SlideShare a Scribd company logo
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 1
PROJECT FINAL REVIEW
TEAM MEMBERS:
310520104116 SHAKTHIKUMAR S
310520104302 JAYASURYA B
310520104143 YASHVANTHKUMAR V
310520104133 VASANTH
GUIDED BY:
Ms.SOWMIYA
DHANALAKSHMI SRINIVASAN
COLLEGE OF ENGINEERING AND TECHNOLOGY
DHANALAKSHMI SRINIVASAN
COLLEGE OF ENGINEERING AND TECHNOLOGY
DOMAIN: CRYPTOGRAPHY AND NETWORK SECURITY
TITLE: Advancements in Video Steganography with Multifactor Authentication
Using Convolutional Neural Networks
2
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
ABSTRACT
In the era of digital communication and data security, the need for concealing sensitive information in
plain sight has become increasingly critical. This project, titled "Video Steganography using CNN with
Password and Audio Authentication," addresses this need by developing a novel approach to hide one
video within another, secured by authentication mechanisms. The project's process is initiated when a
user submits two videos: a "cover video" and a "hide video," along with a unique password and an audio
clip for authentication. CNNs are adept at understanding spatial relationships in images and videos,
ensuring a seamless integration of the hide video. The authentication mechanism relies on two factors:
the user-supplied password and the audio clip provided. These two elements are crucial for successful
recovery of the hidden video.
3
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
OBJECTIVE
 The objective of the "Video Steganography using CNN with Password and Audio
Authentication" project is to provide a secure and innovative method for concealing sensitive
information within digital videos.
 Leveraging Convolutional Neural Networks (CNNs), the project aims to seamlessly embed a
"hide video" within a designated "cover video.“
 The incorporation of CNNs ensures a robust understanding of spatial relationships in videos,
facilitating a covert integration.
 The authentication process, essential for successful recovery, involves a unique user-supplied
password and an audio clip.
 By combining these two elements, the project aims to enhance data security and
confidentiality in digital communication, offering a reliable solution for concealing
information in plain sight.
4
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
EXISTING SYSTEM
 Model Technique:
Deep Convolutional Neural Network: Utilizes this technique for efficient concealment.
 Suitability of Large Media Files:
Large media files are ideal due to their size for steganographic transmission.
 Focus on Video Steganography:
Exploration of concealing a secret video within a cover video
DISADVANTAGES:
 This process only hide the video and recovery then demonstrating backend.
 There is no authentication in this existing system.
5
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
PROPOSED SYSTEM
 Building on Video Steganography:
 Enhances existing video steganography methods.
 Focus on improving data concealment, security, and authenticity verification.
 Use of Convolutional Neural Networks (CNNs):
 Leverages CNNs for a strong and efficient framework.
 Aims to hide a secret video within a cover video effectively.
 Multifactor Authentication:
 Password + Audio Clip: Users provide both for added security.
 Essential for successfully recovering the hidden video.
 Secure Storage of Passwords:
 Passwords are stored securely in a database to ensure confidentiality.
 Innovative Residual Modeling Technique:
 Allows seamless embedding of the secret video in the cover video.
 Minimizes detectable differences for enhanced concealment.
6
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
LITERATURE REVIEW
7
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
YEAR - TITLE METHODS ADVANTAGES DISADVANTAGES HOW THIS REFERENCE GIVES SCOPE FOR
PROPOSED WORK
2019 -Secure
Multimedia
Steganography
Using Deep
Learning
The authors
employ
a convolutional
neural network
(CNN) with
a Deep
Supervision-
based edge
detector. This
edge detector
retains more
edge pixels
compared to
conventional
edge detection
algorithms
Deep learning
algorithms can
optimize the process
of concealing
information within
multimedia files,
leading to more
effective and
seamless embedding
that is difficult to
detect.
Training effective deep
learning models for
steganography may
require large and diverse
datasets, which might not
always be available,
especially for specific
domains or types of
multimedia
This paper explores the progress in computer
vision techniques as applied to autonomous
vehicle navigation. It discusses the use of
computer vision for enhancing the perception
and decision-making capabilities of
autonomous vehicles, highlighting the
significance of advanced technologies in
ensuring safe and reliable autonomous
navigation.
