SlideShare a Scribd company logo
ROBUST VIDEO DATA
HIDING USING
FORBIDDEN ZONE DATA
HIDING AND SELECTIVE
EMBEDDING
Under the guidance of:
Prof. Rekha Patil
Team members:
Geeta S Savalgi
Pooja Lakha
Pooja S Patil
WHAT IS DATA SECURITY?
Protecting a database from
destructive forces and the
unwanted actions of
unauthorized users.
INTRODUCTION
DATA SECURITY TECHNOLOGIES
DISK
ENCRYPTION
HARDWARE BASED
MECHANISMS BACKUP
S
DATA
MASKING
DATA ERASUR
DATA HIDING
It is the process of embedding information into a host medium.
FORBIDDEN ZONE
It is defined as the host signal range where no alteration is allowed
during data hiding process.
 SELECTIVE EMBEDDING
Here host signal samples, which will be used in data hiding, are
determined adaptively. The selection is performed at four stages:
Frame selection, frequency band determination, block selection and
coefficient selection.
KEY TERMS USED IN PROJECT
 To achieve efficient data hiding in video sequence.
 To utilize systematic RA Codes to encode message
bits and frame bits.
 To allow handling de-synchronization between
embedder and decoder.
 To achieve certain level of robustness against frame
drop, repeat and insertion attacks.
 To use 3-D interleaving.
ISSUES AND CHALLENGES
 Successfully utilized in video data hiding
applications.
 Tamper detection in digital videos can be
performed efficiently.
 It is used in fragile applications such as
authentication.
 It provides excess control, copy control in DVD’s.
 Widely suitable for broader range of application.
APPLICATIONS
 The necessity for practical higher dimensional
data hiding codes.
 Adjusting trade-off between robustness(channel
code) and imperceptibility(source) by practical
means.
 Design of end-to-end real-life visual applications.
MOTIVATIONS
 During video data hiding the quality of the image
cannot be preserved.
 They cannot survive any format conversion or
transcoding, without any significant loss of perceptual
quality.
 Efficiently hide data in video and to preserve the
quality from the external attacks.
PROBLEM STATEMENT
 A new block based data hiding method which makes
use of erasure correction capability of repeat
accumulates codes.
 Uses superiority of forbidden zone for low embedding
distortion levels.
 Robust to frame manipulation attacks via frame
synchronization markers.
SCOPE OF WORK
The goal of the design process is to
produce a model of a system which can be
used later to build that system and use this
model to build the overall system.
DESIGN
 Parallel decoders are used to correct de-sync.
 The video data hiding methods utilize uncompressed video
data where insertions and erasures occur at decoder, causing
de-sync.
 Multiple hronization errors.
 This scheme is successful only when the number of selected
host signal samples is much less than the total number of
host signal samples.
EXISTING SYSTEM
ARCHITECTURE of proposed
system
EMBED
MESSAGE DATA FILE
OUTPUT FILE
MASTER FILE
ENCODEDVIDEO
COMPRESSION AND ENCRYPTION
DECODE
UNCOMPRESSION DECRYPTION
COMPRESSION AND
ENCRYPTION CHECK
ENCODEDVIDEO
RECEIVED
DECODED FILE
MESSAGE OR DATA FILE
SENDER
RECEIVER
ENCODER
DECODER
Substitute bytes
Shift rows
Add round key
Mix columns
Substitute bytes
Add round key
Mix columns
Shift keys
Add round key
Shift keys
Substitute bytes
Add round key
Add round key
Inverse mix columns
Add round key
Inverse sub bytes
Inverse shift rows
Inverse mix columns
Add round key
Inverse shift bytes
Inverse shift rows
Add round key
Inverse shift bytes
Inverse shift rows
EXPAND KEY
W(0,3)
KEY
Round 9 .
Round 10
Round 1
Round 9
ound 1
Implementation is the stage of the project when the
theoretical design is turned out into a working system.
The implementation stage involves careful planning,
investigation of the existing system and it’s constraints.
IMPLEMENTATION
Frame selection is performed and the selected
frames are processed block-wise.
The selection is performed at four stages:
 Frame selection
 Frequency band determination
 Block selection
 Coefficient selection
ENCRYPTION MODULE
Let fcur and fpre denote the current and previous
frame indices
 fcur > T, then skip this frame.
 If fcur = fpre, then skip this frame.
 Otherwise, process the current frame.
 fcur< fpre, then the end of the group of frames is
reached.
DECRYPTION MODULE
System flow diagram
System flow
Embed data
Spread frames
Actual video
User give input Msg or data as Data embedded video
input
Spread a video Encrypted video
Decrypt a video View original data or
msg
Encryption
Decryption
results
Robust video data hiding using forbidden zone data hiding and selective embedding
Robust video data hiding using forbidden zone data hiding and selective embedding
Robust video data hiding using forbidden zone data hiding and selective embedding
Robust video data hiding using forbidden zone data hiding and selective embedding
 New video data hiding framework that makes use of erasure
correction capability of RA codes and superiority of FZDH.
 It robust to frame manipulation attacks via frame
synchronization markers.
 Typical system parameter are reported for error-free decoding.
 The results indicate that the framework can be successfully
utilized in video data hiding applications.
 User cannot find the original data.
 It increases the security.
Conclusion
 Incorporation of human visual system based spatio
temporal adaption of data hiding method
parameters.
 New multilevel embedding technique .
 Increase block size to embed more data.
 Improve commercialization.
FUTURE WORK
THANK YOU FOR
YOUR
ATTENTION !

