SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 02 | Feb 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 24
Efficient Data Embedding and Data Encryption in video Stream
Ms. Rupali D. Wankhade1, Dr. G.R. Bamnote2, Ms. S.W. Ahmad3
1ME FT Final Year, Computer Science & Engineering, P.R.M.T&R, Badnera
2Head & Professor, Dept. Computer Science & Engg, PRMIT&R, Badnera, Amravati
3Astt. Professor, Dept. Computer Sci. & Engg., PRMIT&R, Badnera
----------------------------------------------------------------------------***-----------------------------------------------------------------------------
Abstract: - Now day’s Digital video needs to be stored and
processed in an encrypted format to maintain security and
privacy. Data hiding in encrypted data without decryption
preserves the confidentiality of the data. In addition, it is
more efficient without decryption followed by data hiding
and re-encryption. The data hiding directly in the encrypted
version of H.264/AVC video stream is proposed, which
includes the following three parts, i.e., H.264/AVC video
encryption, data embedding, and data extraction. By
analysing the method of H.264/AVC codec, thecodewords of
intraprediction modes, the code words of motion vector
differences, and the code words of residual coefficients are
encrypted with stream ciphers. Then, a data hider may
embed additional data in the encrypted domain by using
codeword substitution technique, without knowing the
original video content. In order to adapt to different technic
application scenarios, data extraction can be done either in
the encrypted domain or in the decrypted domain.
Furthermore, video file size is strictly hide even after
encryption and data embedding.
Keywords: Data Hiding Encrypted Domain, H.264/AVC,
Codeword Substituting
1. Introduction
The Cloud computing has become a much required
technology, whichprovides efficientcomputationandlarge
storage of solution for video data. Cloud provide services
may more protection to attract more attacks and are
vulnerable to untrustworthy system administrators, it is
desired that the video content can be accessible in
encrypted form. The capacity of performing data hiding
directly in encrypted H.264/AVC video streams avoid the
leakage of video data, this protects privacy and security
concerns with cloud computing.[1] For example, a cloud
server can embed the additional information into an
encrypted H.264/AVC video by using data hiding
technique. The server can manage the video and
crosscheck its integrity without knowing the actual
content, then helps to protect privacy and security. This
technology can be used in other application. For example,
when surveillance videos or medical videos have been
encrypted for protecting the privacy and security of the
people, a database manager can add the personal
information into the corresponding encrypted videos is
provide to data management capabilities in the encrypted
domain.
The increasing demands of providing video data in high
security and privacy protection, data hiding in encrypted
H.264/AVC videos will undoubtedlybecomepopularinthe
future. Due to the constraint of encryption, it is very
difficult and sometimes impossible to transplant the
existing data hiding algorithmstotheencrypteddomain.In
the paper gives the data hiding, on the implementation of
data hiding in encrypted H.264/AVC video streams.
H.264/AVC having various advances in standard video
coding innovation, as far as both coding proficiency
improvement and adaptability for powerful use over a
wide assortment of system sorts and application spaces
H.264/AVC is a video pressure design i.e. standardforhigh
definition (HD) advanced video.
2. System Implementation
The Video Encryption and Sharing is an
application developed for preventing hacking of videos
being shared via users. The source video is uploaded by
the user itself which undergoes through various
processes. First we take the video undergoes different
encryption process separately. We use RSA algorithm for
encryption techniques. In this system, video will be saved
in encrypted format and saved on the server directly.
After video is successfully uploaded, User can then share
the video by selecting the users he wants to share with.
User will get list of videos uploaded by him and videos
shared with him. He can just select the video and send to
another user. Encrypted parts of video is decrypted with
their respective algorithm and merged together, And
Original video is retrieved and view receiver user. Access
to the shared video can be withdrawn by the owner itself.
The application makes the sharing of video very secure
which makes this developed application unique from
others.
The security provides of video processing is an
emerging technology used for preserving the privacy. In
this paper mainly focus on video data and problem,
challenges in securely managing secret video while data
online share. There are three factors for evaluating a
secure video processing i.e. security, performance, and
complexity [1]. In high secure video processing, the users
store their secret videos in encrypted form.Therearetwo
parts in the system, the user who owns original
information and server who stores the encrypted videos
and performs processing tasks. In this paper contains
processing tasks, video search, classification, and
summarization. Video recall is a task of extracting a set of
images called as video frames to represent the original
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 02 | Feb 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 25
video contents. Videoclassificationsmeanthatclassifythe
video into a different category.
The reversible data hiding focuses on the data
embedding and data extracting on the plainspatial domain
[3].There are two keys encryption and data hider key. In
this paper, it used an improved Zhang’s version for
reversible data hiding method in encrypted images. The
Zhang proposed the image encryption and decryption
parts. In that, the content owner encrypts the original
image using the encryption key and passes that encrypted
image and embeds the data or additional data to the
encrypted image by using data hider key to the receiver
side.
Fig 1: Reversible data hiding in encrypted image.