LITERATURE REVIEW
8
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
YEAR - TITLE METHODS ADVANTAGES DISADVANTAGES HOW THIS REFERENCE GIVES SCOPE FOR
PROPOSED WORK
2020 - Audio
Authentication
Techniques for
Multimedia Data: A
Comprehensive
Survey
The authors
propose an
algorithm that
combines per
ception-
based robust
hash
functions wit
h robust
watermarkin
g.
Audio authentication
techniques can
provide robust
security measures,
ensuring the
integrity and
authenticity of
multimedia data.
Audio authentication
systems may produce
false positives
(authenticating an
unauthorized user) or
false negatives (rejecting
an authorized user),
impacting the overall
reliability of the system
This comprehensive survey explores audio
authentication techniques in the context of
multimedia data. It provides an overview of
various methods for verifying the authenticity
of audio data within multimedia content. The
paper highlights the need for robust
authentication mechanisms in multimedia
applications
LITERATURE REVIEW
9
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
YEAR - TITLE METHODS ADVANTAGES DISADVANTAGES HOW THIS REFERENCE GIVES SCOPE FOR
PROPOSED WORK
2019 - Data Privacy
and Security in
Multimedia
Communications:
Challenges and
Solutions
Conventional
systems inclu
de methods
like encrypti
on and water
marking,
which have
been widely
used for
securing
multimedia
data.
By examining the
progress in IoT-
related multimedia
privacy and security
research, the book
aims to provide
investigators with
a greater
understanding of
the current state-of-
the-art.
The challenges arise due
to the massive amounts of
multimedia content
exchanged via IoT
devices, particularly in
data-sensitive scenarios
This paper discusses the challenges and
solutions related to data privacy and security
in multimedia communications. It addresses
the evolving landscape of multimedia data and
emphasizes the importance of ensuring the
privacy and security of sensitive information
during transmission.
ARCHITECTURE DIAGRAM - DFD
10
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
ARCHITECTURE DIAGRAM - DFD
11
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
ALGORITHM
12
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
 The "Video Steganography using CNN with Password and Audio Authentication" project, Convolutional
Neural Networks (CNNs) play a pivotal role in achieving effective video concealment and security. CNNs
are a class of deep neural networks particularly well-suited for image and video processing tasks. In this
project, the CNNs are utilized to comprehend and manipulate the spatial relationships within the cover
and hide videos. The network is trained to understand the intricate patterns and features present in video
frames, allowing for the seamless integration of the hide video into the cover video.
 Specifically, the CNN acts as a powerful tool for feature extraction, capturing relevant spatial information
and patterns in both videos. Through a process of convolutional layers, the network learns hierarchical
representations of the input videos, enabling it to discern subtle details crucial for concealing the hide
video. The application of CNNs in this project ensures that the embedding process is efficient and
minimizes detectable differences between the cover and modified videos.
 The use of CNNs enhances the system's capability to conceal information within the videos effectively. By
leveraging the neural network's ability to grasp spatial relationships, the project achieves a high level of
integration between the cover and hide videos, contributing to the overall success of the steganography
process
MODULES (IF APPLICABLE)
13
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
 Video Input and Preprocessing
 Authentication Data Handling
 Convolutional Neural Network (CNN) Embedding
 Authentication Process
 Recovery of Hidden Video
 Database Management
REFERENCES
[1] Patel, A. P., & Gupta, S. K. (2019). Secure Multimedia Steganography Using Deep Learning.
Journal of Information Security and Cybersecurity, 15(4), 489-503
[2] Kim, H., & Lee, C. (2020). Audio Authentication Techniques for Multimedia Data: A
Comprehensive Survey. International Journal of Signal Processing and Communication, 27(1),
89-105
[3] Wang, X., & Chen, Y. (2019). Data Privacy and Security in Multimedia Communications:
Challenges and Solutions. IEEE Transactions on Information Forensics and Security, 14(6), 1457-
1472.
