Enhanced Data Security Using Digital media-Video Stegnography
Keywords:
Steganography, Cryptography, Digital Watermarking, LSB, Encrption, AESAbstract
Information security has become the area of concern as a result of widespread use of communication medium over the internet. This paper focuses on the data security approach when combined with encryption and steganographic techniques for secret communication by hiding it inside the multimedia files. The high results are achieved by providing the security to data before transmitting it over the internet. The files such as images, audio, video contains collection of bits that can be further translated into images, audio and video. The files composed of insignificant bits or unused areas which can be used for overwriting of other data. This paper explains the proposed algorithm using video steganography for enhancing data security.
References
Nutzinger,M.C.Fabian, and M.Marschalek. ”Secure Hybrid Spread Spectrum System for Steganography in Auditive Media”. In Intelligent Information Hiding and Multimedia Signal Processing(IIH-MSP), 2010 Sixth International Conference.
Abbas Cheddad,Joan Condell,Kevin Curran,Paul Kevitt,”Enhancing Steganography In Digital Images”.Proc.Canadian Conference on Computer and Robot Vision.
B.Dunbar.A Detailed look at steganographic techniques and their use in an Open-Systems Environment,Sans Institute,1(2002).
Alain,C.Brainos,”A study of Steganography and Art Of Hiding Information,”East Carolina University.
Bender,W,Grulh,D,Morimoto,N. & Lu,A.,”Techniques for Data Hiding”,IBM Systems Journal,Vol 35,1996.
Dunbar,B.,”Steganography Techniques and their use in an Open-Systems environment”,SANS Institute,January 2002.
Marvel,L.,M.,Boncelet Jr.,C.G.& Retter,C.,”Spread Spectrum Steganography”,IEEE Transactions on Image Processing,1999.
Wang,H & Wang,S,”Cyber Warfare:Steganography vs. Steganalysis”,Communications of the ACM,47:10,October 2004.
Stefan Katznbeisser, Fabien.A., P.Petitcolas editors, Information Hiding Techniques for Steganography and Digital Watermarking,Artech House, Boston.London,2000.
Jamil,T.,”Steganography:The art of Hiding Information is Plain Sight”,IEEE Potentials,18:01,1999.
B.Pfitzmann,”Information Hiding Terminology,”proc.First Int’l Workshop Information Hiding,Lecturer Notes in Computer Science No.1,174,Spring –Verlag,Berlin,1996,pp.347-356.
Yeuan-Kuen Leea and Ling-Hwei Cheng,”High capacity steganographic model”,IEEE Proc.Visual Image Signal Process., Vol.147, No.3, June 2000.
Ross J.Anderson,Fabien A.P.Petitcols,on The limits of steganography,IEEE Journal of Selected Areas in Communication,16(4); 474-481, May 1998.
M.Ashourian, R.C. Jain,and Y.H.Ho,Dithered Quantization for Image Data Hiding In DCT domain,Proc.of IST2003,2003,171-175.
C.C.lin,P.F.Shiu,High Capacity Data Hiding scheme for DCT-based images.Journal of Information Hiding and Multimedia Signal Processing,1(3), 2010, 314-323.
A.Nag, S.Biswas, D.Sarkar, P.Sarkar, A Novel Technique for Image Steganography based on Block-DCT and Huffman Encoding, International Journal of Computer Science and Information Technology.
C.C.Chang,C.C.Lin,C.S.Tseng,and W.L.Tai Reversible hiding in DCT-based Compressed Images,Information Sciences Journal, 177(13), 2007, 2768-2786.
M.Iwata,k.miyake,A. Shiozaki,Digital Steganography utilizing Features of JPEG Images,IEICE Trans.Fundamentals,E87-A, 2004, 929-936.
C.C. Chang,T.S.Chen,and L.Z. Chung, A Steganographic Method Based Upon JPEG quantization table modification, Information Sciences Journal, 2002,141(1,2),123-138.
Kumar.B.,D.,Bhattacharya,P.Das,D.Ganguly and S.Mukherjee,” A tutorial review on Steganography”,International Conference on Contemporary Computing (IC3-2008), Noida, India, August 7-9, 2008, pp.105-114.
Shahereza,S.S. and M.T.M. Shalmani.High capacity error free wavelet Domain Speech Steganography.in Acoustics,Speech and Signal
Processing,2008.ICASSP 2008.IEEE International Conference on.2008.
Vapnik,V.N.”Statistical Learning Theory”.John Wiley and Sons,New York,USA,1998.
Johnson,N.F. and S. Jajodia,Exploring Steganography:Seeing the unseen.
Bender,W.W.Butera,D.Gruhl,R.Hwang,F.J.Paiz,S.Pogreb,”Techniques for data hiding”,IBM Systems Journal,Volume 39,Issue 3-4,July 2000, pp. 547-568.
Chiungy,.W.and W. Quincy.”Information Hiding in Real Time VoIP Streams”.in Multimedia,2007.ISM 2007.Ninth IEEE International Symposium on.2007.
Bhattacharya,D.et al.,Hiding Data in Audio Signal.Advanced Communication and Networking,C.,C.,Chang,et al.,Editors.2010,Springer
Berlin Heidelberg.p.23-29.
Dipti Kapoor Sarmah, Neha Bajpai.”Proposed System for data hiding using Cryptography and Steganography”.Proc.International Journal of Computer Applications, Vol 9, Isuue2, 2010.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2015 COMPUSOFT: An International Journal of Advanced Computer Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.
©2023. COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY by COMPUSOFT PUBLICATION is licensed under a Creative Commons Attribution 4.0 International License. Based on a work at COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY. Permissions beyond the scope of this license may be available at Creative Commons Attribution 4.0 International Public License.