The Military Technical College,. Cairo, Egypt 11331. ABSTRACT. This paper presents a steganographic model which utilizes cover video files to conceal the ...
A SECURE COVERT COMMUNICATION MODEL BASED ON VIDEO STEGANOGRAPHY Amr A. Hanafy, Gouda I. Salama and Yahya Z. Mohasseb The Military Technical College, Cairo, Egypt 11331
ABSTRACT This paper presents a steganographic model which utilizes cover video files to conceal the presence of other sensitive data regardless of its format. The model presented is based on pixel-wise manipulation of colored raw video files to embed the secret data. The secret message is segmented into blocks prior to being embedded in the cover video. These blocks are then embedded in pseudo random locations. The locations are derived from a re-orderings of a mutually agreed upon secret key. Furthermore, the re-ordering is dynamically changed with each video frame to reduce the possibility of statistically identifying the locations of the secret message blocks, even if the original cover video is made available to the interceptor. The paper also presents a quantitative evaluation of the model using four types of secret data. The model is evaluated in terms of both the average reduction in Peak Signal to Noise Ratio (PSNR) compared to the original cover video; as well as the Mean Square Error (MSE) measured between the original and steganographic files averaged over all video frames. Results show minimal degradation of the steganographic video file for all types of data, and for various sizes of the secret messages. Finally, an estimate of the embedding capacity of a video file is presented based on file format and size. Index Terms— Video-based Steganography, Audio video interleaved, Imperceptibility, Payload capacity. I. INTRODUCTION The word Steganography is of Greek origin and means "covered or hidden writing". Data hiding can be used for clandestine transmissions, closed captioning, indexing, or watermarking. It is in contrast to cryptography, where the existence of the message itself is not disguised, but the content is obscured [1]. Steganography is implemented in different fields such as military and Industrial applications. By using lossless steganography techniques messages can be sent and received securely. Traditionally, steganography was based on hiding secret information in image files [2,3]. Lately, there has been growing interest in applying steganographic techniques to video files as well [ 4,5]. The advantage of using video files in hiding information is the added security against hacker attacks due to the relative complexity of video compared to image files [4]. Image-based and video-based steganography techniques are mainly classified into spatial domain and frequency domain based methods [5-7]. The former embeds messages directly in Least Significant Bits (LSB) of the intensity of pixels of image or video.
978-1-4244-2677-5/08/$25.00 ©2008 IEEE
Spatial domain techniques either operate on pixel wise or block wise bases. In frequency domain, images are first transformed to frequency domain e.g. by using FFT, DCT or DWT and then the messages are embedded in some or all of the transformed coefficients. In this paper, we focus on spatial domain techniques. In spatial domain, it is possible to hide a significant amount of information in the covert file, by using the LSB of each color channel to carry the secret information. Depending on the color depth of the original image/video and the number of LSB bits used the degradation of the original image/video can be minimal. For instance, using the two LSB bits of each color channel in a 24-bit image/video merely results in a maximum color change of 64 values out of a possible 16+ Million colors. Several techniques of LSB insertion exist [8]. Several researchers have addressed the problem of video steganography. In [4] a comparative analysis between Joint Picture Expert Group (JPEG) image stegano and Audio Video Interleaved (AVI) video stegano by quality and size was performed. The authors propose to increase the strength of the key by using UTF-32 encoding in the swapping algorithm and lossless stegano technique in the AVI file. However, payload capacity is low. In [9] an adaptive invertible information hiding method for Moving Picture Expert Group (MPEG) video is proposed. Hidden data can be recovered without requiring the destination to have a prior copy of the covert video and the original MPEG video data can be recovered if needed. This technique works in frequency domain only. It has the advantages of low complexity and low visual distortion for covert communication applications. However, it suffers from low payload capacity. The work presented in this paper is based on spatial domain processing of AVI video files as covert video. The data hiding mechanism provides significant payload increase over [4]. This paper is organized as follows: Section II introduces the proposed steganographic algorithm, and then presents the steps of embedding and extraction process. Section III presents a performance evaluation. Section IV reports the experimental results and analysis. Finally, conclusions are presented in section V.