More Related Content

PPTX
Flat plate collector by Nishant Raj Kapoor
PPTX
Memory Management in real time operating system
PPTX
Real time operating system
PDF
Fire Alarm Photoelectric Smoke & Fixed Temperature Heat Detector
PPTX
Solar flat plate collector
PPT
04 cache memory
PPTX
Combined Heat and Power Generation
PDF
Robust video data hiding using forbidden data hiding
Flat plate collector by Nishant Raj Kapoor
Memory Management in real time operating system
Real time operating system
Fire Alarm Photoelectric Smoke & Fixed Temperature Heat Detector
Solar flat plate collector
04 cache memory
Combined Heat and Power Generation
Robust video data hiding using forbidden data hiding

Viewers also liked (20)

PDF
Robust video data hiding using forbidden zone
PPTX
Digital circuits
DOCX
Audio Steganography synopsis
PPTX
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
PPTX
Captcha as graphical passwords a new security primitive based on hard ai prob...
PPT
Marketing 4.0
DOCX
fog computing provide security to the data in cloud
PPTX
Captcha as graphical password
PPTX
H.264 vs HEVC
PPT
Fog computing provide security to data in cloud ppt
PDF
Marketing 3.0
PPTX
Steganography
PPT
Marketing mix
PDF
Estimize Bull speed using Back propagation
PDF
Why What & How of the Internet of Things
PDF
Data-Driven Marketing And Sales Predictions 2014 - Lattice Engines
PDF
Best practice in sales and marketing alignment
PPT
The Indian History Quiz
PDF
AVR_Course_Day1 basic electronics
PDF
10 Ways to be a Marketing Genius Like Lady Gaga
Robust video data hiding using forbidden zone
Digital circuits
Audio Steganography synopsis
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
Captcha as graphical passwords a new security primitive based on hard ai prob...
Marketing 4.0
fog computing provide security to the data in cloud
Captcha as graphical password
H.264 vs HEVC
Fog computing provide security to data in cloud ppt
Marketing 3.0
Steganography
Marketing mix
Estimize Bull speed using Back propagation
Why What & How of the Internet of Things
Data-Driven Marketing And Sales Predictions 2014 - Lattice Engines
Best practice in sales and marketing alignment
The Indian History Quiz
AVR_Course_Day1 basic electronics
10 Ways to be a Marketing Genius Like Lady Gaga
Ad

Similar to Robust video data hiding using forbidden zone data hiding and selective embedding (20)

