Read More.

Call for Paper - May – 2024 Edition   

(SJIF Impact Factor: 5.966) (IJIFACTOR 3.8, RANKING: A+) (PIF: 3.460)

IJATCA solicits original research papers for the May – 2024 Edition.
Last date of manuscript submission is May 30, 2024.

                                                   

Video steganography based on interpolation and LSB substitution with secret key and DWT


Volume: 3 Issue: 2
Year of Publication: 2016
Authors: Amandeep kaur, Rupinder kaur



Abstract

The improvement in computer network communications make transmission of data comparatively simple and quick although, there are chances of attacks on them. The hidden information is an imperative problem for transferring video data from one party to third party. In the image processing field of research, steganography determines the legitimate meaning of hiding all the information from introducers and transmit the video data in secure, protected form so that the third party cannot reveal that message. Steganography is a branch of hiding information used for hiding corrective information in digital media such photographs, digital music, or digital video. This approach can be applied on graphics, images, text, audio and video, and so forth. In this paper, approach based on Interpolation and LSB (Least significant bit) technique with secret key and DWT is proposed for video steganography. This technique is applied for replacing the byte into M’s bit for transmitting video to the trusted receiver. The video in cover file is inputted and then steganography technique is applied that will converts this cover file into output file which is in the form of stego file.

References

  1. Ki-Hyun Jung & Kee-Young Yoo; "Steganographic method based on interpolation and LSB substitution of digital images", Multimedia Tools Application: Springer Science Business Media New York 2014.

  2. Bhautmage P, Jayakumar A, Dahatonde A, "Advanced Video Steganography Algorithm" International Journal of Engineering Research, pp.1641-1644, Vol. (1), 2013.

  3. Sidham Abhilash, S M Shamseerdaula; "A Novel Lossless Robust Reversible Watermarking Method for Copyright Protection of Images"; al Int. Journal of Engineering Research and Applications , Vol. 3(6), Nov-Dec 2013.

  4. Yadav Pooja Mishra, Nishchol Sharma, Sanjeev; \"A secure video steganography with encryption based on LSB technique", Computational Intelligence and Computing Research (ICCIC), 2013 IEEE International Conference Dec. 2013. Doi: 10.1109/ICCIC.2013.6724212.

  5. Tao Zhang, Wenxiang Li, Yan Zhang, Xijian Ping; \"Detection of LSB matching steganography based on distribution of pixel differences in natural images", Image Analysis and Signal Processing (IASP), 2010 International Conference on , vol., no., pp.548,552, 9-11 April 2010, Doi: 10.1109/IASP.2010.5476056.

  6. Balaji R., Naveen G.;"Secure data transmission using video Steganography," Electro/Information technology (EIT), IEEE International conference on, May 2011, and Doi: 10.1109/EIT.2011.5978601

  7. Moon S.K & Raut R.D; \"Analysis of secured video steganography using computer forensics technique for enhances data security,\" Image Information Processing (ICIIP)", 2013 IEEE Second International Conference on, volume no pp.660, 665, 9-11 Dec. 2013. Doi: 10.1109/ICIIP.2013.6707677.

  8. Jung KH & Yoo KY "Data hiding using edge detector for scalable images", Multimedia Tools and Applications, 2013, Doi: 10.1007/s11042-012-1293-84.

  9. Lee CF, Huang YL "An efficient image interpolation increasing payload in reversible data hiding", Expert System Applications 39:6712-6719, 2012.

  10. Lee YP, Lee JC, Chen WK, Chang KC, Su IJ, Chang CP "High-payload image hiding with quality recovery using tri-way pixel-value differencing", Information Sciences 191:214-225, 2012.

  11. Lehmann TM, Gonner C, Spitzer K "Survey: interpolation methods in medical image processing", IEEE Trans Med Imaging 18(11):1049-1075, 1999.

  12. Mielikainen J "LSB matching revisited", IEEE Signal Processing Letters 13:285-287, 2006.

  13. Ni Z, Shi YQ, Ansari N, Su W "Reversible data hiding", Circ System for Video Technology IEE 16:354-362, 2006.

  14. Swanson M, Kobayashi M, Tewfik A "Multimedia data embedding and watermarking technologies", Proc IEEE 86(6):1064-1087, 1998.

  15. Thien CC, Lin JC "A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function" Pattern Recognition, 36:2876-2881, 2003.

  16. Vleeschouwer C, Delaigle JF, Macq B "Circular interpretation on histogram for reversible watermarking", IEEE IMSP Workshop, 345-350, 2001.

  17. Wang XT, Chang CC, Nguyen TS, Li MC "Reversible data hiding for high quality images exploiting interpolation and direction order mechanism", Digital Signal Process 23:569-577, 2013.

  18. Wang RZ, Lin CF, Lin JC (2001) Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognition 34(3):671-683

  19. Wu NI, Wu KC, Wang CM "Exploring pixel-value differencing and base decomposition for low distortion data embedding", Applications Software Computer 12:942-960, 2012

  20. Xuan G, Zhu J, Chen J, Shi YQ, Ni Z, Su W "Distortionless data hiding based on integer wavelet transform", IEEE Electronics Letters 38:1646-1648 , 2002.

  21. Zeng XT, Li Z, Ping LD "Reversible data hiding scheme using reference pixel and multi-layer embedding", Inter J Electron Communication 66:532-539, 2012

Keywords

Steganography, video steganography, LSB and stego file, embedding capacity.




© 2023 International Journal of Advanced Trends in Computer Applications
Foundation of Computer Applications (FCA), All right reserved.
Vision & Mission | Privacy Policy | Terms and Conditions