14
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
THANK YOU
15

More Related Content

PDF
A detailed review on Video Steganography
PDF
PDF
Video steganography based on DCT psychovisual and object motion
PDF
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
PDF
A deep awareness framework for pervasiv video cloud
PDF
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
PDF
Survey Paper On Real Time Smart CCTV Surveillance System
PDF
V01 i010410
A detailed review on Video Steganography
Video steganography based on DCT psychovisual and object motion
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
A deep awareness framework for pervasiv video cloud
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
Survey Paper On Real Time Smart CCTV Surveillance System
V01 i010410

Similar to project final review VS about cryptography and network security (20)

PDF
Visually Image Encryption and Compression using a CNN-Based Autoencoder
PDF
Visually Image Encryption and Compression using a CNN-Based Autoencoder
PPTX
Machine Learning -Based Security Authentication for Wireless Multimedia Network
PPTX
MS.C PROJECT PPT PRESENTATION.( ANAJE AUGUSTINE CHUKWUNEDUM, NOU144632096).pptx
PDF
Innovative Low-Cost Perimeter Security Gadget With In-built Mechanism to Ensu...
PDF
INNOVATIVE LOW-COST PERIMETER SECURITY GADGET WITH IN-BUILT MECHANISM TO ENSU...
PPTX
cse final year project of image encryption
PDF
Iaetsd implementation of chaotic algorithm for secure image
PDF
SECURE TRANSMISSION IN WIRELESS SENSOR NETWORKS DATA USING LINEAR KOLMOGOROV ...
PDF
Secure transmission in wireless sensor networks data using linear kolmogorov ...
PDF
Comparative Study on Watermarking & Image Encryption for Secure Communication
PDF
Secure video transmission using steganography and cryptography
PDF
Smart surveillance using deep learning
PDF
Extended Visual Cryptography Using Watermarking
PPTX
Computer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
PDF
Ijeee 16-19-digital media hidden data extracting
PDF
Hidden in Plain Sight: Securing Digital Secrets with Image Steganography
PDF
pdf for steg.pdf its an final report for the steganography project
PDF
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
PPT
human system for basic knoladge and etc.ppt
Visually Image Encryption and Compression using a CNN-Based Autoencoder
Visually Image Encryption and Compression using a CNN-Based Autoencoder
Machine Learning -Based Security Authentication for Wireless Multimedia Network
MS.C PROJECT PPT PRESENTATION.( ANAJE AUGUSTINE CHUKWUNEDUM, NOU144632096).pptx
Innovative Low-Cost Perimeter Security Gadget With In-built Mechanism to Ensu...
INNOVATIVE LOW-COST PERIMETER SECURITY GADGET WITH IN-BUILT MECHANISM TO ENSU...
cse final year project of image encryption
Iaetsd implementation of chaotic algorithm for secure image
SECURE TRANSMISSION IN WIRELESS SENSOR NETWORKS DATA USING LINEAR KOLMOGOROV ...
Secure transmission in wireless sensor networks data using linear kolmogorov ...
Comparative Study on Watermarking & Image Encryption for Secure Communication
Secure video transmission using steganography and cryptography
Smart surveillance using deep learning
Extended Visual Cryptography Using Watermarking
Computer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
Ijeee 16-19-digital media hidden data extracting
Hidden in Plain Sight: Securing Digital Secrets with Image Steganography
pdf for steg.pdf its an final report for the steganography project
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
human system for basic knoladge and etc.ppt
Ad

Recently uploaded (20)

PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
DOCX
573137875-Attendance-Management-System-original
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
Digital Logic Computer Design lecture notes
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
Artificial Intelligence
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
Safety Seminar civil to be ensured for safe working.
PPTX
Lecture Notes Electrical Wiring System Components
PDF
Well-logging-methods_new................
PDF
composite construction of structures.pdf
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
OOP with Java - Java Introduction (Basics)
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
573137875-Attendance-Management-System-original
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Digital Logic Computer Design lecture notes
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Artificial Intelligence
R24 SURVEYING LAB MANUAL for civil enggi
CYBER-CRIMES AND SECURITY A guide to understanding
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Safety Seminar civil to be ensured for safe working.
