scholarly journals A Graphical Based Video Steganography

Author(s):  
Samir Bandyopadhyay ◽  
Payal Bose ◽  
Vishal Goyel

In today’s digital media data communication over the internet increasing day by day. Therefore the data security becomes the most important issue over the internet. With the increase of data transmission, the number of intruders also increases. That’s the reason it is needed to transmit the data over the internet very securely. Steganography is a popular method in this field. This method hides the secret data with a cover medium in a way so that the intruders cannot predict the existence of the data. Here a steganography method is proposed which uses a video file as a cover medium. This method has five main steps. First, convert the video file into video frames. Then a particular frame is selected for embedded the secret data. Second, the Least Significant Bit (LSB) Coding technique is used with the double key security technique. Third, an 8 characters password verification process. Fourth, reverse the encrypted video. Fifth, signature verification process to verify the encryption and decryption process. These five steps are followed by both the encrypting and decrypting processes.

2019 ◽  
Vol 28 (05) ◽  
pp. 1950083 ◽  
Author(s):  
Sa’ed Abed ◽  
Mohammed Al-Mutairi ◽  
Abdullah Al-Watyan ◽  
Omar Al-Mutairi ◽  
Wesam AlEnizy ◽  
...  

Steganography has become one of the most significant techniques to conceal secret data in media files. This paper proposes a novel automated methodology of achieving two levels of security for videos, which comprise encryption and steganography techniques. The methodology enhances the security level of secret data without affecting the accuracy and capacity of the videos. In the first level, the secret data is encrypted based on Advanced Encryption Standard (AES) algorithm using Java language, which renders the data unreadable. In the second level, the encrypted data is concealed in the video frames (images) using FPGA hardware implementation that renders the data invisible. The steganographic technique used in this work is the least significant bit (LSB) method; a 1–1–0 LSB scheme is used to maintain significantly high frame imperceptibility. The video frames used as cover files are selected randomly by the randomization scheme developed in this work. The randomization method scatters the data throughout the video frames rendering the retrieval of the data in its original order, without a proper key, a challenging task. The experimental results of concealment of secret data in video frames are presented in this paper and compared with those of similar approaches. The performance in terms of area, power dissipation, and peak signal-to-noise ratio (PSNR) of the proposed method outperformed traditional approaches. Furthermore, it is demonstrated that the proposed method is capable of automatically embedding and extracting the secret data at two levels of security on video frames, with a 57.1[Formula: see text]dB average PSNR.


Author(s):  
Meenakshi S Arya ◽  
Meenu Rani ◽  
Charndeep Singh Bedi

<p>With the intrusion of internet into the lives of every household and terabytes of data being transmitted over the internet on daily basis, the protection of content being transmitted over the internet has become an extremely serious concern. Various measures and methods are being researched and devised everyday to ensure content protection of digital media. To address this issue of content protection, this paper proposes an RGB image steganography based on sixteen-pixel differencing with n-bit Least Significant Bit (LSB) substitution. The proposed technique provides higher embedding capacity without sacrificing the imperceptibility of the host data. The image is divided into 4×4 non overlapping blocks and in each block the average difference value is calculated. Based on this value the block is classified to fall into one of four levels such as, lower, lower-middle, higher-middle and higher. If block belongs to lower level then 2-bit LSB substitution is used in it. Similarly, for lower-middle, higher-middle and higher level blocks 3, 4, and 5 bit LSB substitution is used. In our proposed method there is no need of pixel value readjustment for minimizing distortion. The experimental results show that stego-images are imperceptible and have huge hiding capacity.</p>


