SlideShare a Scribd company logo
VIDEO STEGANOGRAPHY USING AES ENCRYPTION AND LSB
ALGORITHM
NAME :MAIZATUL AUNI BINTI MAZHAR
COURSE : BACHELOR OF COMPUTER SCIENCE
(NETWORK SECURITY)
SUPERVISOR : DR ZARINA BINTI MOHAMAD
CHAPTER 1
1.0 INTRODUCTION
1.1 BACKGROUND
3
4
PROBLEM STATEMENT
 Development of large open network makes the security threats increased significantly.For example,modification of
information masquerade and other threats.Therefore, steganography techniques has been apply to secure data during
transmission.However,using only steganography method is no longer secured.Hence,cryptography technique must be
combined together with steganography method to provide better security.
 However ,for the cover media, video file is being used which generally a collection of images and sounds, so most of
the presented techniques on images and audio can be applied to video files too . The great advantages of video are the
large amount of data that can be hidden inside and the fact that it is a moving stream of images and sounds.
5
1.3 OBJECTIVE
▪ Objective to implement this approach:
▪ 1.To propose a combination of steganography and
cryptography techniques to provide authentication
and confidentiality of that secret data.
▪ 2.To design the proposed techniques to protect the
secrecy of data.
▪ 3.To implement and test if quality of the cover
media is loss after the encrypted message is
hidden into it.
6
1.4 SCOPES OF PROJECT
▪ a) Project Scope
▪ 1.Security
▪ - Double layer of data hiding
▪ - Message will be encrypted first using aes algorithm and then embedded into
video using lsb techniques.
▪ 2.Minimize Quality Loss
▪ - Quality loss of cover video will be analyzed by using PSNR and MSE
7
▪ b) User Scope
▪ 1. Sender
▪ - It will make frame extraction
▪ - Then ,sender can choose any file format of video
▪ - Encryption key will be selected.
▪ 2. Receiver
▪ - It will make frame extraction
▪ - It will use secret key for the hidden message decryption.
▪ - Besides that,receiver will enter decryption key to view the secret message
8
CHAPTER 2 :
LITERATURE
REVIEW
9
10
“ CHAPTER 3 :
METHODOLOGY
11
FRAMEWORK
12
ENCODING PSEUDOCODE
START
Display name of video after selecting by user
Display video frames by frames
Display total number of video frames
Display current number of video frames
Display name of text file which user already write down the message
Value needed for user input to process encryption
Display progress on encryption process
Display message which user input and cipher text after encryption
Display status of embedding process
END
13
ENCODING
FLOWCHART
14
START
Display stego video that user has chosen
Display video frames by frames
▪ END
Display total number of video frames
Display current number of video frames Display status of embedding process
Slot for user to input original text Display cipher text that have been extracted and the
original message
User input the key for message encryption
Encryption Process
15
DECODING PSEUDOCODES
START
Display name of stego video
Display stego video that user has chosen
Display total number of video frames
Display current number of video frames
Slot for user to input which frame that hides the message
Slot for user to input the process decryption
Display cipher text that have been extracted
END
16
DECODING
FLOWCHART
17
START
Display name of stego video
Display stego video that user has chosen
▪ END
Display total number of video frames
Display current number of video frames Display cipher text that have been extracted
Slot for user to input which frame that hides the Slot for user to input the process decryption
message
18
HARDWARE AND SOFTWARE
REQUIREMENT
 Laptop 6GB RAM
 Matlab R2017a
 Microsoft Word
 Wifi
19
AES ALGORITHM
20
THANKS!
▪ [1] Yi-Tu.Wu, F.Y. Shih, Genetic algorithm based methodology for breaking the steganalytic systems,
Systems, Man and Cybernetics, Part B: Cybernetics, IEEE Transactions on,36(1),Feb 2006,24-31.
▪ [2] M. Kharrazi, H.T. Cover Selection for Steganographic Embedding, Image Processing, IEEE International
Conference, Oct 2006, Atlanta, GA
▪ [3] Al- Ethawi G. A. Salman, "Text hiding in image border" Dean of the Military College of Engineering,
MsC. Thesis, 2002.
▪ [4] J. Ashok, Y. Raju, S. Munishankaralah and K. Srinnivas," Steganography : An Overview ", International
Journal of Engineering Science and Technology, Vol. No 2(10), pp: 5985-5992, 2010.
▪ [5] S. Katzenbeisser, F. A.P. Petitcolas, " Information hiding techniques for steganography and digital
watermarking ", pp: 20 - 23, June, 1999.
▪ [6] B.G.AAGARSANA, ANJALI, T.K.KIRTHIKA, Mr. S. SIVAKUMAR,(2018), IMAGE STEGANOGRAPHY
USING SECURED FORCE ALGORITHM FOR HIDING AUDIO SIGNAL INTO COLOUR IMAGE,
International Research Journal of Engineering and Technology (IRJET) , 5:1224-1228
▪ [7] Bharti Chandel, Dr.Shaily Jain, " Video Steganography: A Survey ",OSR Journal of Computer
Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 1, Ver. III (Jan – Feb.
2016)
21
REFERENCES

More Related Content

PPTX
Fyp1 slide presentation 2.1
PDF
B.tech Final year Cryptography Project
PPTX
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
PPTX
Fyp1 slide presentation 2.1
PDF
Optimization of video steganography with additional compression and encryption
PDF
International Refereed Journal of Engineering and Science (IRJES)
PDF
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
Fyp1 slide presentation 2.1
B.tech Final year Cryptography Project
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
Fyp1 slide presentation 2.1
Optimization of video steganography with additional compression and encryption
International Refereed Journal of Engineering and Science (IRJES)
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...

