A Graphical Based Video Steganography

In today’s digital media data communication over the internet increasing day by day. Therefore the data security becomes the most important issue over the internet. With the increase of data transmission, the number of intruders also increases. That’s the reason it is needed to transmit the data over the internet very securely. Steganography is a popular method in this field. This method hides the secret data with a cover medium in a way so that the intruders cannot predict the existence of the data. Here a steganography method is proposed which uses a video file as a cover medium. This method has five main steps. First, convert the video file into video frames. Then a particular frame is selected for embedded the secret data. Second, the Least Significant Bit (LSB) Coding technique is used with the double key security technique. Third, an 8 characters password verification process. Fourth, reverse the encrypted video. Fifth, signature verification process to verify the encryption and decryption process. These five steps are followed by both the encrypting and decrypting processes.


1." INTRODUCTION
In today's digital world transmission of secure data through the internet is the biggest challenge. Therefore for secure data transmission two types of security techniques are available 1) Steganography, and 2) Cryptography.
Steganography is the most commonly used data secure technique. It is used to conceal the secret data inside a cover medium. The cover medium embedded the secret data in a very efficient that it is too difficult to find the original data from it. In steganography several types of cover mediums available. Figure-1 shows the details of it.

Figure 1: Types of Steganography Cover Medium
Cryptography is a technique where a secret key is used to convert the secret data into encrypted secure data. This paper proposed a steganography technique with a video cover medium. In this technique to secure data or information, the Least Signification Bit algorithm (LSB) with dual key encryption method is used to encrypt and decrypt the secret data.

2." LITERATURE REVIEW
Video Steganography technique is the extension of the image steganography process. The most common technique for steganography is the Least Significant Bit technique (LSB). In this technique, the least significant or the last bit of the frame holds the value of the secret message. For this reason, this technique is vulnerable and can be break very easily. There are several authors who proposed several steganography techniques. For hiding the secret data, the authors proposed an affine transformation technique. The data embedded into the video frame based on the coefficient of wavelet transformation. The affine transformation is used to distribute the pixel values [1]. In today's world for secure communication authors describe several steganography techniques. Finally, they proposed a method that is useful and more compatible with steganography [2]. The authors survey different techniques of the steganography method and gave a detailed analysis of each process [3][4][5]. The authors compare the two most popular steganography techniques LSB and Discrete Wavelet Transform (DWT) base on two factors efficiency and capacity of accepting multiple images into one cover image. They also evaluate the performance of the algorithm based on the cover image capacity, imperceptibility of data, and security [6]. To enhance security and avoid data hacking the authors implemented an edge-based steganography technique. They used an adaptive embedded process over Dual-Tree Complex Wavelet Transform (DT-CWT) method. They show that this method is significantly better than other steganography techniques [7].

3." PROPOSED METHODOLOGY
This experiment is the extended part of the image steganography. It has five major parts for both the Encryption and Decryption method. The parts are 1) Pre-Processing, 2) LSB Coding, 3) Double key Protection, 4) Reverse the video with password verification, and finally 5) Signature Verification. Figure 2 shows the basic structure of the process.

3.1." Pre-Processing
To perform this, experiment the first step is to pre-process the input cover medium. Here a video cover medium is used. Therefore, for pre-process it needed to split the input cover video into its corresponding frames. The next step is to select a particular frame among all the frames and perform the next steps [8].

3.3." Double Key Protection
To secure the embedding and decrypting process in this experiment two keys are used [10][11]. Key1 is a 64bit secret key and Key2 is a secret key with 128bit or greater. These two keys help to perform the LSB Algorithm to encrypt or decrypt the secret message.

3.4." Reverse the video with Password Verification
Reverse video is a display mechanism. It used to invert the video sequences from end to beginning. In this experiment, this technique is used to make a secure encrypting process. When the video sequence is inverted then the number of the encrypted frame in the video file also changed. This process helps to hide the exact encrypted frame very securely.
Finally, a password with 8 characters used for the verification process to perform this mechanism more securely. The below algorithm shows the whole verification process for encryption and decryption.

3.5." Signature Verification
In this section, a handwritten signature database is used for final verification. The database contains more than 1000 handwritten signature images. This database contains genuine and forged signature images. Both encryption and decryption methods needed two-step signature verification [13][14] to complete the process. For signature verification, Local Binary Pattern and multiclass support vector machine mechanism are used. In the encryption method for signature registration, the very last two frames of reverse encrypted video are used. The below algorithm shows the verification process.  Figure 3 shows the entire encrypting and decrypting process of this experiment.

4." EXPERIMENTAL RESULT AND DISCUSSIONS
The proposed methodology was applied on a random audio-video interleaved (.avi) video file. For implementing this process MATLAB 2020a App designer was used. The initial interface is shown in figure 4. The encrypting process is shown in Figure 5. The secret Key1 and 2 and secrete message shown in figure 6a, 6b, 6c.! The decrypting process is shown in Figure 7. In the decryption process, if any verification process goes wrong the system returns the error message. Figure 8 shows the error output of the system.  The experimental result in the signature verification process is shown in figure 9. The performance analysis of this process is shown in table 1.  In this experiment in the secret message file, a special character is used. This indicates the end of the message. The limitations of this experiment are, 1) the input and output video file must be uncompressed audio-video interleaved (.avi) video file, 2) the secret message, secrete key 1and key2 file must be in text (.txt file) format.

5." CONCLUSION
The aim of the proposed methodology is to create a secure steganography process with a video cover medium. The dual key, secrete key1 and key2 and the Least Significant Bit Coding give the double protection. In this experiment reverse video encryption method is used. For a third-party intruder, this process is one of the disadvantages to identify the correct encrypted frame number. Finally, the password verification and the signature verification process give high security throughout the whole process. The entire process shows an efficient method to encrypt and decrypt the secret data using the steganography technique.