Author(s):  
Meenakshi S Arya ◽  
Meenu Rani ◽  
Charndeep Singh Bedi

<p>With the intrusion of internet into the lives of every household and terabytes of data being transmitted over the internet on daily basis, the protection of content being transmitted over the internet has become an extremely serious concern. Various measures and methods are being researched and devised everyday to ensure content protection of digital media. To address this issue of content protection, this paper proposes an RGB image steganography based on sixteen-pixel differencing with n-bit Least Significant Bit (LSB) substitution. The proposed technique provides higher embedding capacity without sacrificing the imperceptibility of the host data. The image is divided into 4×4 non overlapping blocks and in each block the average difference value is calculated. Based on this value the block is classified to fall into one of four levels such as, lower, lower-middle, higher-middle and higher. If block belongs to lower level then 2-bit LSB substitution is used in it. Similarly, for lower-middle, higher-middle and higher level blocks 3, 4, and 5 bit LSB substitution is used. In our proposed method there is no need of pixel value readjustment for minimizing distortion. The experimental results show that stego-images are imperceptible and have huge hiding capacity.</p>


Author(s):  
Ahlem Fatnassi ◽  
Hamza Gharsellaoui ◽  
Sadok Bouamama

Through the advent of digital information, information security has taken on a vital role. Use of the internet freely for contact has increased the attacks on users. Data protection is the present problem relating to privacy and security during storage and communication. This paper deals with a multilayered protected channel's proposal to transfer confidential data/video through a channel. The hidden video is initially encrypted using the algorithm NOLSB. The created cipher video is hidden in a larger sized video file. In addition, this video file is encrypted using the (m, k) firm technique to optimize resource efficiency and bandwidth optimization. Video shares are then sent through all the network's channels to ensure security. This approach ensures that video files could be retrieved at the end receiver even though any shares were lost over the network, without the sender needing to resend the video file.


Author(s):  
Chantana Chantrapornchai ◽  
Jitdumrong Preechasuk

Steganography is one of the techniques used to communicate secret data through the cover media such as images, videos, audio, texts etc. In this work, we consider the algorithms of steganography based on DCT and wavelet transform. The aspects of media quality after hiding the information in the digital media are considered. Particularly, we compare the performance of the prototype algorithms, representing the DCT and wavelet-based image steganography algorithms respectively, using the PSNR, capacity, robustness and accuracy aspects. For video steganography, with various wavelet transforms, we compare the quality of the derived information, when frames are dropped and the effects of payload is studied. The application of using such steganography algorithm which can embed multiple messages, each of which requires a separate key is proposed. The application can estimate the capacity used and capacity remains for the given cover image and texts.


Author(s):  
Kaviya K ◽  
Mridula Bala ◽  
Swathy N P ◽  
Chittam Jeevana Jyothi ◽  
S.Ewins Pon Pushpa

Today, the digital and social media platforms are extremely trending, leading a demand to transmit knowledge very firmly. The information that is exchanged daily becomes ‘a victim’ to hackers. To beat this downside, one of the effective solutions is Steganography or Cryptography. In this paper, the video Steganography and cryptography thoughts are employed, where a key text is hidden behind a ‘certain frame’ of the video using Shi-Tomasi corner point detection and Least Significant Bit (LSB) algorithmic rule. Shi-Tomasi algorithmic rule is employed to observe, the corner points of the frame. In the proposed work, a ‘certain frame’ with large number of corner points is chosen from the video. Then, the secret text is embedded within the detected corner points using LSB algorithmic rule and transmitted. At the receiver end, decryption process is employed, in the reverser order of encryption to retrieve the secret data. As a technical contribution, the average variation of Mean Squared Error, Peak Signal to Noise Ratio, Structural Similarity Index are analysed for original and embedded frames and found to be 0.002, 0.016 and 0.0018 respectively.