The selective encryption (SE) is performed by using
pseudo-random inverting sign. The H.264/AVC contains
two types of entropy coding modules, context-adaptive
variable length coding (CAVLC) supports video baseline
profile and context-adaptive binary arithmetic coding
(CABAC) supports video main profile. A selective
encryption scheme based on H.264/AVC has been
presented in CAVLC andCABAC.TheCAVLCandCABACare
used for I and P frames [7]. Selective encryption (SE)
performed by using advanced encryption standard(AES)
with the cipher feedback mode. The AES algorithm can
support different cipher modes means electronic code
block, cipher block chaining, output feedback, cipher
feedback, here it used cipher feedback mode.
The particular reversible information hiding contains
content owner encrypts original imageusinganencryption
key. By using the data hiding key data hider compressleast
significant bits of the encrypted image [6]. In that, the
content owner encrypts the original image using the
encryption key and embeds the data or additional data to
the encrypted image by using data hider key. For
embedding the data uses the LSB (Least significant bit).
Embed the secret data to bit pixel of that each encrypted
image. In the receiver side first, decrypt the imagebyusing
an encryption key and then extract the data and image
recovery using data hider key. If the receiver knows the
encryption key then they only decrypt the image, or if the
receiver knows only data hider key then they only decrypt
the secret information. Here uses the lossless compression
method that contains additional information can be
extracted and also the original content of the image is also
recovered this is a limitation. So use loss compression, it is
compatible with the encrypted image. It is necessary to
watermark the compressed encrypted media items in the
compressed-encrypted domain itself for tampering
detection and ownership declaration or copyright
purposes [4]. There is a challenge to watermark these
encrypted streams as the compression process embed the
information into the encrypted bit stream.
It is necessary to select an encryption of data very secure
and watermarking in an encrypted format. It contains the
H.264AVC/SVC video encryption, also achieved the
scalability, privacy, security, compression efficiency.Inthe
H.264/AVC encryption contains the four parts, encryption
before compression, integrated encryption, the bit stream
(oriented encryption), SVC encryption. The integrated
encryption containsinterpredictionmode,interprediction
mode, motion vector difference, secret transform [8].The
video encryption scheme depends on the application
context.
For privacy the video encryption is the main task. Here a
secure approach to encrypting H.264 is to encrypt the
entire H.264-bit stream using the AES algorithm with the
cipher block. This paper is structured in following parts,
briefly summarization of H.264, application scenario of
video encryption and their corresponding different
notations. The encryption of video scheme preserves the
functionality of video bit stream.
In this paper, scheme contains the mainlythreeparts,intra
prediction mode, motion vector difference and residual
encryption data. The proposed scheme achieves the
computational efficiency, the time efficiency, security. But
the limitation of this is that the encryption and embedding
the data can be done in the encoding process and the
extraction and decryption of video done in the decoding
process. Compression and decompression did
simultaneously. So it is very time consuming andeffectson
real-time applications [5].
The existing system contains data hiding is performed
directly in encrypted H.264/AVC video bit stream. The
scheme can be both the format compliance and the strict
file size preservation. Encryption and data hiding
completed at the time of H.264/AVC encodingprocess.The
disadvantages of the existing system areita degradationof
video quality.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 02 | Feb 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 26
After analysing the above papers the proposedschema can
achieve better performance in the following different
aspects:
 The JPEG2000 imagesworkshavebeenfocusedonimage.
With the increasing demands of video data security and
privacy protection is the main task.
H.264/AVC video encryption scheme with have good
performance including security and privacy.
 After analysing the property of H.264/AVC video codec,
there are three parts IPMs, MVDs, and residual encryption
data that are also supported for H265/HEVCareencrypted
with stream ciphers
The following is the advantages of proposed schema:
 Data hiding: Data hiding is one technique used for
security purpose. It hides data into the image, video.
 Encrypted Domain: It is done by using the encryption
algorithm. Plaintext is converted into ciphertext.
 Codeword: a code word is an element of a standardized
code, used for embedding the data.
 Substituting: Substitution allows forrecursive evaluation
through macro templates
3. Result & Discussion
The information hiding techniqueinH.264/AVCencrypted
video stream by using codeword substitution technique.
That includes the three main parts, video encryption, data
embedding and data extraction. The content owner
encrypts the original video stream using a standard cipher
with the help of public and private key and then produces
the encrypted video. In the video encryption, there is
public and private key is generated by using the RSA
algorithm. The data hider embeds the additional data into
the encrypted video stream by using the codeword
method, that all process gets happened in the sender side.
Hidden data get extracted form in receiver side.
A. Problem Definition
Information hiding in encrypted of privacy-preserving
requirementsofclouddata management.Theencryptionof
H.264/AVC bitstream, which consists of encryption of
videos, data embedding, and data extraction phases. The
information hide in it follows the without decrypting the
data, the data hiding and re-encryption takes place.Thebit
stream stored the information exactlyafter encryptionand
data embedding. For the data embedding, the code word
substitution technique is used, even though it does not
know the original video content.
