Audio and Video Steganography for Secure Data Hiding

Author(s):  
Ms Swathi ◽  
Supriya A V ◽  
Soundarya Shridhar Patgar

Today, the protection is getting the imperative interest due to the elevated use of internet. As the use of internet is increased, the charge at which the records are interchanged per day is additionally increased. The data that is interchanged every day might also turn out to be the target of fraudsters. To take action to do something in particular to resolve this hassle one of the powerful technology is the Steganography. The Steganography is a process of concealing secret information behind an harmless cover file, such that the existence of information is no longer usually admitted. This paper uses the idea of Audio and Video Steganography, where the data is hidden behind the audios and frames of videos.

2019 ◽  
Vol 68 (1) ◽  
pp. 01-07
Author(s):  
Tyler Taylor, Justin Rogers

Video Steganography is a strategy wherein we can conceal a wide range of documents with any extension into a carrying Video document. Right now, are utilizing two fundamental wording that is have host file and carrier file where host file is a hidden file (any sort of record like content document, picture document, and sound/video document) and carrier file must be a video record. The primary inspiration of this paper is to make sure about moving of information by utilizing steganography and cryptography system. It is worried about implanting data in a harmless spread media in a safe and hearty way. Right now expositions we are utilizing Forbidden Zone Data Hiding strategy where no modification is required in have signal range during information hidden procedure. To safely moving the information record, we use video information covering up and utilizing revision limit of rehash gather code with predominance of taboo zone information stowing away. Utilizing this methodology we can likewise stow away and move the enormous video record whose size is bigger than spread record in secure way. The principle favorable position of utilizing video record sequestered from everything data is the additional protection from of the outsider or unintended beneficiary because of the overall multifaceted nature of video contrasted with picture and sound document. I have effectively actualized the proposed system of video information hiding utilizing forbidden zone datahiding strategy (FZDH) on content document, picture record, sound record and video document. The exceptional element is that we can hide the bigger size video record behind the smaller size cover record.


Cryptography ◽  
2020 ◽  
pp. 355-372
Author(s):  
V. Lokeswara Reddy

Information security using data hiding in video provides high embedding capacity and security. Steganography is one of the oldest data protecting methodologies deals with the embedding of data. Video Steganography hides secret information file within a video. Present day communications are treated to be “un-trusted” in terms of security, i.e. they are relatively easy to be hacked. The proposed technique is invented to hide secret information into a video file keeping two considerations in mind which are size and security of the cover video file. At the sender side, the secret information which is to be hidden is encoded into cover video file. Double layered security for the secret data can be achieved by encrypting confidential information and by embedding confidential information into cover video file frames using encrypted embedding technique.


Author(s):  
Navjot Kaur ◽  
Manpreet Singh

Steganography is a profession of masking the secret information using some other harmless message. One needs to be very careful while sharing any information on public network as there are more chances of an intrusion. Therefore the art of covering information is highly in demand known as Steganography. To satisfy the need of safe transmission, many known techniques like modern data compression, information theory, spread spectrum, and cryptography technologies were integrated to bring up Steganography. This paper proposed an approach of building a secure data hiding technique using Cryptography and Steganography which assures high secrecy of data over network.


Complexity ◽  
2020 ◽  
Vol 2020 ◽  
pp. 1-12
Author(s):  
Xi-Yan Li ◽  
Xia-Bing Zhou ◽  
Qing-Lei Zhou ◽  
Shi-Jing Han ◽  
Zheng Liu

With the development of cloud computing, high-capacity reversible data hiding in an encrypted image (RDHEI) has attracted increasing attention. The main idea of RDHEI is that an image owner encrypts a cover image, and then a data hider embeds secret information in the encrypted image. With the information hiding key, a receiver can extract the embedded data from the hidden image; with the encryption key, the receiver reconstructs the original image. In this paper, we can embed data in the form of random bits or scanned documents. The proposed method takes full advantage of the spatial correlation in the original images to vacate the room for embedding information before image encryption. By jointly using Sudoku and Arnold chaos encryption, the encrypted images retain the vacated room. Before the data hiding phase, the secret information is preprocessed by a halftone, quadtree, and S-BOX transformation. The experimental results prove that the proposed method not only realizes high-capacity reversible data hiding in encrypted images but also reconstructs the original image completely.


Author(s):  
Nisha Manral

Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. Different applications have different requirements of the steganography technique used. For example, some applications may require absolute invisibility of the secret information, while others require a larger secret message to be hidden. This paper intends to give an overview of image steganography, its uses and techniques. It also attempts to identify the requirements of a good steganographic algorithm and briefly reflects on which steganographic techniques are more suitable for which applications.


Sign in / Sign up

Export Citation Format

Share Document