Similar to Fyp1 slide presentation 2 (20)

PDF
S4501105108
PDF
Ijmet 10 01_020
PPTX
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
PDF
Data Security Using Audio Steganography
PDF
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
PDF
V01 i010410
PDF
Secure Image Hiding Algorithm using Cryptography and Steganography
PDF
Robust video data hiding using forbidden data hiding
PDF
Review On Encrypting and Decrypting Message Via Image Slicing
PDF
A Study on Video Steganographic Techniques
PDF
B018131117
PPTX
Atm Security System Using Steganography Nss ptt by (rohit malav)
PPTX
HACKING
PDF
Understanding Image Steganography with Practical Approach
PPTX
Data Security Using Steganography
DOC
Audio Steganography java project
PDF
H41034449
DOC
Multimedia
PDF
Encryption of Text in Image Over a Network
PPTX
Audio Cryptography System
S4501105108
Ijmet 10 01_020
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
Data Security Using Audio Steganography
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
V01 i010410
Secure Image Hiding Algorithm using Cryptography and Steganography
Robust video data hiding using forbidden data hiding
Review On Encrypting and Decrypting Message Via Image Slicing
A Study on Video Steganographic Techniques
B018131117
Atm Security System Using Steganography Nss ptt by (rohit malav)
HACKING
Understanding Image Steganography with Practical Approach
Data Security Using Steganography
Audio Steganography java project
H41034449
Multimedia
Encryption of Text in Image Over a Network
Audio Cryptography System
Ad

Recently uploaded (20)

PPTX
_ISO_Presentation_ISO 9001 and 45001.pptx
PPTX
Anesthesia and it's stage with mnemonic and images
PDF
COLEAD A2F approach and Theory of Change
PPTX
An Unlikely Response 08 10 2025.pptx
PPTX
Intro to ISO 9001 2015.pptx wareness raising
PPTX
Presentation for DGJV QMS (PQP)_12.03.2025.pptx
DOC
LSTM毕业证学历认证,利物浦大学毕业证学历认证怎么认证
PPTX
worship songs, in any order, compilation
PPTX
NORMAN_RESEARCH_PRESENTATION.in education
PPTX
FINAL TEST 3C_OCTAVIA RAMADHANI SANTOSO-1.pptx
PPT
The Effect of Human Resource Management Practice on Organizational Performanc...
DOCX
ENGLISH PROJECT FOR BINOD BIHARI MAHTO KOYLANCHAL UNIVERSITY
PPTX
AcademyNaturalLanguageProcessing-EN-ILT-M02-Introduction.pptx
PDF
Instagram's Product Secrets Unveiled with this PPT
PDF
oil_refinery_presentation_v1 sllfmfls.pdf
PPTX
Sustainable Forest Management ..SFM.pptx
PDF
Swiggy’s Playbook: UX, Logistics & Monetization
PPTX
INTERNATIONAL LABOUR ORAGNISATION PPT ON SOCIAL SCIENCE
PPTX
Tour Presentation Educational Activity.pptx
PPTX
Hydrogel Based delivery Cancer Treatment
_ISO_Presentation_ISO 9001 and 45001.pptx
Anesthesia and it's stage with mnemonic and images
COLEAD A2F approach and Theory of Change
An Unlikely Response 08 10 2025.pptx
Intro to ISO 9001 2015.pptx wareness raising
Presentation for DGJV QMS (PQP)_12.03.2025.pptx
LSTM毕业证学历认证,利物浦大学毕业证学历认证怎么认证
worship songs, in any order, compilation
NORMAN_RESEARCH_PRESENTATION.in education
FINAL TEST 3C_OCTAVIA RAMADHANI SANTOSO-1.pptx
The Effect of Human Resource Management Practice on Organizational Performanc...
ENGLISH PROJECT FOR BINOD BIHARI MAHTO KOYLANCHAL UNIVERSITY
AcademyNaturalLanguageProcessing-EN-ILT-M02-Introduction.pptx
Instagram's Product Secrets Unveiled with this PPT
oil_refinery_presentation_v1 sllfmfls.pdf
Sustainable Forest Management ..SFM.pptx
Swiggy’s Playbook: UX, Logistics & Monetization
INTERNATIONAL LABOUR ORAGNISATION PPT ON SOCIAL SCIENCE
Tour Presentation Educational Activity.pptx
Hydrogel Based delivery Cancer Treatment
Ad