B. Mathematical Model
S={IV, F,A, SF, D, EK, DK,OV, C} Here, S represents system
with several parameters as follows:
IV= input video
F={F1, F2....Fn} set of frames
F ϵ IV SF=selected frame
SF ϵ F SF= F/(Data size (in KB))
A=Audio file
EK ={EK1,EK2……EKn} encryption keys
DK={DK1, DK2…..DKn} decryption keys
C is codeword C={Coeff_token,Sign_of_TrailingOnes,Level,
Total zeros, Run before}
OV=Original video.
C. System Modules
System module having three main parts
1. To generate public key & private key,
2. Data embedding,
3. Data extraction.
1. To generate the public key and private key requirestime
efficient scheme to meet the requirement of real-time. The
scheme proposed security, efficiency and format
compliance. After analysing the property of video codec
they contain to generate public key and private key with
the help of RSA algorithm. In the encrypted video, it
decoded by the standard decoder, but in the encryption
video is totally different compared to the plaintext video
data. The video contain firstly encrypt then Extraction of
video contain into the number of frames. Firstly the video
data must be extract or divide into audio and the number
of frames. Then the operations are performed on that
selected frames, encrypt the frames and passes it for
embedding of data.
Fig 2: Encrypted & Decrypted scheme diagram. (a) Video
encryption and data embedding at the sender side (b)
Extraction of data and decrypted video at the receiver
side.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 02 | Feb 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 27
a. Intra prediction mode:
There are four types of intra prediction modes. Intra_4*4,
intra_16*16,intra_chroma,I_pcm.Intra_4*4andintra_16*16
chosen for the encryption purpose. They contain the
macroblocks. At the time of the encryption, it takes the
previously predicted block and the current block can be
encrypted. The codeword length do not changed means
that original codeword and encrypted codeword remains
the same size.
b. Residual data encryption:Itkeepsthehighsecuritythere
is one type of data called as residual data. That can be
encrypted I frames and P frames.
2. Data embedding of data contains embed the additional
data into the encrypted video stream.Theresomemethods
for embedding the data into the videos which are used i.e.
LSB, codeword method. LSB (List Significant Bit) means it
embeds the bit of message into the each pixel of that image
called LSB technique. Here we used codeword for
embedding the data. Therearethreelimitationsthatsatisfy
codeword method.
1. First, the bit stream after codeword substitution
decoded by the standard decoder.
2. Second, keep that bit rate remains unchanged, means
that the original codeword and substituted codeword
should have the same size.
3. Third, after decryption of video the information remains
hidden, it cannot visible to a human observer. For
embedding data into the encrypted video there are the
following the procedure:
Step1. Some additional data is encrypted with
pseudorandom sequence P. Sequence P is generated by
using public key & private key. It is difficult to anyone who
does not know public key & private key to recover the
hidden data.
Step 2. Codeword belongs to codespacesC0orC1to embed
the data bit. If the data bit is 0 and codeword belong to
codespace C0 then codeword unmodified, or if the data bit
is 0 and codeword belongs to codespace C1 then replaced
with the corresponding codeword in C0.
Step3. If the data bit is 1 and codeword belong to
codespace C1 then codeword unmodified, or if the data bit
is 1 and codeword belong to codespace C0 then replaced
with the corresponding codeword in C1.
Step4. Take the next codeword and then go to step2 and
step3. If all the data must be embed then stop the
embedding process.
3. Data extraction can be done in the encrypted domain
and decrypted domain. In encrypted domain contains
extraction of hidden data and then decrypt the data by
using encryption key. In decrypted domain, firstly contain
decryption of data using an encryption key and then
extract data using data hider key means public and private
key. If the codeword belongs to codespace C0 then
extracted data bit is 0. If the codeword belongs to
codespace C1 then extracted data bit is 1.
E. Data hiding architecture contains components of data
hiding in the encrypted video and those encrypted video
must be decrypted in original bit rate.
Case I: To select the particular video then firstly encrypted
the data by generating the public key and private key.
Case II: To uploading the video then those video must be
encrypted in two way by using public key and private
key by using RSA algorithm.
Case III: Most high secured data must be stored in cloud
then hacker do not hack the data.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 02 | Feb 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 28
4. CONCLUSION
The recent technology inData Encrypt in Video Stream by
Efficient Data Embedding has started topayanattentionto
the storage and privacy requirements from cloud server.
An algorithm is used to embed additional information in
encrypted H.264/AVC bit stream presented, which have
the video encryption, data embedding and data extraction
stages. The bit-rate is preserved by an algorithm exactly
even after encryption and data embedding, also simple to
implement as it is directly performed in the compressed
and encrypted domain, that is it does not require
decrypting or partial decompression of the video stream
thus making it ideal for real-time video applications.
