithm and generate a stego video.
private information from being misused by the cyber
criminals, various data hiding approaches are used. 1.1.2 Extraction Process (Receiver Side)
Steganography is one of them which is an information hiding Extraction process is a reverse process of embedding
technique and hides the presence of secret message behind a algorithms in which a secret message is extracted from stego
multimedia file without changing the perceptual quality of video using stego key at receiver side. Many algorithms are
media file and provide secure communication between two proposed for video steganography on the basis of Spatial
parties. It is originated from Greek words i.e. Steganós Domain and Transform Domain. The most basic algorithm is
(means Covert/Secret), and Graptos (means Writing) which Least Significant Bits (LSB), which replace the secret bits
means conceal the secret message inside the cover. It is a directly inside the East significant bits of video. Videos are
one- to one communication process. Steganography is used more secure than images as human eye can’t predict small
for various purposes like for copyright protection in digital color variations in whole video stream.
marking, feature tagging, and biometrics, in computer
forensics as an authentication tool and in military or medical
field. From the ancient time, various methods were used to
hide information such as invisible inks, microdots, wax,
tattoos on the slave’s head etc. but nowadays digital media is
used to embed the confidential information. On the basis of
Digital media steganography is categorized as; text, image,
audio, video and protocol based steganography. Here we are
dealing with video steganography. [1] Figure 1: Process of Video steganography

1.1 Video Steganography 1.2 Video Steganalysis

Video steganography has become very popular research area Detection of the presence of secret message behind video is
to hide secret data. It is a non- tangible masking of done using steganalysis. It is basically used for computer
confidential information behind the video file. Video is a forensics to detect cyber criminals.
combination of audio and multiple image frames so can be
used to embed large amount of data. The maximum frames
2. Related Work
required for creating a video file is 16 fps (frame per second).
The main goal of video steganography is to embed the secret
The issue regarding security and data protection has become
data behind video in such a manner that it should not be
major problem which has to be reduced in order to protect
perceptible to HVS and no degradation in the quality of
the confidential information from the hackers or cyber
video. A good video steganography must have three
criminals. Many methodologies and algorithms have been
parameters i.e. Security, Capacity and imperceptibility.
proposed for minimizing the bad impact of cyber attacks on
Video steganography works in two phases i.e. embedding
secret data.
process and extraction process. [2]

Volume 4 Issue 11, November 2015


www.ijsr.net
Paper ID: NOV151495 1467
Licensed Under Creative Commons Attribution CC BY
International Journal of Science and Research (IJSR)
ISSN (Online): 2319-7064
Index Copernicus Value (2013): 6.14 | Impact Factor (2014): 5.611
In the year 2014, Hemant Gupta, Setu Chaturvedi [1] has the pattern BGRRGBGR. Each pixel hides 1 bit of secret
proposed a basic technique for image steganography. An message at a time in sequential manner behind the selected
advance approach is applied for hiding data i.e. single bit, 2 random video frames. 10 random frames are selected on the
bit, 3 bit LSB with AES encryption method to stop hacking. basis of 10 digit secret key. The secret message is encrypted
Then calculate PSNR & Correlation Factors. It concludes using XOR encryption to make it secure from cyber
that the PSNR decreases as number of LSB substitution bit criminals. The bit level embedding is done in this algorithm.
increased. This makes steganography to hide large amount of The algorithm shows high imperceptibility, better quality and
data but easy to attack and less secure. high embedding capacity of secret data behind video frames
[5].
Sunil. K. Moon, Rajeshree. D. Raut [2] has proposed a
method to hide secret message behind a video file using 4
LSB technique and used computer forensics as an
authentication tool and achieve high capacity of data.

Geetha C.R., H. D. Giriprakash [3] has proposed an image


Steganographic method by using multiple edge detection
operator (Canny Edge detector) and Variable embedding
method. The multiple edge detection is limited to three times
so as to reduce the distortion from image. 4 bits are
embedded in edge pixels and 2 bits in other pixels using LSB
substitution process. High data capacity and good quality is
achieved by calculating the PSNR values of original image
and stego image.

Shivani Khosla, Paramjeet Kaur [6] proposing a hybrid


approach of video steganography with watermarking is used
to embed the secret message in carrier video. DCT & DWT
techniques are used to hide message inside video and
generates a stego video. This stego video is again used to
embed a watermark using LSB technique to increase the
security of stego video.