Fyp1 slide presentation 2

  • 1. VIDEO STEGANOGRAPHY USING AES ENCRYPTION AND LSB ALGORITHM NAME :MAIZATUL AUNI BINTI MAZHAR COURSE : BACHELOR OF COMPUTER SCIENCE (NETWORK SECURITY) SUPERVISOR : DR ZARINA BINTI MOHAMAD
  • 4. 4
  • 5. PROBLEM STATEMENT  Development of large open network makes the security threats increased significantly.For example,modification of information masquerade and other threats.Therefore, steganography techniques has been apply to secure data during transmission.However,using only steganography method is no longer secured.Hence,cryptography technique must be combined together with steganography method to provide better security.  However ,for the cover media, video file is being used which generally a collection of images and sounds, so most of the presented techniques on images and audio can be applied to video files too . The great advantages of video are the large amount of data that can be hidden inside and the fact that it is a moving stream of images and sounds. 5
  • 6. 1.3 OBJECTIVE ▪ Objective to implement this approach: ▪ 1.To propose a combination of steganography and cryptography techniques to provide authentication and confidentiality of that secret data. ▪ 2.To design the proposed techniques to protect the secrecy of data. ▪ 3.To implement and test if quality of the cover media is loss after the encrypted message is hidden into it. 6
  • 7. 1.4 SCOPES OF PROJECT ▪ a) Project Scope ▪ 1.Security ▪ - Double layer of data hiding ▪ - Message will be encrypted first using aes algorithm and then embedded into video using lsb techniques. ▪ 2.Minimize Quality Loss ▪ - Quality loss of cover video will be analyzed by using PSNR and MSE 7
  • 8. ▪ b) User Scope ▪ 1. Sender ▪ - It will make frame extraction ▪ - Then ,sender can choose any file format of video ▪ - Encryption key will be selected. ▪ 2. Receiver ▪ - It will make frame extraction ▪ - It will use secret key for the hidden message decryption. ▪ - Besides that,receiver will enter decryption key to view the secret message 8
  • 10. 10
  • 11. “ CHAPTER 3 : METHODOLOGY 11
  • 13. ENCODING PSEUDOCODE START Display name of video after selecting by user Display video frames by frames Display total number of video frames Display current number of video frames Display name of text file which user already write down the message Value needed for user input to process encryption Display progress on encryption process Display message which user input and cipher text after encryption Display status of embedding process END 13
  • 15. START Display stego video that user has chosen Display video frames by frames ▪ END Display total number of video frames Display current number of video frames Display status of embedding process Slot for user to input original text Display cipher text that have been extracted and the original message User input the key for message encryption Encryption Process 15
  • 16. DECODING PSEUDOCODES START Display name of stego video Display stego video that user has chosen Display total number of video frames Display current number of video frames Slot for user to input which frame that hides the message Slot for user to input the process decryption Display cipher text that have been extracted END 16
  • 18. START Display name of stego video Display stego video that user has chosen ▪ END Display total number of video frames Display current number of video frames Display cipher text that have been extracted Slot for user to input which frame that hides the Slot for user to input the process decryption message 18
  • 19. HARDWARE AND SOFTWARE REQUIREMENT  Laptop 6GB RAM  Matlab R2017a  Microsoft Word  Wifi 19
  • 21. THANKS! ▪ [1] Yi-Tu.Wu, F.Y. Shih, Genetic algorithm based methodology for breaking the steganalytic systems, Systems, Man and Cybernetics, Part B: Cybernetics, IEEE Transactions on,36(1),Feb 2006,24-31. ▪ [2] M. Kharrazi, H.T. Cover Selection for Steganographic Embedding, Image Processing, IEEE International Conference, Oct 2006, Atlanta, GA ▪ [3] Al- Ethawi G. A. Salman, "Text hiding in image border" Dean of the Military College of Engineering, MsC. Thesis, 2002. ▪ [4] J. Ashok, Y. Raju, S. Munishankaralah and K. Srinnivas," Steganography : An Overview ", International Journal of Engineering Science and Technology, Vol. No 2(10), pp: 5985-5992, 2010. ▪ [5] S. Katzenbeisser, F. A.P. Petitcolas, " Information hiding techniques for steganography and digital watermarking ", pp: 20 - 23, June, 1999. ▪ [6] B.G.AAGARSANA, ANJALI, T.K.KIRTHIKA, Mr. S. SIVAKUMAR,(2018), IMAGE STEGANOGRAPHY USING SECURED FORCE ALGORITHM FOR HIDING AUDIO SIGNAL INTO COLOUR IMAGE, International Research Journal of Engineering and Technology (IRJET) , 5:1224-1228 ▪ [7] Bharti Chandel, Dr.Shaily Jain, " Video Steganography: A Survey ",OSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 1, Ver. III (Jan – Feb. 2016) 21 REFERENCES