II. PROPOSED STEGANOGRAPHIC ALGORITHM
A. Embedding Stage The block diagram of the embedding processes is shown in Figure (1). Assume we have a cover video sequence consisting of S frames as illustrated in Figure (2). The video frame dimension is H × W Pixels. Each input pixel is encoded to K -byte precision. Assume that we have a secret message of size V . The first step in the embedding phase is secret message preprocessing. In this step, the secret message is partitioned into s nonoverlapping blocks, each with size N 2 bytes. The proposed scheme requires that s ≤ S and
N ≤ K (H − F ) ∗ W 4
where F represents the number of rows in each cover video frame reserved for embedding the stego key data. The user can select any value of N satisfying the above condition. Furthermore, the format of the secret message file is identified and saved. The second step is cover video frame preprocessing. In this step, the non-overlapping blocks s are assigned to the number of video frames for embedding and then, the stego key data is embedded in a row number R in cover video frame calculated as:
R = F − ( f (D, M , Y ) mod(F ))
vectors to change the locations of pixels in P matrix in a manner specified by the stego key which is the seed to generate the Q1 and Q2 vectors. The locations in each of the two vectors are unique, therefore the mapping P → U is one to one. The fourth step is the conversion of the randomized secret message blocks, secret message file format and stego key data to binary stream. This is done by replacing the two LSB of the red, green and blue values in each pixel in the desired cover video frame with the binary stream sequentially. It will be shown in Section IV that this order achieves higher PSNR ratio than the traditional approach, which embeds the data into layers of Red, Green or Blue. The previous steps are repeated for all secret message blocks.
(1)
where f (D,M,Y) is a function calculated from the system date (DD/MM/YY). For example;
⎛ D +Y ⎞ f (D, M , Y ) = round ⎜ ⎟ ⎝ M ⎠ F is given by:
⎢ ⎛ 4 N 2 ⎞⎥ ⎟⎟⎥ F = ⎢ H − ⎜⎜ W ⎝ ⎠⎦ ⎣
(3)
Equation (3) indicates that we embed one byte of secret data in four bytes of cover data. The third step is the generation of two permuted vectors Q1 and Q2 , each of size N to randomize the positions (row, column) of the secret-message blocks of data and the secret message format. To do this, we generate two permuted vectors Q1 (1 : N ) , and Q2 (1 : N ) .
Starting with a secret message block P(1 : N ,1 : N ) , we construct the randomized permuted secret message block U (1 : N ,1 : N ) as follows:
U (i, j ) = P(Q1 (i ), Q2 ( j ))
Fig. 1 Schematic block diagram for the embedding process
(2)
(4)
Where i and j are image/video frame row and column coordinates respectively. In effect, we utilize the generated random permuted values of Q1 and Q2
S frames of size H×W with a secret2 message of s blocks of size N byte embedded randomly. Fig. 2 A sequence of
B. Extraction Stage The block diagram of the extraction processes is shown in Figure (3). First, the stego video file header is read to determine the date, month and year of modification which is simply a surrogate for the actual stego key. R is then calculated from Equation (1), and the stego key is extracted. The second step is the extraction of the two LSB from each pixel of the stego video frame based on the extracted stego key data. The
2 out of 6
length of secret message block N 2 is determined from the length of the stego key. Third the random location block matrix of size N × N for each stego video frame is generated based on the extracted stego key data. Finally, the randomized secret block and randomized secret message format are recovered based on the extracted stego key data and the secret message block is reconstructed. The process is repeated for all s blocks.