PDF
CR_CSI_119
PDF
A REAL-TIME H.264/AVC ENCODER&DECODER WITH VERTICAL MODE FOR INTRA FRAME AND ...
DOC
Enabling data integrity protection in regenerating coding-based cloud storage...
PDF
International Refereed Journal of Engineering and Science (IRJES)
DOCX
JPD1406 Enabling Data Integrity Protection in Regenerating-Coding-Based Clou...
PDF
PDF
Fibonacci Video Encryption
PDF
Image Compression Using Intra Prediction of H.264/AVC and Implement of Hiding...
PDF
V01 i010410
PPT
ITDCC05.ppt
PPTX
Fine grained two-factor access control for cloud
PDF
IRJET - Information Hiding in H.264/AVC using Digital Watermarking
PDF
10.1.1.184.6612
PDF
S.A.kalaiselvan- robust video data hiding at forbidden zone
PDF
Ameya_Kasbekar_Resume
PDF
18 17 jan17 13470 rakesh ahuja revised-version(edit)
PPTX
Final PPT.pptx (1).pptx
PPT
Ensuring d.s
PDF
Partial encryption of compresed video
PDF
Partial encryption of compressed video
CR_CSI_119
A REAL-TIME H.264/AVC ENCODER&DECODER WITH VERTICAL MODE FOR INTRA FRAME AND ...
Enabling data integrity protection in regenerating coding-based cloud storage...
International Refereed Journal of Engineering and Science (IRJES)
JPD1406 Enabling Data Integrity Protection in Regenerating-Coding-Based Clou...
Fibonacci Video Encryption
Image Compression Using Intra Prediction of H.264/AVC and Implement of Hiding...
V01 i010410
ITDCC05.ppt
Fine grained two-factor access control for cloud
IRJET - Information Hiding in H.264/AVC using Digital Watermarking
10.1.1.184.6612
S.A.kalaiselvan- robust video data hiding at forbidden zone
Ameya_Kasbekar_Resume
18 17 jan17 13470 rakesh ahuja revised-version(edit)
Final PPT.pptx (1).pptx
Ensuring d.s
Partial encryption of compresed video
Partial encryption of compressed video
Ad

Recently uploaded (20)

PDF
Machine learning based COVID-19 study performance prediction
PPTX
Big Data Technologies - Introduction.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
A Presentation on Artificial Intelligence
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Machine Learning_overview_presentation.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Spectroscopy.pptx food analysis technology
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Approach and Philosophy of On baking technology
Machine learning based COVID-19 study performance prediction
Big Data Technologies - Introduction.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
A Presentation on Artificial Intelligence
Reach Out and Touch Someone: Haptics and Empathic Computing
Mobile App Security Testing_ A Comprehensive Guide.pdf
The AUB Centre for AI in Media Proposal.docx
MIND Revenue Release Quarter 2 2025 Press Release
Machine Learning_overview_presentation.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Spectral efficient network and resource selection model in 5G networks
Programs and apps: productivity, graphics, security and other tools
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
MYSQL Presentation for SQL database connectivity
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Spectroscopy.pptx food analysis technology
Building Integrated photovoltaic BIPV_UPV.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Approach and Philosophy of On baking technology

Robust video data hiding using forbidden zone data hiding and selective embedding