Youssef Bassil,[9] proposed an Image Steganography


method in which Parameterized based Canny Edge Detection
Algorithm is used. Secret message is embedded into a digital
image within the edge pixels that are detected in image using
canny edge detection algorithm and 3LSB substitution. This
algorithm used basically three parameters: size of Gaussian
filter, low threshold and high threshold values. But has
limitation of complex processing as it generates three Figure 2: Flow Chart of Proposed Algorithm
different outputs corresponding to three parameters.
4.1 Embedding Algorithm
3. XOR Encryption The following steps are followed for hiding the text message
behind video.
XOR Encryption is a symmetric key based encryption
a) Select cover video (.avi) and enter secret message (.txt).
technique which helps to encrypt the secret data into another
b) Enter10 digit Secret_Key for authorization proposes.
unreadable format to protect it from intruders and from
c) Convert video into frames and extract 10 random frames
unauthorized users [5]. It provides one- tier protection to
from extracted frames on the basis of secret key (i.e.
private information. Some logical and Boolean operations are
1234567890) such as [8]:
formed on secret data for converting it into another form. In
frame1= Secret_Key(1) + Secret_Key(2) (2)
this work we are using following function to encrypt the data
frame2= Secret_Key(4) + Secret_Key(10) (3)
using XOR Boolean expression. These expressions are more
…..
secure than standard operations such as addition, subtraction.
frame10= Secret_Key(8) + Secret_Key(2) (4)
Where, frame1 to frame10 are ten random functions for
Encypted_Msg = XOR ( Secret_Data_Bits, Key) (1)
extracting 10 random frames for hiding the secret
message.
4. Proposed Methodology d) Encrypt secret message using XOR encryption formula
where EM is encrypted message.
In this work, a text secret message (.txt) is used to hide EM = bitxor ( Secret_msg_bit, Secret_Key) (5)
behind video clip (rhinos.avi). The secret message bits are e) Hide secret key, selected frame addresses and message
hidden in places of least significant bits (LSB) by following length in the first frame of video clip.
Volume 4 Issue 11, November 2015
www.ijsr.net
Paper ID: NOV151495 1468
Licensed Under Creative Commons Attribution CC BY
International Journal of Science and Research (IJSR)
ISSN (Online): 2319-7064
Index Copernicus Value (2013): 6.14 | Impact Factor (2014): 5.611
f) Embed encrypted secret bits behind selected frames using simulated on the basis of Quality metrics such as PSNR
1LSB substitution and by following the BGRRGBGR (Peak Signal to Ratio), MSE (Mean Error Square) and BER
pattern where R, G, B represents the Red, Green & Blue (Bit Error Rate). It shows that this algorithm achieving high
channel respectively in sequentially manner [5]. Generate PSNR and low MSE value and have high embedding
Stego.avi video file which contains secret message. capacity with high security which are showed in figure 5,6, &
g) Compute PSNR, BER, MSE and Histogram for all 7 and high imperceptibility as histogram of stego and original
selected Frames. is visibly same as shown in figure 8. All the Values of PSNR,
BER and MSE for all selected values are tabulated in table1.
4.2 Extraction Algorithm

The extraction process is carried out at receiver side to


extract secret message. The following steps are followed for
performing extraction process [5].
a) Select Stego video and convert it into frames.
b) Extract secret key, selected frame addresses and message
length from the first frame of video.
c) Enter secret key and compare it with originally stored key.
If user is unauthorized then video clip will get corrupted
after 4 attempts and damaged by leaving no secret data
behind it.
d) Now, extract secret message by performing reverse process
of embedding algorithm using 1LSB substitution
mechanism.
e) Decrypt the extracted message.
f) Display final secret message as output.
Figure 5: PSNR value of all selected frames (for hiding 2048
g) Exit.
bytes data)

Figure 3: Selected 10 Random Frames

Figure 6: MSE value of all selected frames

Figure 4: Selected Frame and Corresponding Stego Frames

5. Experimental Results
The proposed work is simulated on Matlab 7.10.0 (R2010a)
for hiding 2048 bytes data and the experimental results are Figure 7: BER value of all selected frames