Additional data is been added by the data hider into the
encrypted bitstream using codeword substituting, even
though the original information content are not known
Information hiding in the encrypted video by using public
key & private key for preservingthe privacyandsecurityof
video which requiredintothecloudcomputing.Embedding
the data into the video stream uses the codeword
substitution method. At the time of data encryption the
data, hider does not know the original video contents.Data
extraction is done in the encrypted domain and in
decrypted domain. This application provides
confidentiality of video content and also gives the privacy
and security of quality of the video.
5. Future Scope
This Application provides thesecurityaswell askeepaway
the hacker form hacking the video contents because the
Application provide first RSA public and private key
generate using video encrypt than video framing images.
Then the Encrypted files is upload on server ,than server
provide decryption of the data at receiver side most of
security provided through the application such as
important video conference, governmentvideoconference,
lecture in private sector etc.
This application is enabling to suggest the user to the
appropriate video security and size of video as per his/her
requirements. In future, to enhance the algorithm to find
out the statistical trustworthiness of vender by tracking
their behaviour like hacker, user satisfaction for security,
etc.
6. References
[1] Johnathan Cummins, Patrick Diskin, Samuel Lau,
Robert Parlett, Steganography: The Art of Hiding,
School Of Computer Science, The University Of
Birmingham.
[2] X. P. Zhang, “Reversible data hiding in encrypted
image,” IEEE Signal Process. Lett.,vol.18,no.4, pp.
255–258, Apr. 2011.
[3] W. Hong, T. S. Chen, and H. Y. Wu, “An improved
reversible data hiding in encrypted images using
side match,” IEEE Signal Process. Lett., vol. 19, no.
4, pp. 199–202, Apr. 2012
[4] Choudry, K.N. and Wanjari, A., 2015. A Survey
Paper on Video Steganography.International
Journal of Computer Science and Information
Technologies, 6(3), pp.2335-2338.
[5] Mukherjee, S. and Sanyal, G., 2015, November. A
novel image steganographic technique using
Position Power First Mapping (PPFM). In
Research in Computational Intelligence and
Communication Networks (ICRCICN), 2015 IEEE
International Conference on (pp. 406- 410). IEEE.
[6] T. Stutz and A. Uhl, “A survey of H.264 AVC/SVC
encryption, ”IEEE Trans. Circuits Syst. Video
Technol., vol. 22, no. 3, pp. 325–339, Mar. 2012.
[14]S. G. Lian, Z. X. Liu, and Z. Ren, “Commutative
encryption and watermarking in video
compression,” IEEE Trans. Circuits Syst. Video
Technol. , vol. 17, no. 6, pp. 774–778, Jun. 2007.
[7] D. W. Xu, R. D. Wang, and J. C. Wang, “Prediction
mode modulated data hiding algorithm for
H.264/AVC,” J. RealTime Image Process.,vol.7,no.
4, pp. 205–214, 2012.
[8] R. Sridevi, V. L. Paruchuri, and K.S. Rao, “Image
steganography combined with cryptography”,
International Journal of Computers &Technology,
Vol.9, pp. 976-984, July2001.

More Related Content

PDF
V01 i010410
PDF
IRJET- Lossless Encryption Technique for Finger Biometric Images
PDF
IRJET- Low Band Width High Secured Image Transmission in Robust Channels
PDF
IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...
PDF
IRJET- Cipher Text Policy Attribute based Encryption by Deduplication for Tim...
PDF
Cloud Data Security using Elliptic Curve Cryptography
PDF
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
PDF
IRJET - Image Watermarking using QR Code
V01 i010410
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET- Low Band Width High Secured Image Transmission in Robust Channels
IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...
IRJET- Cipher Text Policy Attribute based Encryption by Deduplication for Tim...
Cloud Data Security using Elliptic Curve Cryptography
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET - Image Watermarking using QR Code

What's hot (19)

PDF
18 17 jan17 13470 rakesh ahuja revised-version(edit)
PDF
International Journal of Engineering Research and Development (IJERD)
PDF
secure Audio Data Transfer Over Internet Using Steganography
PDF
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
PPT
Data+security+sp10
PDF
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
PPT
Cisco packettracer overview_20jul09
PDF
IRJET- Secure Data Protection in Cloud Computing
PDF
IRJET- Multimedia Content Security with Random Key Generation Approach in...
PDF
A Brief Study of Video Encryption Algorithms
PPTX
Itn instructor ppt_chapter1 exploring the network smartskills
PDF
Secure image encryption using aes
PDF
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
PDF
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
PDF
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
PDF
Welcome to International Journal of Engineering Research and Development (IJERD)
PDF
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
PDF
IRJET- I-Share: A Secure Way to Share Images
PDF
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
18 17 jan17 13470 rakesh ahuja revised-version(edit)
International Journal of Engineering Research and Development (IJERD)
secure Audio Data Transfer Over Internet Using Steganography
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
Data+security+sp10
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
Cisco packettracer overview_20jul09
IRJET- Secure Data Protection in Cloud Computing
IRJET- Multimedia Content Security with Random Key Generation Approach in...
