26
ROBUST VIDEO DATA HIDING USING FORBIDDEN ZONE DATA HIDING AND SELECTIVE EMBEDDING Under the guidance of: Prof. Rekha Patil Team members: Geeta S Savalgi Pooja Lakha Pooja S Patil

Robust video data hiding using forbidden zone data hiding and selective embedding

  • Upload
    pnlakha

  • View
    2.873

  • Download
    3

Embed Size (px)

DESCRIPTION

This ppt is on "Robust video data hiding". Includes intro, issues, challenges, motivation, design, implementation, result with snapshots, conclusion and future work. HOPE THIS HELPS !! :)

Citation preview

Page 1: Robust video data hiding using forbidden zone data hiding and selective embedding

ROBUST VIDEO DATA HIDING USING FORBIDDEN ZONE

DATA HIDING AND SELECTIVE EMBEDDING

Under the guidance of: Prof. Rekha Patil

Team members: Geeta S Savalgi Pooja Lakha Pooja S Patil

Page 2: Robust video data hiding using forbidden zone data hiding and selective embedding

WHAT IS DATA SECURITY?

Protecting a database from destructive forces and the unwanted actions of unauthorized users.

INTRODUCTION

Page 3: Robust video data hiding using forbidden zone data hiding and selective embedding

DATA SECURITY TECHNOLOGIES

DISK ENCRYPTION

HARDWARE BASED MECHANISMS BACKUP

S

DATA MASKING

DATA ERASURE

Page 4: Robust video data hiding using forbidden zone data hiding and selective embedding

DATA HIDING

It is the process of embedding information into a host medium.

FORBIDDEN ZONE

It is defined as the host signal range where no alteration is allowed

during data hiding process.

SELECTIVE EMBEDDING

Here host signal samples, which will be used in data hiding, are

determined adaptively. The selection is performed at four stages:

Frame selection, frequency band determination, block selection and

coefficient selection.

KEY TERMS USED IN PROJECT

Page 5: Robust video data hiding using forbidden zone data hiding and selective embedding

To achieve efficient data hiding in video sequence.

To utilize systematic RA Codes to encode message

bits and frame bits.

To allow handling de-synchronization between

embedder and decoder.

To achieve certain level of robustness against frame

drop, repeat and insertion attacks.

To use 3-D interleaving.

ISSUES AND CHALLENGES

Page 6: Robust video data hiding using forbidden zone data hiding and selective embedding

Successfully utilized in video data hiding

applications.

Tamper detection in digital videos can be

performed efficiently.

It is used in fragile applications such as

authentication.

It provides excess control, copy control in DVD’s.

Widely suitable for broader range of application.

APPLICATIONS

Page 7: Robust video data hiding using forbidden zone data hiding and selective embedding

The necessity for practical higher dimensional

data hiding codes.

Adjusting trade-off between robustness(channel

code) and imperceptibility(source) by practical

means.

Design of end-to-end real-life visual applications.

MOTIVATIONS

Page 8: Robust video data hiding using forbidden zone data hiding and selective embedding

During video data hiding the quality of the image

cannot be preserved.

They cannot survive any format conversion or

transcoding, without any significant loss of perceptual

quality.

Efficiently hide data in video and to preserve the

quality from the external attacks.

PROBLEM STATEMENT

Page 9: Robust video data hiding using forbidden zone data hiding and selective embedding

A new block based data hiding method which makes

use of erasure correction capability of repeat

accumulates codes.

Uses superiority of forbidden zone for low embedding

distortion levels.

Robust to frame manipulation attacks via frame

synchronization markers.

SCOPE OF WORK

Page 10: Robust video data hiding using forbidden zone data hiding and selective embedding

The goal of the design process is to produce a model of a system which can beused later to build that system and use thismodel to build the overall system.

DESIGN

Page 11: Robust video data hiding using forbidden zone data hiding and selective embedding

Parallel decoders are used to correct de-sync.

The video data hiding methods utilize uncompressed video data where insertions and erasures occur at decoder, causing de-sync.

Multiple hronization errors.

This scheme is successful only when the number of selected host signal samples is much less than the total number of host signal samples.

EXISTING SYSTEM

Page 12: Robust video data hiding using forbidden zone data hiding and selective embedding

ARCHITECTURE of proposed system

SENDER

RECEIVER

SEN

D V

IDEO

Page 13: Robust video data hiding using forbidden zone data hiding and selective embedding

ENCODER

DECODER

Page 14: Robust video data hiding using forbidden zone data hiding and selective embedding

Substitute bytes

Shift rows

Add round key

Mix columns

Substitute bytes

Add round key

Mix columns

Shift keys

Add round key

Shift keys

Substitute bytes

Add round key

Add round key

Inverse mix columns

Add round key

Inverse sub bytes

Inverse shift rows

Inverse mix columns

Add round key

Inverse shift bytes

Inverse shift rows

Add round key

Inverse shift bytes

Inverse shift rows

EXPAND KEY

W(0,3)

KEY

Round 9 .

Round 10

Round 1

Round 9

Round 1

Page 15: Robust video data hiding using forbidden zone data hiding and selective embedding

Implementation is the stage of the project when the theoretical design is turned out into a working system.

The implementation stage involves careful planning, investigation of the existing system and it’s constraints.

IMPLEMENTATION

Page 16: Robust video data hiding using forbidden zone data hiding and selective embedding

Frame selection is performed and the selectedframes are processed block-wise.

The selection is performed at four stages: Frame selection Frequency band determination Block selection Coefficient selection

ENCRYPTION MODULE

Page 17: Robust video data hiding using forbidden zone data hiding and selective embedding

Let fcur and fpre denote the current and previous frame indices fcur > T, then skip this frame. If fcur = fpre, then skip this frame. Otherwise, process the current frame. fcur< fpre, then the end of the group of frames is

reached.

DECRYPTION MODULE

Page 18: Robust video data hiding using forbidden zone data hiding and selective embedding

System flow diagram

System flow

Embed data

Spread frames

Actual video

User give input Msg or data as Data embedded video

input

Spread a video Encrypted video

Decrypt a video View original data or

msg

Encryption

Decryption

Page 19: Robust video data hiding using forbidden zone data hiding and selective embedding

results

Page 20: Robust video data hiding using forbidden zone data hiding and selective embedding
Page 21: Robust video data hiding using forbidden zone data hiding and selective embedding
Page 22: Robust video data hiding using forbidden zone data hiding and selective embedding
Page 23: Robust video data hiding using forbidden zone data hiding and selective embedding
Page 24: Robust video data hiding using forbidden zone data hiding and selective embedding

New video data hiding framework that makes use of erasure correction

capability of RA codes and superiority of FZDH.

It robust to frame manipulation attacks via frame synchronization

markers.

Typical system parameter are reported for error-free decoding.

The results indicate that the framework can be successfully

utilized in video data hiding applications.

User cannot find the original data.

It increases the security.

Conclusion

Page 25: Robust video data hiding using forbidden zone data hiding and selective embedding

Incorporation of human visual system based spatio temporal adaption of data hiding method parameters. New multilevel embedding technique . Increase block size to embed more data. Improve commercialization.

FUTURE WORK

Page 26: Robust video data hiding using forbidden zone data hiding and selective embedding

THANK YOU FOR YOUR

ATTENTION !