  • 1. ROBUST VIDEO DATA HIDING USING FORBIDDEN ZONE DATA HIDING AND SELECTIVE EMBEDDING Under the guidance of: Prof. Rekha Patil Team members: Geeta S Savalgi Pooja Lakha Pooja S Patil
  • 2. WHAT IS DATA SECURITY? Protecting a database from destructive forces and the unwanted actions of unauthorized users. INTRODUCTION
  • 3. DATA SECURITY TECHNOLOGIES DISK ENCRYPTION HARDWARE BASED MECHANISMS BACKUP S DATA MASKING DATA ERASUR
  • 4. DATA HIDING It is the process of embedding information into a host medium. FORBIDDEN ZONE It is defined as the host signal range where no alteration is allowed during data hiding process.  SELECTIVE EMBEDDING Here host signal samples, which will be used in data hiding, are determined adaptively. The selection is performed at four stages: Frame selection, frequency band determination, block selection and coefficient selection. KEY TERMS USED IN PROJECT
  • 5.  To achieve efficient data hiding in video sequence.  To utilize systematic RA Codes to encode message bits and frame bits.  To allow handling de-synchronization between embedder and decoder.  To achieve certain level of robustness against frame drop, repeat and insertion attacks.  To use 3-D interleaving. ISSUES AND CHALLENGES
  • 6.  Successfully utilized in video data hiding applications.  Tamper detection in digital videos can be performed efficiently.  It is used in fragile applications such as authentication.  It provides excess control, copy control in DVD’s.  Widely suitable for broader range of application. APPLICATIONS
  • 7.  The necessity for practical higher dimensional data hiding codes.  Adjusting trade-off between robustness(channel code) and imperceptibility(source) by practical means.  Design of end-to-end real-life visual applications. MOTIVATIONS
  • 8.  During video data hiding the quality of the image cannot be preserved.  They cannot survive any format conversion or transcoding, without any significant loss of perceptual quality.  Efficiently hide data in video and to preserve the quality from the external attacks. PROBLEM STATEMENT
  • 9.  A new block based data hiding method which makes use of erasure correction capability of repeat accumulates codes.  Uses superiority of forbidden zone for low embedding distortion levels.  Robust to frame manipulation attacks via frame synchronization markers. SCOPE OF WORK
  • 10. The goal of the design process is to produce a model of a system which can be used later to build that system and use this model to build the overall system. DESIGN
  • 11.  Parallel decoders are used to correct de-sync.  The video data hiding methods utilize uncompressed video data where insertions and erasures occur at decoder, causing de-sync.  Multiple hronization errors.  This scheme is successful only when the number of selected host signal samples is much less than the total number of host signal samples. EXISTING SYSTEM
  • 12. ARCHITECTURE of proposed system EMBED MESSAGE DATA FILE OUTPUT FILE MASTER FILE ENCODEDVIDEO COMPRESSION AND ENCRYPTION DECODE UNCOMPRESSION DECRYPTION COMPRESSION AND ENCRYPTION CHECK ENCODEDVIDEO RECEIVED DECODED FILE MESSAGE OR DATA FILE SENDER RECEIVER
  • 14. Substitute bytes Shift rows Add round key Mix columns Substitute bytes Add round key Mix columns Shift keys Add round key Shift keys Substitute bytes Add round key Add round key Inverse mix columns Add round key Inverse sub bytes Inverse shift rows Inverse mix columns Add round key Inverse shift bytes Inverse shift rows Add round key Inverse shift bytes Inverse shift rows EXPAND KEY W(0,3) KEY Round 9 . Round 10 Round 1 Round 9 ound 1
  • 15. Implementation is the stage of the project when the theoretical design is turned out into a working system. The implementation stage involves careful planning, investigation of the existing system and it’s constraints. IMPLEMENTATION
  • 16. Frame selection is performed and the selected frames are processed block-wise. The selection is performed at four stages:  Frame selection  Frequency band determination  Block selection  Coefficient selection ENCRYPTION MODULE
  • 17. Let fcur and fpre denote the current and previous frame indices  fcur > T, then skip this frame.  If fcur = fpre, then skip this frame.  Otherwise, process the current frame.  fcur< fpre, then the end of the group of frames is reached. DECRYPTION MODULE
  • 18. System flow diagram System flow Embed data Spread frames Actual video User give input Msg or data as Data embedded video input Spread a video Encrypted video Decrypt a video View original data or msg Encryption Decryption
  • 24.  New video data hiding framework that makes use of erasure correction capability of RA codes and superiority of FZDH.  It robust to frame manipulation attacks via frame synchronization markers.  Typical system parameter are reported for error-free decoding.  The results indicate that the framework can be successfully utilized in video data hiding applications.  User cannot find the original data.  It increases the security. Conclusion
  • 25.  Incorporation of human visual system based spatio temporal adaption of data hiding method parameters.  New multilevel embedding technique .  Increase block size to embed more data.  Improve commercialization. FUTURE WORK