A Brief Study of Video Encryption Algorithms
Itn instructor ppt_chapter1 exploring the network smartskills
Secure image encryption using aes
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
Welcome to International Journal of Engineering Research and Development (IJERD)
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- I-Share: A Secure Way to Share Images
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
Ad

Similar to IRJET- Efficient Data Embedding and Data Encryption in Video Stream (20)

PDF
IRJET- Data Hiding in Video Stream by Efficient Data Embedding
PPTX
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
PDF
IRJET - Information Hiding in H.264/AVC using Digital Watermarking
PDF
7. manuscript edit sat
PDF
AVC VIDEO SECURITY ON WIRELESS CHANNEL
PDF
Z03301550160
PDF
DCT Based Secret Image Hiding In Video Sequence
PPTX
Robust video data hiding using forbidden zone data hiding and selective embed...
PDF
Optimization of video steganography with additional compression and encryption
PDF
Information hiding in edge location of video using amalgamate fft and cubic s...
PDF
Ge3611231125
PDF
Ja2415771582
PDF
International Refereed Journal of Engineering and Science (IRJES)
PDF
CR_CSI_119
PDF
It3116411644
PDF
Novel lightweight video encryption method based on ChaCha20 stream cipher an...
PDF
Partial encryption of compresed video
PDF
Partial encryption of compressed video
PDF
Secured Data Transmission Using Video Steganographic Scheme
PDF
Robust video data hiding using forbidden zone
IRJET- Data Hiding in Video Stream by Efficient Data Embedding
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
IRJET - Information Hiding in H.264/AVC using Digital Watermarking
7. manuscript edit sat
AVC VIDEO SECURITY ON WIRELESS CHANNEL
Z03301550160
DCT Based Secret Image Hiding In Video Sequence
Robust video data hiding using forbidden zone data hiding and selective embed...
Optimization of video steganography with additional compression and encryption
Information hiding in edge location of video using amalgamate fft and cubic s...
Ge3611231125
Ja2415771582
International Refereed Journal of Engineering and Science (IRJES)
CR_CSI_119
It3116411644
Novel lightweight video encryption method based on ChaCha20 stream cipher an...
Partial encryption of compresed video
Partial encryption of compressed video
Secured Data Transmission Using Video Steganographic Scheme
Robust video data hiding using forbidden zone
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
Sustainable Sites - Green Building Construction
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
OOP with Java - Java Introduction (Basics)
PDF
composite construction of structures.pdf
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPT
introduction to datamining and warehousing
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPT
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
Current and future trends in Computer Vision.pptx
PPT
Mechanical Engineering MATERIALS Selection
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Sustainable Sites - Green Building Construction
Model Code of Practice - Construction Work - 21102022 .pdf
OOP with Java - Java Introduction (Basics)
composite construction of structures.pdf
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
bas. eng. economics group 4 presentation 1.pptx
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
introduction to datamining and warehousing
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Foundation to blockchain - A guide to Blockchain Tech
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Current and future trends in Computer Vision.pptx
Mechanical Engineering MATERIALS Selection
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx

IRJET- Efficient Data Embedding and Data Encryption in Video Stream

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 02 | Feb 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 24 Efficient Data Embedding and Data Encryption in video Stream Ms. Rupali D. Wankhade1, Dr. G.R. Bamnote2, Ms. S.W. Ahmad3 1ME FT Final Year, Computer Science & Engineering, P.R.M.T&R, Badnera 2Head & Professor, Dept. Computer Science & Engg, PRMIT&R, Badnera, Amravati 3Astt. Professor, Dept. Computer Sci. & Engg., PRMIT&R, Badnera ----------------------------------------------------------------------------***----------------------------------------------------------------------------- Abstract: - Now day’s Digital video needs to be stored and processed in an encrypted format to maintain security and privacy. Data hiding in encrypted data without decryption preserves the confidentiality of the data. In addition, it is more efficient without decryption followed by data hiding and re-encryption. The data hiding directly in the encrypted version of H.264/AVC video stream is proposed, which includes the following three parts, i.e., H.264/AVC video encryption, data embedding, and data extraction. By analysing the method of H.264/AVC codec, thecodewords of intraprediction modes, the code words of motion vector differences, and the code words of residual coefficients are encrypted with stream ciphers. Then, a data hider may embed additional data in the encrypted domain by using codeword substitution technique, without knowing the original video content. In order to adapt to different technic application scenarios, data extraction can be done either in the encrypted domain or in the decrypted domain. Furthermore, video file size is strictly hide even after encryption and data embedding. Keywords: Data Hiding Encrypted Domain, H.264/AVC, Codeword Substituting 1. Introduction The Cloud computing has become a much required technology, whichprovides efficientcomputationandlarge storage of solution for video data. Cloud provide services may more protection to attract more attacks and are vulnerable to untrustworthy system administrators, it is desired that the video content can be accessible in encrypted form. The capacity of performing data hiding directly in encrypted H.264/AVC video streams avoid the leakage of video data, this protects privacy and security concerns with cloud computing.