2019 ◽  
Vol 29 (1) ◽  
pp. 1216-1225 ◽  
Author(s):  
Zeyad Safaa Younus ◽  
Ghada Thanoon Younus

Abstract This paper aims to propose a method for data hiding in video by utilizing the least significant bit (LSB) method and improving it by utilizing the knight tour algorithm for concealing the data inside the AVI video file and using a key function encryption method for encrypting the secret message. First, the secret message is encrypted by utilizing a mathematical equation. The key used in the equation is a set of random numbers. These numbers differ in each implementation to warrant the safety of the hidden message and to increase the security of the secret message. Then, the cover video was converted from a set of frames into separated images to take the advantage of the large size of video file. Afterward, the knight tour algorithm is utilized for random selecting of the pixels inside the frame utilized for embedding the secret message inside it to overcome the shortcoming of the conventional LSB method that utilized the serial selection of pixel and to increase the robustness and security of the proposed method. Afterward, the encrypted secret message is embedded inside the selected pixels by utilizing the LSB method in bits (7 and 8). The observational results have drawn that the proposed method has a superior performance compared to the previous steganography method in terms of quality by a high PSNR of 67.3638 dB and the lowest MSE of 0.2578. Furthermore, this method preserves the security where the secret message cannot be drawn out without knowing the decoding rules.


In this growing internet world, secret data communication is increasing day by day. There are various methods to communicate secretly. Steganography is one of those techniques in which data is concealed within cover data such that it cannot get detected. Steganography is usually used today on pcs where digital data is the high-speed distribution channels for carriers and networks. Steganography is the skill of understanding of unnoticeable activity at intervals. Steganalysis is the science of concealed data detection. Steganography of data which is of any form like images, audio, video or text information is done by various techniques. Image steganography is done by various technique. Least Significant Bit (LSB) with XORing and Discrete Cosine Transform (DCT) are used to test the image steganography. Images are converted to grey scale to get better accuracy. Results are tested with mean square error (MSE) and peak signal-to-noise ratio (PSNR) values.


2019 ◽  
Vol 8 (2S9) ◽  
pp. 1049-1052

The security of the transmitted data over the internet has become one of the challenges sharing with data communication over computer network. In this paper, a new stegnography system is developed using Improved Least Significant Bit (ILSB) with preprocessing operation for concealing data. The system mixes several technological rules to enhance the performance of concealing scheme. The original secret image is divided into several segments then rearranged to even and odd. Rivest Cipher 4 (RC4) algorithm is applied on preprocessed image before concealing it on the cover image using ILSB. The proposed systems are simulated using MATLAB software package. The experimental results show that our suggested method successes of concealing data according to PSNR ratio, correlation and elapsed time. Preprocessing operation provides flexibility and robustness to the overall system. Improved LSB is simple and strong method for concealing images. Finally, the proposed system is very active to hide the gray scale image inside the color image


Author(s):  
Ibnu Utomo Wahyu Mulyono ◽  
Ajib Susanto ◽  
Tiara Anggraeny ◽  
Christy Atika Sari

 The growing information technology is very rapidly, the more evolving crime techniques to find information that is confidential. The Internet is one of the main media in disseminating information. The use of security on the internet still needs to be developed. Based on these problems, the type of research undertaken in the writing of this final task is the type of experimental research by developing methods that have been done by previous researchers to hide secret data that is inserted into the audio * .wav so that the security and confidentiality of data can be guaranteed. data security can be done with various methods, including cryptography and steganography. Cryptography is a technique for encrypting messages and steganography is a message concealment technique. This insertion type uses binary ASCII character code. In the cryptographic process, using the Vigenere Cipher algorithm and in the steganography, process using the algorithm (LSB) Least Significant Bits. The merger of the two techniques resulted in a better new digital image security system and increased the value of MSE, PSNR and Execution time. Then the test results in the evaluation using BER and histogram analysis. Good audio quality has a minimum value of 30 dB PSNR. In the embedding process using combinations of vigenere and LSB methods, Audio 15 is the best audio compared to other audio. Audio 15 has a smaller MSE (0.001656) value and a larger PSNR (124.138499) value than any other audio when embeded messages *.txt file with character 4096.


Sign in / Sign up

Export Citation Format

Share Document