CFP last date
20 December 2024
Reseach Article

Gurumukhi Text Hiding using Steganography in Video

by Bharti Chandel, Shaily Jain
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 142 - Number 6
Year of Publication: 2016
Authors: Bharti Chandel, Shaily Jain
10.5120/ijca2016909843

Bharti Chandel, Shaily Jain . Gurumukhi Text Hiding using Steganography in Video. International Journal of Computer Applications. 142, 6 ( May 2016), 35-40. DOI=10.5120/ijca2016909843

@article{ 10.5120/ijca2016909843,
author = { Bharti Chandel, Shaily Jain },
title = { Gurumukhi Text Hiding using Steganography in Video },
journal = { International Journal of Computer Applications },
issue_date = { May 2016 },
volume = { 142 },
number = { 6 },
month = { May },
year = { 2016 },
issn = { 0975-8887 },
pages = { 35-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume142/number6/24904-2016909843/ },
doi = { 10.5120/ijca2016909843 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:44:17.037143+05:30
%A Bharti Chandel
%A Shaily Jain
%T Gurumukhi Text Hiding using Steganography in Video
%J International Journal of Computer Applications
%@ 0975-8887
%V 142
%N 6
%P 35-40
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Revolution in telecommunication systems has made the secret information vulnerable to many types of attacks. Steganography provides a method to conceal the very existence of secret message. Due to tremendous growth in technology, secret messages are getting exchanged in many languages other than English through different media like images, videos, and audio and text documents. Video Steganography has become a popular topic due to the significant growth of video data over internet. This paper presents an effective LSB based approach to disguise encrypted Gurumukhi text inside a video. In this paper, besides employing the modified LSB substitution technique at a fundamental stage, advantage of refined OPAP, Canny edge detection and identical match techniques has been taken to improve the results. To provide dual layer of security AES techniques has been used to permute the message before embedding it. Experimental results shows enhancement in security performance, embedding capacity, Bit Error Rate (BER), Peak Signal to Noise Ratio (PSNR), Mean squared error (MSE), Histogram Error values after implementation of this hybrid approach as compared to other video Steganography techniques.

References
  1. Sadek, M. M. Khalifa, S. Amal, G. M. Mostafa, “Video Steganography: a comprehensive review,” multimedia tools and applications, No.17 Vol.74, 2015, pp. 7063-7094.
  2. H.H.Soliman, H.E.Mostafa, E.A.E. Ahmed, “A Novel Algorithm for Hiding Information in Video using Spatial Domain,” Egyptian Computer Science Journal, 2014, No. 3,Vol .38, 2014, pp. 1-9.
  3. R. J. Mustafa and C. Bach, “Video Steganography: A Survey,” in IOSR Journal of Computer Engineering (IOSR-JCE) Issue 1, Vol.18, 2015, pp.11-17.
  4. Mansouri, J.Khademi, Morteza, “International Journal of Imaging Systems and Technology,” in International Journal of Imaging Systems and Technology, No.4, Vol.19, 2009, pp. 306-315.
  5. Hong,W.Chen,T.Shou, “A Novel data embedding method using adaptive pixel pair matching,” in Information Forensics and Security,IEEE Transactions, No.1,Vol.7, 2012, pp. 176-184.
  6. Z. Rongyue, et al., “A Novel Video Steganography Based on Non-uniform Rectangular Partitions,” Computational Science and Engineering (CSE), 2011 IEEE 14th International Conference on, Dailan, Liaoning, pp. 57-61, 2011.
  7. Chen, W. J. Chang, C. C. Le, T.H. Ngan.,“High payload steganography mechanism using hybrid edge detector,” Expert Systems with applications, No.4, vol. 37, pp. 3292-3301, 2010.
  8. Dasgupta et.al. “Optimized Video Steganography Using Genetic Algorithm (GA),” Procedia Technology, vol. 10, 2013, pp.131-137.
  9. Yuanzhi Yao,Weiming Zhang-Nenghai Yu-Xianfeng Zhao, “ Defining embedding distortions for motion vector-based video steganography,” in Multimedia Tools and Applications, October 01- 05, 2015,pp.11163-11186.
  10. Po-Chyi Su, Ming-Tse Lu, Ching-Yu Wu, “A practical design of high-volume steganography in digital video files,” Multimedia tools and applications, No.2, Vol.66, 2013, pp.247-266.
  11. B. D. Lucas and T. Kanade, “A High Payload Video Steganography Algorithm in DWT Domain Based on BCH Codes (15, 11),” in 2015 Wireless Telecommunication Symposium (WTS), at New York, 2015, pp. 1-8.
  12. A.R .Rayappan, J.B. Balaguru, “An intelligent chaotic embedding approach to enhance stego-image quality,” Information Sciences, Vol.193, 2012, pp. 115-124.
  13. L. Guo-Shiang and T. Tung-Sheng, “New Approaches to en encryption and steganography for digital videos,” in Multimedia Systems, No. 3, Vol.13, 2007,pp.191-204.
Index Terms

Computer Science
Information Sciences

Keywords

AES BER PSNR Histogram Error MSE LSB OPAP