[1] For example, a cloud server can embed the additional information into an encrypted H.264/AVC video by using data hiding technique. The server can manage the video and crosscheck its integrity without knowing the actual content, then helps to protect privacy and security. This technology can be used in other application. For example, when surveillance videos or medical videos have been encrypted for protecting the privacy and security of the people, a database manager can add the personal information into the corresponding encrypted videos is provide to data management capabilities in the encrypted domain. The increasing demands of providing video data in high security and privacy protection, data hiding in encrypted H.264/AVC videos will undoubtedlybecomepopularinthe future. Due to the constraint of encryption, it is very difficult and sometimes impossible to transplant the existing data hiding algorithmstotheencrypteddomain.In the paper gives the data hiding, on the implementation of data hiding in encrypted H.264/AVC video streams. H.264/AVC having various advances in standard video coding innovation, as far as both coding proficiency improvement and adaptability for powerful use over a wide assortment of system sorts and application spaces H.264/AVC is a video pressure design i.e. standardforhigh definition (HD) advanced video. 2. System Implementation The Video Encryption and Sharing is an application developed for preventing hacking of videos being shared via users. The source video is uploaded by the user itself which undergoes through various processes. First we take the video undergoes different encryption process separately. We use RSA algorithm for encryption techniques. In this system, video will be saved in encrypted format and saved on the server directly. After video is successfully uploaded, User can then share the video by selecting the users he wants to share with. User will get list of videos uploaded by him and videos shared with him. He can just select the video and send to another user. Encrypted parts of video is decrypted with their respective algorithm and merged together, And Original video is retrieved and view receiver user. Access to the shared video can be withdrawn by the owner itself. The application makes the sharing of video very secure which makes this developed application unique from others. The security provides of video processing is an emerging technology used for preserving the privacy. In this paper mainly focus on video data and problem, challenges in securely managing secret video while data online share. There are three factors for evaluating a secure video processing i.e. security, performance, and complexity [1]. In high secure video processing, the users store their secret videos in encrypted form.Therearetwo parts in the system, the user who owns original information and server who stores the encrypted videos and performs processing tasks. In this paper contains processing tasks, video search, classification, and summarization. Video recall is a task of extracting a set of images called as video frames to represent the original
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 02 | Feb 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 25 video contents. Videoclassificationsmeanthatclassifythe video into a different category. The reversible data hiding focuses on the data embedding and data extracting on the plainspatial domain [3].There are two keys encryption and data hider key. In this paper, it used an improved Zhang’s version for reversible data hiding method in encrypted images. The Zhang proposed the image encryption and decryption parts. In that, the content owner encrypts the original image using the encryption key and passes that encrypted image and embeds the data or additional data to the encrypted image by using data hider key to the receiver side. Fig 1: Reversible data hiding in encrypted image. The selective encryption (SE) is performed by using pseudo-random inverting sign. The H.264/AVC contains two types of entropy coding modules, context-adaptive variable length coding (CAVLC) supports video baseline profile and context-adaptive binary arithmetic coding (CABAC) supports video main profile. A selective encryption scheme based on H.264/AVC has been presented in CAVLC andCABAC.TheCAVLCandCABACare used for I and P frames [7]. Selective encryption (SE) performed by using advanced encryption standard(AES) with the cipher feedback mode. The AES algorithm can support different cipher modes means electronic code block, cipher block chaining, output feedback, cipher feedback, here it used cipher feedback mode. The particular reversible information hiding contains content owner encrypts original imageusinganencryption key. By using the data hiding key data hider compressleast significant bits of the encrypted image [6]. In that, the content owner encrypts the original image using the encryption key and embeds the data or additional data to the encrypted image by using data hider key. For embedding the data uses the LSB (Least significant bit). Embed the secret data to bit pixel of that each encrypted image. In the receiver side first, decrypt the imagebyusing an encryption key and then extract the data and image recovery using data hider key. If the receiver knows the encryption key then they only decrypt the image, or if the receiver knows only data hider key then they only decrypt the secret information. Here uses the lossless compression method that contains additional information can be extracted and also the original content of the image is also recovered this is a limitation. So use loss compression, it is compatible with the encrypted image. It is necessary to watermark the compressed encrypted media items in the compressed-encrypted domain itself for tampering detection and ownership declaration or copyright purposes [4]. There is a challenge to watermark these encrypted streams as the compression process embed the information into the encrypted bit stream. It is necessary to select an encryption of data very secure and watermarking in an encrypted format. It contains the H.264AVC/SVC video encryption, also achieved the scalability, privacy, security, compression efficiency.Inthe H.264/AVC encryption contains the four parts, encryption before compression, integrated