0% found this document useful (0 votes)
75 views5 pages

Selecting Audio-Video File

This document describes steps for hiding data in audio and video files and then extracting the hidden data. It involves: 1. Separating the audio and video from an input audio-video file. Hiding an encrypted image in the least significant bits of a selected video frame. Hiding an encrypted text message by replacing least significant bits of audio samples. 2. Combining the hidden audio and video files to create a stego audio-video file. 3. At the receiver, extracting the hidden image from the selected video frame by getting the least significant bits. Extracting the hidden text from the audio by selecting random bits based on a key.

Uploaded by

Abhishek Sharma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
75 views5 pages

Selecting Audio-Video File

This document describes steps for hiding data in audio and video files and then extracting the hidden data. It involves: 1. Separating the audio and video from an input audio-video file. Hiding an encrypted image in the least significant bits of a selected video frame. Hiding an encrypted text message by replacing least significant bits of audio samples. 2. Combining the hidden audio and video files to create a stego audio-video file. 3. At the receiver, extracting the hidden image from the selected video frame by getting the least significant bits. Extracting the hidden text from the audio by selecting random bits based on a key.

Uploaded by

Abhishek Sharma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Selecting Audio-Video file

Here the steps for selecting a specific audio-video file and the separation of audio and video part
are explained.
1. Select any available audio video file in which user wants to hide data.
2. Separate the audio and video from the file using software.
3. Save the audio and video files separately.

Hiding image in Video (transmitter)


Here the steps for embedding a secret image in one of the selected video frame are explained.
1. Select the video file and read the video file.
2. Play the video.
3. Select the particular frame in which the Image is to be hidden.
4. Select the encrypted image which has to be hidden.
5. Extract the msb of the frame by bitand frame with 240 using bitand function.
6. Extract the msb of the encrypted image by Bitand image with 240 using bitand function.
7. Reverse the place of msb to lsb by dividing by 16.
8. The image data is embedded into theframe matrix by adding each databits to the last 4 bits of
frame bits.
9. Stego frame is created.
10. Stego video is played.
11. Close file.

Hiding data in Audio (transmitter)


Here the steps for embedding a secret message into the audio file are explained.
1. Encrypted message is taken.
2. It is converted to ASCII.
3. Provide the data hiding key.
4. Convert each audio sample into 8 bit sequence.

5. From each sample read first two MSB bits and convert it to decimal. This is the insertion
position of the secret message in that sample.
6. Insert a secret bit into a selected position determined using the previous method.
7. Repeat the steps until all the secret bits are replaced.

Creating stego Audio-Video file


1. Combine stego audio and video file using software.
2. This forms the stego audio-video file which contains both text and image at the transmitter
side.

Retrieval of image (Receiver)


1. The stego audio-video file is received at the receiver side.
2. Select the frame number; the frame no should be same at both transmitter and receiver then
only image can be retrieved.
3. The embedded image is present at the LSB of the selected frame.
4. Get the hidden bits by using the bitget function.
5. Recover the encrypted image at the receiver.
6. Reshape the image matrix using Reshape function.
7. Decrypt the original image using triple key chaotic algorithm.
8. Compare the original image and decrypted one.

Recovering data from Audio

1. Retrieve the stego audio file from stego audio-video obtained at receiver.
2. Provide the data hiding key provided at the transmitter side.
3. Select the random bits from the audio in which the hidden bits are present.
4. Get the length of the bits by using the bitget function.
5. Convert it into decimal.
6. The encrypted message is retrieved.
7. Decrypt the message using the triple key chaotic algorithm and display the message to the end
user.

LSB CODING

A very popular methodology is the LSB (Least Significant Bit) algorithm, which replaces the
least significant bit in some bytes of the cover file to hide a sequence of bytes containing the
hidden data. That's usually an effective technique in cases where the LSB substitution doesn't
cause significant quality degradation, such as in 24-bit bit maps. In computing, the least
significant bit (LSB) is the bit position in a binary integer giving the units value, that is,
determining whether the number is even or odd. The LSB is sometimes referred to as the rightmost bit, due to the convention in positional notation of writing less significant digit further to
the right. It is analogous to the least significant digit of a decimal integer, which is the digit in the
ones (right-most) position. Figure 4: Binary representation of decimal 149The binary
representation of decimal 149, with the LSB highlighted. The MSB in an 8-bit binary number
represents a value of 128 decimal. The LSB represents a value of 1. For example, to hide the letter "a" (ASCII
code 97, which is 01100001) inside eight bytes of a cover, you can set the LSB of each byte like this:

10010010
01010011
10011011
11010010
10001010
00000010
01110010
00101011
The application decoding the cover reads the eight Least Significant Bits of those bytes to recreate the hidden bytethat is 0110001the letter "a." As you may realize, using this technique
let you hide a byte every eight bytes of the cover. Note that there's a fifty percent chance that the bit you're
replacing is the same as its replacement, in other words, half the time, the bit doesn't change,
which helps to minimize quality degradation.

Aim :
To design enhanced
Watermarking.

techniques

and

algorithms

for

Digital

Image

Group Members :
Abhishek Saxena 220/12
Abhishek Sharma 221/12
Prashant Kumar 237/12

Objective:
This project aims on building an application based on Digital Image Watermarking using
different algorithms and comparing the results. The basic purpose being to watermark the digital
image to prevent illegal duplication, distribution and manipulation. It involves two main
steps. Embedding the watermark into the digital image and extracting the watermark from the
image.

Tools and Platform to be used:


MATLAB is an excellent environment in which it is used to develop and experiment with
filtering Methods for face recognition. The basic MATLAB package contains many functions
and tools for this purpose, but in some cases it is more convenient to use routines that are only
available from the Signal Processing Toolbox (SPT) and the Image Processing Toolbox (IPT).We
will therefore use these toolboxes when convenient.
The Image Processing Toolbox is a collection of MATLAB functions (called M-functions or Mfiles) that extend the capability of the MATLAB environment for the solution of BLURRED
IMAGE problems.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy