Enhanced Data Security Using Digital media-Video Stegnography

Authors

  • Shruti Deptt. Of Computer science Guru Nank Dev University Gurdaspur, India

Keywords:

Steganography, Cryptography, Digital Watermarking, LSB, Encrption, AES

Abstract

Information security has become the area of concern as a result of widespread use of communication medium over the internet. This paper focuses on the data security approach when combined with encryption and steganographic techniques for secret communication by hiding it inside the multimedia files. The high results are achieved by providing the security to data before transmitting it over the internet. The files such as images, audio, video contains collection of bits that can be further translated into images, audio and video. The files composed of insignificant bits or unused areas which can be used for overwriting of other data. This paper explains the proposed algorithm using video steganography for enhancing data security.

References

Nutzinger,M.C.Fabian, and M.Marschalek. ”Secure Hybrid Spread Spectrum System for Steganography in Auditive Media”. In Intelligent Information Hiding and Multimedia Signal Processing(IIH-MSP), 2010 Sixth International Conference.

Abbas Cheddad,Joan Condell,Kevin Curran,Paul Kevitt,”Enhancing Steganography In Digital Images”.Proc.Canadian Conference on Computer and Robot Vision.

B.Dunbar.A Detailed look at steganographic techniques and their use in an Open-Systems Environment,Sans Institute,1(2002).

Alain,C.Brainos,”A study of Steganography and Art Of Hiding Information,”East Carolina University.

Bender,W,Grulh,D,Morimoto,N. & Lu,A.,”Techniques for Data Hiding”,IBM Systems Journal,Vol 35,1996.

Dunbar,B.,”Steganography Techniques and their use in an Open-Systems environment”,SANS Institute,January 2002.

Marvel,L.,M.,Boncelet Jr.,C.G.& Retter,C.,”Spread Spectrum Steganography”,IEEE Transactions on Image Processing,1999.

Wang,H & Wang,S,”Cyber Warfare:Steganography vs. Steganalysis”,Communications of the ACM,47:10,October 2004.

Stefan Katznbeisser, Fabien.A., P.Petitcolas editors, Information Hiding Techniques for Steganography and Digital Watermarking,Artech House, Boston.London,2000.

Jamil,T.,”Steganography:The art of Hiding Information is Plain Sight”,IEEE Potentials,18:01,1999.

B.Pfitzmann,”Information Hiding Terminology,”proc.First Int’l Workshop Information Hiding,Lecturer Notes in Computer Science No.1,174,Spring –Verlag,Berlin,1996,pp.347-356.

Yeuan-Kuen Leea and Ling-Hwei Cheng,”High capacity steganographic model”,IEEE Proc.Visual Image Signal Process., Vol.147, No.3, June 2000.

Ross J.Anderson,Fabien A.P.Petitcols,on The limits of steganography,IEEE Journal of Selected Areas in Communication,16(4); 474-481, May 1998.

M.Ashourian, R.C. Jain,and Y.H.Ho,Dithered Quantization for Image Data Hiding In DCT domain,Proc.of IST2003,2003,171-175.

C.C.lin,P.F.Shiu,High Capacity Data Hiding scheme for DCT-based images.Journal of Information Hiding and Multimedia Signal Processing,1(3), 2010, 314-323.

A.Nag, S.Biswas, D.Sarkar, P.Sarkar, A Novel Technique for Image Steganography based on Block-DCT and Huffman Encoding, International Journal of Computer Science and Information Technology.

C.C.Chang,C.C.Lin,C.S.Tseng,and W.L.Tai Reversible hiding in DCT-based Compressed Images,Information Sciences Journal, 177(13), 2007, 2768-2786.

M.Iwata,k.miyake,A. Shiozaki,Digital Steganography utilizing Features of JPEG Images,IEICE Trans.Fundamentals,E87-A, 2004, 929-936.

C.C. Chang,T.S.Chen,and L.Z. Chung, A Steganographic Method Based Upon JPEG quantization table modification, Information Sciences Journal, 2002,141(1,2),123-138.

Kumar.B.,D.,Bhattacharya,P.Das,D.Ganguly and S.Mukherjee,” A tutorial review on Steganography”,International Conference on Contemporary Computing (IC3-2008), Noida, India, August 7-9, 2008, pp.105-114.

Shahereza,S.S. and M.T.M. Shalmani.High capacity error free wavelet Domain Speech Steganography.in Acoustics,Speech and Signal

Processing,2008.ICASSP 2008.IEEE International Conference on.2008.

Vapnik,V.N.”Statistical Learning Theory”.John Wiley and Sons,New York,USA,1998.

Johnson,N.F. and S. Jajodia,Exploring Steganography:Seeing the unseen.

Bender,W.W.Butera,D.Gruhl,R.Hwang,F.J.Paiz,S.Pogreb,”Techniques for data hiding”,IBM Systems Journal,Volume 39,Issue 3-4,July 2000, pp. 547-568.

Chiungy,.W.and W. Quincy.”Information Hiding in Real Time VoIP Streams”.in Multimedia,2007.ISM 2007.Ninth IEEE International Symposium on.2007.

Bhattacharya,D.et al.,Hiding Data in Audio Signal.Advanced Communication and Networking,C.,C.,Chang,et al.,Editors.2010,Springer

Berlin Heidelberg.p.23-29.

Dipti Kapoor Sarmah, Neha Bajpai.”Proposed System for data hiding using Cryptography and Steganography”.Proc.International Journal of Computer Applications, Vol 9, Isuue2, 2010.

Downloads

Published

2024-02-26

How to Cite

Shruti. (2024). Enhanced Data Security Using Digital media-Video Stegnography. COMPUSOFT: An International Journal of Advanced Computer Technology, 4(07), 1934–1937. Retrieved from https://ijact.in/index.php/j/article/view/341

Issue

Section

Original Research Article

Similar Articles

<< < 2 3 4 5 6 7 8 > >> 

You may also start an advanced similarity search for this article.