Stego key
Generation of two random permuted vectors
Modify the randomized secret message format
Number of video frames used for embedding Stego video frame
Modified secret message format
Extraction of N *N randomized block
Randomized block
Modify N *N block in reverse order to the randomization in the embedding process
Modified N*N block
Construction of secret message
Secret message
III. PERFORMANCE EVALUATION OF THE PROPOSED SCHEME Steganography is characterized mainly by two aspects; imperceptibility and capacity. Imperceptibility means the embedded data must be imperceptible to the observer (perceptual invisibility) and computer analysis (statistical invisibility). Capacity means maximum payload is required, i.e. maximum amount of data that can be embedded into the cover image without losing the fidelity of the original image [10]. The perceptual imperceptibility of the embedded data is indicated by comparing the original image or video to its stego counterpart so that their visual differences, if any, can be determined. Additionally, as an objective measure, the Mean squared Error (MSE), Peak Signal to Noise Ratio (PSNR) and Root Mean Square error (RMS) between the cover and stego images may be calculated. These parameters are given by:
1 HW
H
W
∑∑ (P(i, j ) − U (i, j ))
2
(5)
i =1 j =1
L2 MSE
Byte
(7)
IV.DISCUSSION AND EXPERIMENTAL RESULTS
In this experiment, nine audio files representing various formats, MPEG version 3 (MP3), Musical Instrument Digital Interface (MIDI) and Windows Media Audio (WMA), of different sizes were considered as a secret message in the evaluation as listed in Table I.
D. Image experiment In this experiment, nine Image files representing various formats, Bitmap (BMP), JPEG and Graphical Interchange Format (GIF), of different sizes were considered as a secret-message. A sample of cover video frame, stego video frame, secret message (BMP format) and the secret-message after applying proposed technique, i.e. effect of Equation (4) are shown in Figure 4. Results of the experiment are summarized in Table (II).
E. Text experiment In this experiment, nine document files representing various formats, plain Text, Microsoft Word (DOC) and Rich Text Format (RTF), of different sizes were considered as secret messages. PSNR, and MSE results are listed in Table (III). A sample of cover video frame, stego video frame, secret message (DOC format) and the secret-message after applying proposed technique are shown in Figure (5).
F. Video experiment
where P(i,j) and U(i,j) are the pixel values at row i and column j of the cover image and stego image respectively.
PSNR = 10 log10
1 KSW (H − F ) 4
C. Audio experiment
Fig. 3 Schematic block diagram for the extraction process.
MSE =
C=
The Proposed algorithm was implemented using MATLAB. For all the experiments presented herein, we used N = 256 and the numbers of LSB bits to be replaced was fixed at two. Several experiments were conducted to test the robustness and imperceptibility of the algorithm using audio, text, image and video files in different formats and different sizes as secret-messages.
Randomized secret message format
Extraction all needed information (Date and time for modification of stego video file, stego key, number video frames used for embedding , randomized secret message format )
The maximum capacity of cover video file is given by:
(6)
where L is the peak signal level (L = 255 for 8-bit gray scale images).
In this experiment, nine video files representing various formats, AVI, Windows Media Video (WMV) and Advanced Streaming Format (ASF), of different sizes were considered as a secret-message in the evaluation as listed in Table (IV). A sample of cover video frame, stego video frame, secret message (AVI format) and the secret-message after applying proposed technique are shown in Figure (6).
3 out of 6
It should be noted that for Figures 4-8, the secret message is shown assuming that the interceptor has knowledge of the file format and type, the locations of the hidden message and the number of bits, but not the vectors Q1 and Q2. a)
a)
b)
b)
c) d) Fig.5 Embedded document file of size 998KB. a) Cover video frame; b) stego video frame; c) secret message; d)secret message after applying proposed technique.
c) d) Fig.4 Embedded image of size 3.75MB. a) Cover video frame; b) stego video frame; c) secret message; d)secret message after applying proposed technique.
a)
b)
c) d) Fig.6 Embedded video file of size 6.59MB. a) Cover video frame; b) stego video frame; c) secret message; d)secret message after applying proposed technique. Table (I) Evaluation of audio experiment Secret message information (Audio) Cover video file information Name
resolution
Frame /sec.