Lecture Notes Electrical Wiring System Components
Well-logging-methods_new................
composite construction of structures.pdf
Ad

project final review VS about cryptography and network security

  • 1. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 1 PROJECT FINAL REVIEW TEAM MEMBERS: 310520104116 SHAKTHIKUMAR S 310520104302 JAYASURYA B 310520104143 YASHVANTHKUMAR V 310520104133 VASANTH GUIDED BY: Ms.SOWMIYA DHANALAKSHMI SRINIVASAN COLLEGE OF ENGINEERING AND TECHNOLOGY
  • 2. DHANALAKSHMI SRINIVASAN COLLEGE OF ENGINEERING AND TECHNOLOGY DOMAIN: CRYPTOGRAPHY AND NETWORK SECURITY TITLE: Advancements in Video Steganography with Multifactor Authentication Using Convolutional Neural Networks 2 DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
  • 3. ABSTRACT In the era of digital communication and data security, the need for concealing sensitive information in plain sight has become increasingly critical. This project, titled "Video Steganography using CNN with Password and Audio Authentication," addresses this need by developing a novel approach to hide one video within another, secured by authentication mechanisms. The project's process is initiated when a user submits two videos: a "cover video" and a "hide video," along with a unique password and an audio clip for authentication. CNNs are adept at understanding spatial relationships in images and videos, ensuring a seamless integration of the hide video. The authentication mechanism relies on two factors: the user-supplied password and the audio clip provided. These two elements are crucial for successful recovery of the hidden video. 3 DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
  • 4. OBJECTIVE  The objective of the "Video Steganography using CNN with Password and Audio Authentication" project is to provide a secure and innovative method for concealing sensitive information within digital videos.  Leveraging Convolutional Neural Networks (CNNs), the project aims to seamlessly embed a "hide video" within a designated "cover video.“  The incorporation of CNNs ensures a robust understanding of spatial relationships in videos, facilitating a covert integration.  The authentication process, essential for successful recovery, involves a unique user-supplied password and an audio clip.  By combining these two elements, the project aims to enhance data security and confidentiality in digital communication, offering a reliable solution for concealing information in plain sight. 4 DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
  • 5. EXISTING SYSTEM  Model Technique: Deep Convolutional Neural Network: Utilizes this technique for efficient concealment.  Suitability of Large Media Files: Large media files are ideal due to their size for steganographic transmission.  Focus on Video Steganography: Exploration of concealing a secret video within a cover video DISADVANTAGES:  This process only hide the video and recovery then demonstrating backend.  There is no authentication in this existing system. 5 DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
  • 6. PROPOSED SYSTEM  Building on Video Steganography:  Enhances existing video steganography methods.  Focus on improving data concealment, security, and authenticity verification.  Use of Convolutional Neural Networks (CNNs):  Leverages CNNs for a strong and efficient framework.  Aims to hide a secret video within a cover video effectively.  Multifactor Authentication:  Password + Audio Clip: Users provide both for added security.  Essential for successfully recovering the hidden video.  Secure Storage of Passwords:  Passwords are stored securely in a database to ensure confidentiality.  Innovative Residual Modeling Technique:  Allows seamless embedding of the secret video in the cover video.  Minimizes detectable differences for enhanced concealment. 6 DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
  • 7. LITERATURE REVIEW 7 DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING YEAR - TITLE METHODS ADVANTAGES DISADVANTAGES HOW THIS REFERENCE GIVES SCOPE FOR PROPOSED WORK 2019 -Secure Multimedia Steganography Using Deep Learning The authors employ a convolutional neural network (CNN) with a Deep Supervision- based edge detector. This edge detector retains more edge pixels compared to conventional edge detection algorithms Deep learning algorithms can optimize the process of concealing information within multimedia files, leading to more effective and seamless embedding that is difficult to detect. Training effective deep learning models for steganography may require large and diverse datasets, which might not always be available, especially for specific domains or types of multimedia This paper explores the progress in computer vision techniques as applied to autonomous vehicle navigation. It discusses the use of computer vision for enhancing the perception and decision-making capabilities of autonomous vehicles, highlighting the significance of advanced technologies in ensuring safe and reliable autonomous navigation.
