A modified approach of video steganography for information hiding

Authors

  • Gupta B

Keywords:

Steganography, Cryptography, DWT, PSNR, MSE, MAES

Abstract

Steganography is a branch of information hiding. Steganography is a process of embedding the secret information inside the host medium (text, audio, image and video). Video Steganography is the technique of hiding some secret message inside a Video. For improving security we are also using Cryptography. Cryptography is a method of storing and transmitting data in a particular form so that only those for whom it is deliberate can read and process it. In this report Modified Advance Encryption Standard algorithm is used for converting the message in cipher text and then hides this cipher text in video using Discrete Wavelet Transformation technique. Proposed DWT technique is robust to the common attacks.

References

A.Elsayed, A.Elleithy, P.Thunga, Z.Wu, “Highly Secure Image Steganography Algorithm using Curvelet Transform and DCT Encryption ”,Systems, Applications and Technology Conference(LISAT) 2015 IEEE Long Island, Page(s): 1-6

Santhoshi Bhatt, Arghya Ray, Avishake Ghosh, Ananya Ray, “Image Steganography and Visible Watermarking using LSB Extraction Technique”, IEEE Sponsored 9th International Conference on Intelligent Systems and Control(ISCO ) 2015 ,Page(s): 1-6

Saket Kumar, Ashutosh Gupta, Ankur Chandwani, Gaurav Yadav, Rashmi Swarnkar, “RGB Image Watermarking on Video Frames using DWT”,IEEE Sponsored 5th International Conference 2014, Page(s):675-680

Ramadhan J. Mstafa and Khaled M. Elleithy, “A Highly Secure Video Steganography using Hamming Code (7, 4)”,(LISAT) IEEE 2014 ,Page(s):1-6

P.Deshmukh, V.Kolhe, “Modified AES Based Algorithm for MPEG Video Encryption” ,IEEE International Conference on Information Communication and Embedded Systems (ICICES )2014, Page(s):1-5

Parag Kadam , Mangesh Nawale, Akash Kandhare, Mukesh Patil , “Separable Reversible Encrypted Data Hiding in Encrypted Image Using AES algorithm and Lossy Technique” Pattern Recognition, Informatics and Mobile Engineering (PRIME) IEEE 2013, Page(s):312-316

Mennatallah M. Sadek, Amal S. Khalifa, Mostafa G. M. Mostafa, “Video steganography: a comprehensive review”, Multimedia Tools and Applications (2015) Volume 74,Springer ,Page(s):7063–7094

Richa Khare, Rachana Mishra ,Indrabhan Arya, Oriental College of Tech Bhopal,” Video Steganography by LSB Technique using Neural Network” 2014 Sixth International Conference on Computational Intelligence and Communication Networks ,IEEE, Page(s):898-902

Navneet Kaur, Sunny Behal “A Survey on various types of Steganography and Analysis of Hiding Techniques” International Journal of Engineering Trends and Technology (IJETT) – Volume 11 Number 8 - May 2014,Page(s):388-392

Jasleen Kour, Deepankar Verma “Steganography Techniques-A Review Paper”, International Journal of Emerging Research in Management & Technology, vol-3, May 2014,Page(s):132-135 [11] Abbas Cheddad, Joan Condell, Kevin Curran and Paul Mc Kevitt “Digital Image Steganography: Survey and Analysis of Current Methods”, signal processing, vol-90, march 2010, ELSEVIER ,Page(s):727-752

Mohsin Khan, Sadaf Hussain, Malik Imran “Performance Evaluation of Symmetric Cryptography Algorithms: A Survey” International Journal of Information Technology and Electrical Engineering Volume 2, Issue 2 April 2013,Page(s):1-8

Avinash kak , “AES: Advance Encryption Standard Lecture Notes on : Computer and Network Security” May 1, 2015 , Purdue University, pp 1-79 Date: 25/1/2016 Time: 10:09 AM

Richa Khare,Dr.Kuldeep Raghuwanshi, “A Review of Video Steganography Methods”, International Journal of Research in Advent Technology, volume 2,January 2014,Page(s):447-451

Madhuri Rajavat, D S Tomar, “ A Secure Watermarking and Tampering detection technique on RGB image using 2 level DWT”, Fifth International Conference on Communication System and Network Technologies 2015 IEEE, Page(s):638-642

Downloads

Published

2024-02-26

How to Cite

Gupta, B. (2024). A modified approach of video steganography for information hiding. COMPUSOFT: An International Journal of Advanced Computer Technology, 7(08), 2803–2806. Retrieved from https://ijact.in/index.php/j/article/view/441

Issue

Section

Original Research Article

Similar Articles

1 2 3 4 > >> 

You may also start an advanced similarity search for this article.