Volume 4 Issue 11, November 2015


www.ijsr.net
Paper ID: NOV151495 1469
Licensed Under Creative Commons Attribution CC BY
International Journal of Science and Research (IJSR)
ISSN (Online): 2319-7064
Index Copernicus Value (2013): 6.14 | Impact Factor (2014): 5.611
using Canny Operator”, International Journal of
Computer Applications (0975 – 888) ,Volume 48,
No.16, June 2012.
[4] Vandana Thakur, Monjul Saikia, “Hiding Secret Image
in Video”, 2013 IEEE International Conference on
Intelligent Systems and Signal Processing (ISSP).
[5] Pooja Yadav, Nishchol Mishra, Sanjeev Sharma,” A
Secure Video Steganography with Encryption Based on
LSB Technique”, IEEE International Conference on
Computational Intelligence and Computing Research,
2013.
[6] Shivani Khosla, Paramjeet Kaur, “Secure Data Hiding
Technique Using Video Steganography and
Watermarking”, International Journal of Computer
Applications (0975 – 8887), Vol. 95, No.20, June 2014.
[7] Ashish T. Bhole, Rachna Patel, “Steganography over
Video File using Random Byte Hiding and LSB
Figure 8: Histogram Analysis Technique”, IEEE International Conference on
Computational Intelligence and Computing Research
Table 1: PSNR, MSE, BER Values for all Selected Frames 2012.
for hiding 2048 bytes data [8] Amrinder Singh, Sukhjit Singh, “A Robust Video
Frame Numbers PSNR (db) BER MSE Watermark Embedding and Extraction Technique Based
1 67.10 0.0149 0.0127 on Random Frame Selection”, IJRIT International
2 67.00 0.0149 0.0130 Journal of Research in Information Technology, Vol. 2,
3 67.52 0.0148 0.0115 Issue 2, February 2014, pp: 28-37.
4 67.12 0.0149 0.0126 [9] Youssef Bassil, “Image Steganography based on a
5 67.06 0.0149 0.0128 Parameterized Canny Edge Detection Algorithm”,
6 67.28 0.0149 0.0121 International Journal of Computer Applications, Vol. 60,
7 67.49 0.0148 0.0116 Issue no.4, December 2012.
8 67.10 0.0149 0.0127 [10] Babloo Saha and Shuchi Sharma, “Steganographic
9 67.03 0.0149 0.0129 Techniques of Data Hiding using Digital Images”,
10 67.24 0.0149 0.0123 Defense Science Journal, Vol. 62, No. 1, January 2012,
Average Values 67.19 0.0149 0.0124
pp. 11-18.
[11] K.V.Vinodkumar, V. Lokeswara Reddy, “A Novel Data
6. Conclusion & Future Scope Embedding Technique for Hiding Text in Video File
using Steganography”, International Journal of
Video steganography is a very active research field with lots Computer Applications (0975 – 8887), Vol. 77, No.17,
of applications. In this paper, a basic implementation of September 2013.
video steganography process is done using 1LSB based [12] Soumyajit Sarkar, Arijit Basu, “Comparison of various
substitution and encrypted text message is hide inside Edge Detection Techniques for maximum data hiding
random frames of video by following a pattern i.e. BBRGGB using LSB Algorithm”, International Journal of
in sequential manner. This algorithm provides high Computer Science and Information Technologies, Vol.
embedding capacity of secret data i.e. 32KB and provides 5, Issue 3, 2014.
high imperceptibility performance and high speed of [13] P.Paulpandi, Dr.T.Meyyappan, “Hiding Messages Using
processing. In future work, we can embed secret data using Motion Vector Technique in Video Steganography”,
edge based video steganography and also can use different International Journal of Engineering Trends and
format of video and media for steganography process. Technology, Vol.3, Issue no. 3, 2012.
[14] Vipul Sharma, Sunny Kumar, “ A New Approach to
References Hide Text in Images Using Steganography”,
International Journal of Advanced Research in Computer
[1] Hemant Gupta, Setu Chaturvedi, “Video Steganography Science and Software Engineering , Vol.3, Issue no 4,
Through LSB Based Hybrid Approach”, International April 2013, pp. 701-708.
Journal of Computer Science and Network Security, [15] Arijit Basu, Gaurav Kumar, Soumyajit Sarkar, “A Video
Vol.14, No.3, pp 99-106, March 2014. Steganography Approach using Random Least
[2] Sunil. K. Moon, Rajeshree. D. Raut, “Analysis of Significant Bit Algorithm”, International Journal of
Secured Video Steganography Using Computer Science and Research (IJSR), Volume 3 Issue 6, June
Forensics Technique for Enhance Data Security”, IEEE 2014.
Second International Conference on image information [16] Mamta Juneja & Parvinder Singh Sandhu,“ Improved
processing (ICIIP- 2013), pp 660-665. LSB based Steganography Techniques for Color Images
[3] Geetha C.R., H. D. Giriprakash,” Image Steganography in Spatial Domain”, International Journal of Network
by Variable Embedding and Multiple Edge Detection Security, Vol.16, No.6, pp.452-462, Nov. 2014.

Volume 4 Issue 11, November 2015


www.ijsr.net
Paper ID: NOV151495 1470
Licensed Under Creative Commons Attribution CC BY
International Journal of Science and Research (IJSR)
ISSN (Online): 2319-7064
Index Copernicus Value (2013): 6.14 | Impact Factor (2014): 5.611
Author Profile

Ramandeep Kaur has completed B-Tech degree in


Computer Science & Engineering from College of
engineering & Management, Kapurthala in 2012 and
pursuing M-Tech in CSE from CT Group of
institutions, Shahpur (Jalandhar). Her interest of areas is Digital
image processing, multimedia, Networking & information security.
She has attended various seminars related to research work.

Volume 4 Issue 11, November 2015


www.ijsr.net
Paper ID: NOV151495 1471
Licensed Under Creative Commons Attribution CC BY

You might also like