  • 8. LITERATURE REVIEW 8 DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING YEAR - TITLE METHODS ADVANTAGES DISADVANTAGES HOW THIS REFERENCE GIVES SCOPE FOR PROPOSED WORK 2020 - Audio Authentication Techniques for Multimedia Data: A Comprehensive Survey The authors propose an algorithm that combines per ception- based robust hash functions wit h robust watermarkin g. Audio authentication techniques can provide robust security measures, ensuring the integrity and authenticity of multimedia data. Audio authentication systems may produce false positives (authenticating an unauthorized user) or false negatives (rejecting an authorized user), impacting the overall reliability of the system This comprehensive survey explores audio authentication techniques in the context of multimedia data. It provides an overview of various methods for verifying the authenticity of audio data within multimedia content. The paper highlights the need for robust authentication mechanisms in multimedia applications
  • 9. LITERATURE REVIEW 9 DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING YEAR - TITLE METHODS ADVANTAGES DISADVANTAGES HOW THIS REFERENCE GIVES SCOPE FOR PROPOSED WORK 2019 - Data Privacy and Security in Multimedia Communications: Challenges and Solutions Conventional systems inclu de methods like encrypti on and water marking, which have been widely used for securing multimedia data. By examining the progress in IoT- related multimedia privacy and security research, the book aims to provide investigators with a greater understanding of the current state-of- the-art. The challenges arise due to the massive amounts of multimedia content exchanged via IoT devices, particularly in data-sensitive scenarios This paper discusses the challenges and solutions related to data privacy and security in multimedia communications. It addresses the evolving landscape of multimedia data and emphasizes the importance of ensuring the privacy and security of sensitive information during transmission.
  • 10. ARCHITECTURE DIAGRAM - DFD 10 DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
  • 11. ARCHITECTURE DIAGRAM - DFD 11 DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
  • 12. ALGORITHM 12 DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING  The "Video Steganography using CNN with Password and Audio Authentication" project, Convolutional Neural Networks (CNNs) play a pivotal role in achieving effective video concealment and security. CNNs are a class of deep neural networks particularly well-suited for image and video processing tasks. In this project, the CNNs are utilized to comprehend and manipulate the spatial relationships within the cover and hide videos. The network is trained to understand the intricate patterns and features present in video frames, allowing for the seamless integration of the hide video into the cover video.  Specifically, the CNN acts as a powerful tool for feature extraction, capturing relevant spatial information and patterns in both videos. Through a process of convolutional layers, the network learns hierarchical representations of the input videos, enabling it to discern subtle details crucial for concealing the hide video. The application of CNNs in this project ensures that the embedding process is efficient and minimizes detectable differences between the cover and modified videos.  The use of CNNs enhances the system's capability to conceal information within the videos effectively. By leveraging the neural network's ability to grasp spatial relationships, the project achieves a high level of integration between the cover and hide videos, contributing to the overall success of the steganography process
  • 13. MODULES (IF APPLICABLE) 13 DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING  Video Input and Preprocessing  Authentication Data Handling  Convolutional Neural Network (CNN) Embedding  Authentication Process  Recovery of Hidden Video  Database Management
  • 14. REFERENCES [1] Patel, A. P., & Gupta, S. K. (2019). Secure Multimedia Steganography Using Deep Learning. Journal of Information Security and Cybersecurity, 15(4), 489-503 [2] Kim, H., & Lee, C. (2020). Audio Authentication Techniques for Multimedia Data: A Comprehensive Survey. International Journal of Signal Processing and Communication, 27(1), 89-105 [3] Wang, X., & Chen, Y. (2019). Data Privacy and Security in Multimedia Communications: Challenges and Solutions. IEEE Transactions on Information Forensics and Security, 14(6), 1457- 1472. 14 DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING