CFP last date
20 January 2025
Reseach Article

Enhancing Data Security using Video Steganography, RSA and Huffman Code Algorithms with LSB Insertion

by Richard Apau, J. B. Hayfron-Acquah, Frimpong Twum
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 143 - Number 4
Year of Publication: 2016
Authors: Richard Apau, J. B. Hayfron-Acquah, Frimpong Twum
10.5120/ijca2016910156

Richard Apau, J. B. Hayfron-Acquah, Frimpong Twum . Enhancing Data Security using Video Steganography, RSA and Huffman Code Algorithms with LSB Insertion. International Journal of Computer Applications. 143, 4 ( Jun 2016), 28-36. DOI=10.5120/ijca2016910156

@article{ 10.5120/ijca2016910156,
author = { Richard Apau, J. B. Hayfron-Acquah, Frimpong Twum },
title = { Enhancing Data Security using Video Steganography, RSA and Huffman Code Algorithms with LSB Insertion },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2016 },
volume = { 143 },
number = { 4 },
month = { Jun },
year = { 2016 },
issn = { 0975-8887 },
pages = { 28-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume143/number4/25068-2016910156/ },
doi = { 10.5120/ijca2016910156 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:45:28.518857+05:30
%A Richard Apau
%A J. B. Hayfron-Acquah
%A Frimpong Twum
%T Enhancing Data Security using Video Steganography, RSA and Huffman Code Algorithms with LSB Insertion
%J International Journal of Computer Applications
%@ 0975-8887
%V 143
%N 4
%P 28-36
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security (i.e. Confidentiality, Integrity, Authentication, Non-Repudiation, and Availability) in the field of data communication have remained a subject matter of discussion over the years. The internet as well as computer technology have made significant strive in data communication existence. Transferring data securely and safely amidst vulnerabilities of computer networks remain a source of worry to many in the field of data communication. Without security there is no need for data communication. The main objective of this study was to ensure security of data transmitted over the internet. The study proposed a novel approach of data security using video steganography, Huffman Code compression and asymmetric cryptography. In the proposed system, messages are encrypted with RSA and encrypted messages are compressed using Huffman code algorithm. The compressed encrypted messages are hidden using Least Significant Bit (LSB) algorithms. This research brings to light the concept of effectively combining steganography, compression and asymmetric cryptographic algorithm. The preference of RSA over any other cryptographic algorithm is due to its ability to provide better security for large file size thereby reducing computational complexity. The use LSB for video embedding is also good for larger file sizes due to its low computational complexity. Huffman code compression is a lossless compression algorithm which allows reduction in size of data without loss of data. From the results obtained in this research, it was observed that when video steganography is combined with Huffman code compression and asymmetric cryptography, a higher level of security, robustness and capacity are achieved. The distortion experienced in this study is negligible; therefore the study achieved increased security by the high PSNR values and low MSE and BER values.

References
  1. Ramalingam, M. (2011). Stego Machine–Video Steganography using Modified LSB Algorithm. World Academy of Science, Engineering and Technology, 74, 502-505.
  2. Wajgade, V. M., & Kumar, D. S. (2013). Enhancing Data Security Using Video Steganography. International Journal of Emerging Technology and Advanced Engineering, 3(4), 549-552.
  3. Dengre , A. R., Gawande, A. D. Deshmukh, , A. B.( June, 2013). Effect of Audio Steganography based on LSB insertion with Image Watermarking using AVI video . International Journal of Application or Innovation in Engineering & Management (IJAIEM), 2(6), 2319 – 4847.
  4. Budhia, U., Kundur, D., & Zourntos, T. (2006). Digital video steganalysis exploiting statistical visibility in the temporal domain. Information Forensics and Security, IEEE Transactions on, 1(4), 502-516.
  5. Das, S., Das, S., Bandyopadhyay, B., & Sanyal, S. (2011). Steganography and Steganalysis: different approaches. arXiv preprint arXiv:1111.3758.
  6. Kaur, R. and Singh, T. (2015). Hiding Data in Video Sequences using LSB with Elliptic Curve Cryptography. International Journal of Computer Applications (0975 – 8887) Volume 117 – No. 18
  7. Odeh, A., & Elleithy, K. (2012). Steganography in Arabic Text Using Zero Width and Kashidha Letters. International Journal of Computer Science & Information Technology (IJCSIT), 4(3), 1-11.
  8. Sumathi, C. P., Santanam, T., & Umamaheswari, G. (2014). A Study of Various Steganographic Techniques Used for Information Hiding. arXiv preprint arXiv:1401.5561.
  9. Kundalakesi,M., Sharmathi.R, Akshaya.R (2015) Overview of Modern Cryptography. International Journal of Computer Science and Information Technologies(IJCSIT), Vol. 6 (1), 350-353.
  10. Basheer, R & Safiya M.K (2014).Video data hiding in selective pixels of forbidden zone using mapping function. International Journal of Advanced Computer Technology (IJACT).ISSN:2319-7900.
  11. Jain, V. (2012). Public-Key Steganography Based On Modified LSB Method. Journal of Global Research in Computer Science, 3(4), 26-29.
  12. Kour, H. & Kaur, S. (2015).Data Hiding Using MLSB Steganography. International Journal of Advanced Research in Computer Science and Software Engineering. Page |994, Volume5, Issue 1,ISSN: 2277 128X
  13. Vegh, L., & Miclea, L. (2015) Improving the Security of a Cyber-Physical System using Cryptography, Steganography and Digital Signatures.International Journal of Computer and Information Technology (ISSN: 2279–0764),Volume 04,–Issue 02,
  14. Mohanta, H. K. (2014). Secure Data Hiding using Elliptical Curve Cryptography and Steganography. International Journal of Computer Applications, 108(3).
  15. Shukla, C. P., & Singh, A. K. (2014). Secure Communication with the help of Encryption in Video Steganography.Current Trends in Technology and Sciences.ISSN: 2279-0535. Volume: 3, Issue: 6
  16. Bodhak, P. V., & Gunjal, B. L. (2012). Improved protection in video steganography using dct & lsb. International journal of engineering and innovative technology (IJEIT), 1(4).
  17. Ahmed, Z. H. (2014). Comparison of data hiding using LSB and DCT for image (Doctoral dissertation, Universiti Tun Hussein Onn Malaysia).
  18. Deshmukh, P. R. & Rahangdale, B. (2014).Data Hiding using Video Steganography. International Journal of Engineering Research & Technology (IJERT).ISSN: 2278-0181.Vol. 3 Issue 4.
Index Terms

Computer Science
Information Sciences

Keywords

Video Steganography Asymmetric Cryptography Huffman Code LSB RSA PSNR MSE BER.