International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 3 Issue: 12 6847 - 6850 ______________________________________________________________________________________ 6847 IJRITCC | December 2015, Available @ http://www.ijritcc.org _______________________________________________________________________________________ An Efficient Approach to Secure Versatile Data File in Video using Forbidden Zone Data Hiding Technique Richa Sharma 1 Student, M.Tech(Computer Engineering) Marudhar Engineering College richa.sharma014@gmail.com Ms. Deepika Gupta 2 Assistant Professor Marudhar Engineering College deepika.gupta1218@gmail.com Abstract:-Video Steganography is a technique in which we can hide all types of files with any extension into a carrying Video file. In this dissertation, we are using two main terminology that is host file and carrier file where host file is a hidden file (any kind of file like text file, image file, and audio/video file) and carrier file must be a video file. The main motivation of this dissertation is to secure transferring of data by using steganography and cryptography technique. It is concerned with embedding information in an innocuous cover media in a secure and robust manner. In this dissertation we are using Forbidden Zone Data Hiding technique where no alteration is required in host signal range during data hiding process.To securely transferring the data file, we use video data hiding and making use of correction capacity of repeat accumulate code with superiority of forbidden zone data hiding. Using this approach we can also hide and transfer the large video file whose size is larger than cover file in secure manner. The main advantage of using video file in hiding information is the added security against of the third party or unintended receiver due to the relative complexity of video compared to image and audio file. Keywords- Cryptography, Steganography, Forbidden zone data hiding __________________________________________________*****_________________________________________________ I. INTRODUCTION Security and privacy plays a main role in data transformation. For secret communication , cryptography is a technique that scrambles original text or convert original message into non-readable format while steganography deals with hiding a secret data in some carrier file which may be text , image , audio and video file that cannot be viewed by unauthorised person. The video steganography uses a some frames of video files to embed a secret message and file. Most of the latest work in data hiding is about copyright protection and authentication of multimedia data. The advantage of steganography over cryptography is that messages do not attract attention to themselves. Data hiding in which some data is conveyed within a host medium and transmitted to the receivers end. There are main requirements of a data hiding system: Imperceptibility: There should not be perceptual squalor due to data hiding. Ideally one could not be able to differentiate host signal and marked signal. Robustness: This is the ability and strength of a data hiding system after certain attacks, in terms of correctly decoding the hidden data. Capacity: It refers to the possible number of message bits that can be hidden in the host signal. Security: some security applications may be crucial. In that case, secure the hidden data so that adversary cannot interfere or interfere by any means. II. FORBIDDEN ZONE DATA HIDING Forbidden Zone (FZ) [8] is defined as the host signal range, where alteration is not allowed during data hiding process. Let s (bold denoting a vector) be the host signal in RN and m ∈ {0, 1} be the data to be hidden. Then the marked signal x is obtained as given in (1). X= , ∈ () , ∈ where FZm, Allowed Zone (AZm) pair defines the host signal zones where modification is allowed or not and Mm(.) is a mapping from RN to a suitable partition of RN. The requisite on these zones and partitions is simply based on the restraint that they should be mutually exclusive for different m. FZm and AZm are defined using the control parameter and the difference vector: = ݏ| || || ≤ ݎ, = ݏ| || || > ݎMasking is applied to data hiding and watermarking in a number of efforts, as in order to incorporate perceptual analysis, so that perceptually usable host signal samples and permissible distortion limits are determined. However, FZ does not involve any perceptual analysis and adaptive coefficient selection process. The main motivation of FZ is decreasing the embedding distortion at a certain decoding error level. Similar to QIM, FZ should be applied, when the embedding distortion is within perceptually feasible margins. This requirement is generally satisfied as a result of the host signal power constraint, which states that the host