A New Approach for Hiding Data Using B-box

—Digital Images and video encryption play an important role in today's multimedia world. Many encryption schemes have been proposed to provide a security for digital images. This paper designs an efficient cryptosystem for video. Our method can achieve two goals; the first goal is to design a height security for hiding a data in video, the second goal is to design a computational complexity cryptosystem.


I. INTRODUCTION
The grand challenges of the data that is carried and stored over the network is making the data safe and disclosed to illegal users.The use of computer networks -especially during the last decade -has grown dramatically.For this reason, creating and developing the security systems and encryption techniques should take wide focus in the field of information security [2].Parallel with the information transition evolution time, systems and techniques have big success against the threats, but still there are faults [1].One of these techniques is using the image and multimedia encryption, because the digital image is becoming important carrier of information for people [3].With the advance of information security requirement, the encryption technology of digital image is applied widely on multimedia communications.Conventional encryption arithmetic could be used to develop or initiate new techniques for best specification and satisfactions.Because some encryption algorithms still used where there there disadvantages and faults are included, such as the structure complexity, the secret key singleness and the encryption speed slowly, and it is difficult to satisfy the encryption requirement of the image that has lots of data.So using the conventional encryption solely is not enough [4].Anarchic mapping idea could be applied into video to encrypt, because it has the sensitivity and big qualifications of initial values and the randomness [6].The method which is adopting combined conventional encryption technology.Complex anarchic mapping can overcome the single conventional encryption's disadvantage effectively.The pixels' values in original image of video frames can be changed ultimately via encrypting, in order to realize the aim of encryption [5].
For powerful and advanced quality of encryption effectively, the method of position scrambling can be used before and during encrypting steps [5].The classical algorithms are Arnold cat map, affine transformation, magic square transformation, and knight-tour transformation, etc.Through these transformations, the change of the image pixels' position can be realized by keeping the secret of parameters and by normalizing heavy complex random boxes and numbers and with iteration times to reach the aim of encryption.A method which based on Arnold cat map and S-DES has been proposed and developed strongly and efficiently in this paper by applying the particular character of logistic anarchic map.The key numbers of S-DES are increased and the key can be changed in real-time [7].The experiments results have shown that the good methods that integrate encryption/decryption process on the image or video produce well security and fast executing with no visible contorting or reconstructing on the image

II. THE METHOD
The method of encryption process divides into two sections.First section is to encrypt the data.The second is to augment the encrypted data on a video file.

A. Encryption Algorithm
With first section step, we will initiate the input size of Plaintext such 8 -character and handle such a binary (0s, 1s).

1) Choose eight characters as Plaintext such one block. 2) Calculate the weight of the plaintext characters by subtracting 64 from the ASCII code of each character
3) Convert the weights to binary mode with 6 bits.Here, output includes 48 binary bits (8char * 6bits).31) Convert the values from decimal to binary mode.32) Bring first three bits of encrypted data bits and put them rather last three binary bits of minimum value, and next three bits of encrypted data bits rather than last three binary bits of mean value, and next three bits of encrypted data bits key rather the last three binary bits of maximum.

33) Convert each changed binary back to decimal mode. 34) Carry each value as new pixels back to the origin locations of the new values (locations of min, mean and max) of sub-image array which is the converted image.
35) Convert the converted image back to frame data type.36) Fulfill the video object file by adding frame by frame to the video object file that has been constructed, respectively, depending on the frame order from that came out of the inputted video file.

37) Close the figure that prints the data of frames to initiate the new figure to present the next frame to add them onto video object file.
38) Generate special algorithm on the video file that is done to remove -for some time -some delays or to increase of video size that could occur.
Here, the algorithm has finished encrypting the data and hiding it inside a video file by a very strong algorithm that aims to hide and save data or to maintain property rights.

B. Decrytion Algorithm
Now, the output is the encrypted video will be decrypted by the inverse algorithm to testify and return the original video -that has been encrypted -file back.
1) Define the video that should be decrypted.
2) Find the number of frames of the defined video.
3) Find the dimensions of video frames that defined.4) Create a figure whose would hold the video frames.5) Configure the shape of created figure, dimensions and location to be adjusted with appearance of video frames properties.
6) By applying a particular algorithm to generate a random number, select random number from the interval [ 25) Align the bits for each address of the cells; where the 2-bit of row addresses of each cell that will be located between the 4-bit of column.26) Convert these 6 bits decimal number.27) Add threshold (64), then convert it to ASCII character.
With showing these characters as one line, the output is the original data.

THE FOLLOWING FIGURE SHOWS HOW DOES THE METHOD
ENCRYPT THE VIDEO BRIEFLY CONCLUSION In this paper before hiding data in audio, convert the 8 characters to 48 bits, compression the output to 32 bits by using B-table, broadcast in P-table to get different location for bits.Hiding the 32 bit in random frame and random pixel will be difficult to attack the data, and also a smallest space is used in hiding data that each 8 character is in 5 pixels.
Write the output row by row to get new 32 bits.The output is the encrypted data bits and the next steps for augmenting the encrypted data into video file www.ijacsa.thesai.org11)Initiate a free object of video file to prepare for constructing a new video and giving the name of the object.12)Define the video that should be encrypted.13) Find the number of frames of the defined video.14) Find the dimensions of video frames that defined.15) Create a figure that would hold the video frames.
Table, where B -table which consists of 4 rows and 15 columns.The table made up by Broadcasting the bits of decrypted data array on the P -1 table, where the P -1 is evaluated by special generation www.ijacsa.thesai.orgSearch each decimal number in b-table column by column until matching, the intersection of row and column.