No. of frames
Size(MB)
Test_1
288×352
15
167
48.4
Test_2
288×352
15
190
55.1
Test_3
288×352
15
190
55.1
Format Type MP3_1 MP3_2 MP3_3 MIDI_1 MIDI_2 MIDI_3 WMA_1 WMA_2 WMA_3
4 out of 6
Size 843KB 3.04MB 5.12MB 18.7KB 106KB 171KB 0.97MB 3.31MB 4.88MB
Duration (min.) 1.01 3.48 5.35 1.44 8.47 5.59 4.06 5.45 4.14
Average PSNR 53.71 53.11 52.96 59.3 55.67 53.41 51.31 50.86 51.26
Average MSE 0.31 0.32 0.33 0.07 0.18 0.29 0.48 0.54 0.49
Table (II) Evaluation of image experiment Secret message information (Image) Cover video file information Name
Resolution (W×H)
Frame /sec.
No. of frames
Size(MB)
Test_1
288×352
15
167
48.4
Test_2
288×352
15
190
55.1
Test_3
288×352
15
190
Format Type BMP_1 BMP _2 BMP _3 JPG_1 JPG_2 JPG _3 GIF_1 GIF_2 GIF _3
55.1
Size 1.03MB 3.75MB 8.38MB 0.97MB 2.59MB 4.48MB 1.49MB 264KB 51.4KB
Resolution (W×H) 669×538 1280×1024 1240×1775 2304×3072 1489×1239 5000×10000
2480×1772 952×505 250×250
Average PSNR 65.56 54.65 50.44 52.31 51.94 52.02 51.42 52.16 51.66
Average MSE 0.03 0.24 0.61 0.38 0.41 0.40 0.47 0.49 0.44
Table (III) Evaluation of text experiment Secret message information (Text) Cover video file information Name
Resolution (W×H)
Frame /sec.
No. of frames
Size(MB)
Test_1
288×352
15
167
48.4
Test_2
288×352
15
190
55.1
Test_3
288×352
15
190
55.1
Format Type TEXT_1 TEXT_2 TEXT_3 DOC_1 DOC_2 DOC_3 RTF_1 RTF_2 RTF_3
Size 1.32MB 820KB 105KB 5.44MB 3.11MB 998KB 219KB 177KB 104KB
No. of Pages 524 223 48 127 21 62 77 18 34
Average PSNR 51.61 51.92 52.81 51.57 53.58 52.51 52.08 51.81 52.19
Average MSE 0.46 0.41 0.34 0.52 0.37 0.42 0.42 0.43 0.40
Table (IV) Evaluation of video experiment Secret message information (Video) Cover video file information Name
Resolution (W×H)
Frame /sec.
No. of frames
Size (MB)
Test_1
288×352
15
167
48.4
Test_2
288×352
15
190
55.1
Test_3
288×352
15
190
55.1
Format Type
Size
Resolution (W×H)
Duration (sec.)
AVI_1 AVI _2 AVI _3 WMV_1 WMV _2 WMV _3 ASF_1 ASF _2 ASF _3
6.59MB 3.68MB 1.57MB 7.66MB 3.85MB 1.07MB 9.59MB 3.7MB 360KB
120×160 144×176 144×176 240×320 480×720 240×320 240×320 240×320 240×320
4 4 12 123 12 14 196 59 12
In all experiments, the average PSNR is greater than 50 dB and Average MSE is below 0.61. Therefore experimental results show that the proposed model is effective. It maintains the quality of the video and no variation between the cover data and stego data that can be detected by the human vision system. Figure (7) compares the average PSNR of the proposed LSB embedding technique (per pixel, RGB) to the traditional layering technique in which embedding is done by layers of RGB. Our results show significant improvement in PSNR up to 2.5 dB more than the PSNR achieved using traditional LSB embedding techniques. Figure (8) shows the relation between the PSNR and the secret message size. It is observed that the secret message size does not affect the quality of the stego video. V. CONCLUSION This paper presents a video-based steganographic model which utilizes cover video files in spatial domain to conceal the presence of other sensitive data regardless of its format. The proposed technique can be used in
Average
PSNR
52.58 51.11 52.45 52.04 51.08 52.52 50.94 51.19 51.52
Average
MSE
0.3642 0.53 0.42 0.40 0.51 0.38 0.52 0.5 0.46
spatial and frequency domain since it works on the secret message regardless the domain of the container. The proposed technique can also be used on YUV and YCbCr formats but it needs a normalization preprocessing step. Four types of secret messages are used to evaluate the proposed technique. These are text, audio, image, and video data files in different formats. PSNR as well as MSE averaged over all stego video frames are calculated for each type and compared to original cover video sequence. Our results show that the resultant PSNR is greater than 50 db and the embedding capacity is high. The proposed model is more secure against attacks because it depends on a list of security parameters. These security parameters are the novel algorithm to extract the message from the video file, the number of the embedded LSB bits, the selected transform domain, and the stego key data. There is also no need to have the original video file for extraction. These parameters must be known to hackers to extract secret message from the stego video file.