encryption, the bit stream (oriented encryption), SVC encryption. The integrated encryption containsinterpredictionmode,interprediction mode, motion vector difference, secret transform [8].The video encryption scheme depends on the application context. For privacy the video encryption is the main task. Here a secure approach to encrypting H.264 is to encrypt the entire H.264-bit stream using the AES algorithm with the cipher block. This paper is structured in following parts, briefly summarization of H.264, application scenario of video encryption and their corresponding different notations. The encryption of video scheme preserves the functionality of video bit stream. In this paper, scheme contains the mainlythreeparts,intra prediction mode, motion vector difference and residual encryption data. The proposed scheme achieves the computational efficiency, the time efficiency, security. But the limitation of this is that the encryption and embedding the data can be done in the encoding process and the extraction and decryption of video done in the decoding process. Compression and decompression did simultaneously. So it is very time consuming andeffectson real-time applications [5]. The existing system contains data hiding is performed directly in encrypted H.264/AVC video bit stream. The scheme can be both the format compliance and the strict file size preservation. Encryption and data hiding completed at the time of H.264/AVC encodingprocess.The disadvantages of the existing system areita degradationof video quality.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 02 | Feb 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 26 After analysing the above papers the proposedschema can achieve better performance in the following different aspects:  The JPEG2000 imagesworkshavebeenfocusedonimage. With the increasing demands of video data security and privacy protection is the main task. H.264/AVC video encryption scheme with have good performance including security and privacy.  After analysing the property of H.264/AVC video codec, there are three parts IPMs, MVDs, and residual encryption data that are also supported for H265/HEVCareencrypted with stream ciphers The following is the advantages of proposed schema:  Data hiding: Data hiding is one technique used for security purpose. It hides data into the image, video.  Encrypted Domain: It is done by using the encryption algorithm. Plaintext is converted into ciphertext.  Codeword: a code word is an element of a standardized code, used for embedding the data.  Substituting: Substitution allows forrecursive evaluation through macro templates 3. Result & Discussion The information hiding techniqueinH.264/AVCencrypted video stream by using codeword substitution technique. That includes the three main parts, video encryption, data embedding and data extraction. The content owner encrypts the original video stream using a standard cipher with the help of public and private key and then produces the encrypted video. In the video encryption, there is public and private key is generated by using the RSA algorithm. The data hider embeds the additional data into the encrypted video stream by using the codeword method, that all process gets happened in the sender side. Hidden data get extracted form in receiver side. A. Problem Definition Information hiding in encrypted of privacy-preserving requirementsofclouddata management.Theencryptionof H.264/AVC bitstream, which consists of encryption of videos, data embedding, and data extraction phases. The information hide in it follows the without decrypting the data, the data hiding and re-encryption takes place.Thebit stream stored the information exactlyafter encryptionand data embedding. For the data embedding, the code word substitution technique is used, even though it does not know the original video content. B. Mathematical Model S={IV, F,A, SF, D, EK, DK,OV, C} Here, S represents system with several parameters as follows: IV= input video F={F1, F2....Fn} set of frames F ϵ IV SF=selected frame SF ϵ F SF= F/(Data size (in KB)) A=Audio file EK ={EK1,EK2……EKn} encryption keys DK={DK1, DK2…..DKn} decryption keys C is codeword C={Coeff_token,Sign_of_TrailingOnes,Level, Total zeros, Run before} OV=Original video. C. System Modules System module having three main parts 1. To generate public key & private key, 2. Data embedding, 3. Data extraction. 1. To generate the public key and private key requirestime efficient scheme to meet the requirement of real-time. The scheme proposed security, efficiency and format compliance. After analysing the property of video codec they contain to generate public key and private key with the help of RSA algorithm. In the encrypted video, it decoded by the standard decoder, but in the encryption video is totally different compared to the plaintext video data. The video contain firstly encrypt then Extraction of video contain into the number of frames. Firstly the video data must be extract or divide into audio and the number of frames. Then the operations are performed on that selected frames, encrypt the frames and passes it for embedding of data. Fig 2: Encrypted & Decrypted scheme diagram. (a) Video encryption and data embedding at the sender side (b) Extraction of data and decrypted video at the receiver side.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 02 | Feb 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 27 a. Intra prediction mode: There are four types of intra prediction modes. Intra_4*4, intra_16*16,intra_chroma,I_pcm.Intra_4*4andintra_16*16 chosen for the encryption purpose. They contain the macroblocks. At the time of the encryption, it takes the previously predicted block and the current block can be encrypted. The codeword length do not changed means that original codeword and encrypted codeword remains the same size. b. Residual data encryption:Itkeepsthehighsecuritythere is one type of data called as residual data. That can be encrypted I frames and P frames. 2. Data embedding of data contains embed the additional data into the encrypted video stream.Theresomemethods for embedding the data into the videos which are used i.e. LSB, codeword method. LSB (List Significant Bit) means it embeds the bit of message into the each pixel of that image called LSB technique. Here we used codeword for embedding the data. Therearethreelimitationsthatsatisfy codeword method. 1. First, the bit stream after codeword substitution decoded by the standard decoder. 2. Second, keep that bit rate remains unchanged, means that the original codeword and substituted codeword should have the same size. 3. Third, after decryption of video the information remains hidden, it cannot visible to a human observer. For embedding data into the encrypted video there are the following the procedure: Step1. Some additional data is encrypted with pseudorandom sequence P. Sequence P is generated by using public key & private key. It is difficult to anyone who does not know public key & private key to recover the hidden data. Step 2. Codeword belongs to codespacesC0orC1to embed the data bit. If the data bit is 0 and codeword belong to codespace C0 then codeword unmodified, or if the data bit is 0 and codeword belongs to codespace C1 then replaced with the corresponding codeword in C0. Step3. If the data bit is 1 and codeword belong to codespace C1 then codeword unmodified, or if the data bit is 1 and codeword belong to codespace C0 then replaced with the corresponding codeword in C1. Step4. Take the next codeword and then go to step2 and step3. If all the data must be embed then stop the embedding process. 3. Data extraction can be done in the encrypted domain and decrypted domain. In encrypted domain contains extraction of hidden data and then decrypt the data by using encryption key. In decrypted domain, firstly contain decryption of data using an encryption key and then extract data using data hider key means public and private key. If the codeword belongs to codespace C0 then extracted data bit is 0. If the codeword belongs to codespace C1 then extracted data bit is 1. E. Data hiding architecture contains components of data hiding in the encrypted video and those encrypted video must be decrypted in original bit rate. Case I: To select the particular video then firstly encrypted the data by generating the public key and private key. Case II: To uploading the video then those video must be encrypted in two way by using public key and private key by using RSA algorithm. Case III: Most high secured data must be stored in cloud then hacker do not hack the data.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 02 | Feb 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 28 4. CONCLUSION The recent technology inData Encrypt in Video Stream by Efficient Data Embedding has started topayanattentionto the storage and privacy requirements from cloud server. An algorithm is used to embed additional information in encrypted H.264/AVC bit stream presented, which have the video encryption, data embedding and data extraction stages. The bit-rate is preserved by an algorithm exactly even after encryption and data embedding, also simple to implement as it is directly performed in the compressed and encrypted domain, that is it does not require decrypting or partial decompression of the video stream thus making it ideal for real-time video applications. Additional data is been added by the data hider into the encrypted bitstream using codeword substituting, even though the original information content are not known Information hiding in the encrypted video by using public key & private key for preservingthe privacyandsecurityof video which requiredintothecloudcomputing.Embedding the data into the video stream uses the codeword substitution method. At the time of data encryption the data, hider does not know the original video contents.Data extraction is done in the encrypted domain and in decrypted domain. This application provides confidentiality of video content and also gives the privacy and security of quality of the video. 5. Future Scope This Application provides thesecurityaswell askeepaway the hacker form hacking the video contents because the Application provide first RSA public and private key generate using video encrypt than video framing images. Then the Encrypted files is upload on server ,than server provide decryption of the data at receiver side most of security provided through the application such as important video conference, governmentvideoconference, lecture in private sector etc. This application is enabling to suggest the user to the appropriate video security and size of video as per his/her requirements. In future, to enhance the algorithm to find out the statistical trustworthiness of vender by tracking their behaviour like hacker, user satisfaction for security, etc. 6. References [1] Johnathan Cummins, Patrick Diskin, Samuel Lau, Robert Parlett, Steganography: The Art of Hiding, School Of Computer Science, The University Of Birmingham. [2] X. P. Zhang, “Reversible data hiding in encrypted image,” IEEE Signal Process. Lett.,vol.18,no.4, pp. 255–258, Apr. 2011. [3] W. Hong, T. S. Chen, and H. Y. Wu, “An improved reversible data hiding in encrypted images using side match,” IEEE Signal Process. Lett., vol. 19, no. 4, pp. 199–202, Apr. 2012 [4] Choudry, K.N. and Wanjari, A., 2015. A Survey Paper on Video Steganography.International Journal of Computer Science and Information Technologies, 6(3), pp.2335-2338. [5] Mukherjee, S. and Sanyal, G., 2015, November. A novel image steganographic technique using Position Power First Mapping (PPFM). In Research in Computational Intelligence and Communication Networks (ICRCICN), 2015 IEEE International Conference on (pp. 406- 410). IEEE. [6] T. Stutz and A. Uhl, “A survey of H.264 AVC/SVC encryption, ”IEEE Trans. Circuits Syst. Video Technol., vol. 22, no. 3, pp. 325–339, Mar. 2012. [14]S. G. Lian, Z. X. Liu, and Z. Ren, “Commutative encryption and watermarking in video compression,” IEEE Trans. Circuits Syst. Video Technol. , vol. 17, no. 6, pp. 774–778, Jun. 2007. [7] D. W. Xu, R. D. Wang, and J. C. Wang, “Prediction mode modulated data hiding algorithm for H.264/AVC,” J. RealTime Image Process.,vol.7,no. 4, pp. 205–214, 2012. [8] R. Sridevi, V. L. Paruchuri, and K.S. Rao, “Image steganography combined with cryptography”, International Journal of Computers &Technology, Vol.9, pp. 976-984, July2001.