5 out of 6
PROPOSED TEQNIQUE
EMBEDDING WITHOUT RANDOMIZATION
70 60
P S NR (d B )
50 40 30 20 10
3_ 3 M ID I_ 1 M ID I_ 2 M ID I_ 3 W M A_ W 1 M A_ W 2 M A_ TE 3 XT _ TE 1 XT _ TE 2 XT _3 D O C_ 1 D O C_ 2 D O C_ 3 R TF _1 R TF _2 R TF _3 BM P_ 1 BM P_ BM 2 P_ 3 JP G _1 JP G _2 JP G _3 G IF _1 G IF _2 G IF _3 AV I_ 1 AV I_ 2 AV I_ W 3 M V_ W 1 M V_ W 2 M V_ 3 AS F_ 1 AS F_ 2 AS F_ 3
3_ 2
M P
M P
M P
3_ 1
0
Secret message file format
Fig.7 Average PSNR versus the secret message file format for the proposed and traditional LSB embedding technique.
[8] Hema Ajetrao, Dr.P.J.Kulkarni and Navanath Gaikwad, ” A Novel Scheme of Data Hiding in Binary Images”, International Conference on Computational Intelligence and Multimedia Applications,Vol.4, pp. 70-77, SivakasiTamil Nadu, Dec. 2007. [9] Yueyun Shang, "A New Invertible Data Hiding in Compressed Videos or Images", Third International Conference on Natural Computation (ICNC 2007), Vol. 4, pp. 576-580, Haikou, Aug. 2007.
Fig.8 Peak Signal to Noise Ratio versus secret message size using different data types.
[10] Venkatraman S., Ajith Abraham and Marcin Paprzycki, “Significance of Steganography on Data Security”, International Conference on Information Technology: Coding and Computing (ITCC’04), Vol. 2, April 2004.
REFERENCES: [1] Daniela Stanescu, Mircea Stratulat, Voicu Groza, Joana Ghergulescu and Daniel Borca, "Steganography in YUV color space", IEEE International Workshop on Robotic and Sensors Environments (ROSE 2007), OttawaCanada, pp.1-4, October 2007. [2] N. Provos and P. Honeyman, "Hide and Seek: An Introduction to Steganography", IEEE Security & Privacy Magazine, Vol. 1, issue 3, pp. 32-44, June 2003. [3] Stefan Katzenbeisser and Fabien A. P. Petitcolas, "Information Hiding Techniques for Steganography and Digital Watermarking", Artech House Books, December 1999, ISBN 1-58053-035-4. [4] R.Kavitha and A. Murugan, "Lossless Steganography on AVI File using Swapping Algorithm", International Conference on Computational Intelligence and Multimedia Applications, pp. 83-88, Sivakasi-Tamil Nadu, Dec. 2007 [5] Yeunan-Kuen Lee and Ling-Hwei Chen, “High Capacity Image Steganohraphic Model”, IEE Proceedings in Vision, Image and Signal Processing, Vol. 147, issue 3, pp. 288-294, June 2000. [6] Neil F. Johnson, Zoran Duric and Sushil Jajodia, "Information Hiding: Steganography and Watermarking Attacks and Countermeasures", Kluwer Academic Publishers, 2000, ISBN: 0-79237-204-2. [7] C. Ming, Z. Ru, N. Xinxin and Y. Yixian, "Analysis of Current Steganography Tools: Classifications & Features", Proceedings of the 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP'06), pp. 384-387, California, Dec. 2006.
6 out of 6