CFP last date
20 December 2024
Reseach Article

Video Steganography using Zero Order Hold Method for Secured Data Transmission

by Shashidhara H. N., Usha B. A.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 176 - Number 5
Year of Publication: 2017
Authors: Shashidhara H. N., Usha B. A.
10.5120/ijca2017915587

Shashidhara H. N., Usha B. A. . Video Steganography using Zero Order Hold Method for Secured Data Transmission. International Journal of Computer Applications. 176, 5 ( Oct 2017), 44-48. DOI=10.5120/ijca2017915587

@article{ 10.5120/ijca2017915587,
author = { Shashidhara H. N., Usha B. A. },
title = { Video Steganography using Zero Order Hold Method for Secured Data Transmission },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2017 },
volume = { 176 },
number = { 5 },
month = { Oct },
year = { 2017 },
issn = { 0975-8887 },
pages = { 44-48 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume176/number5/28551-2017915587/ },
doi = { 10.5120/ijca2017915587 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:41:45.579585+05:30
%A Shashidhara H. N.
%A Usha B. A.
%T Video Steganography using Zero Order Hold Method for Secured Data Transmission
%J International Journal of Computer Applications
%@ 0975-8887
%V 176
%N 5
%P 44-48
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography used for secure transmission of secret message. Message transmitted over the internet facing malicious attack. So, steganography is needed for secure transmission of secret message. There are two methods which are used for secure transmission. The first method cryptography, secret message which needs to be transmitted over the internet is encrypted using encryption key and sent over the communication channel and at the receiver side only right person with valid key can retrieve the secret message. The second method is steganography, in this method secret message hidden inside the cover media like image, audio, video etc. In this paper, we have presented video steganography using Zero Order Hold(ZOH) technique. Zero Order Hold is basically zooming method, it is used for image zooming. By applying ZOH method, secret information embedded in the cover video.

References
  1. Abdelmgeid, Tarek, Al-Hussain, Shaimaa,” New Image Steganography Method using Zero Order Hold Zooming, IJCA, Volume 133, Jan 2016.
  2. Swadhin, Kaustubh and Chirag, "Video Steganography Using Encrypted Payload for Satellite Communication",2017 IEEE Conference,978-1-5090-1613-6/17/31.00.
  3. Ramdhan J. Mstafa and Eman Abdelfattah, “Robust and Secure Video Steganography Method in DWT-DCT Domains Based on Multiple Object Tracking and ECC", 2017 IEEE International Conference, VOLUME 5, 2017.
  4. K.Rosemary Euphrasi and M. Mary Shanthi Rani, "A Comparative Study On Video Steganography in Spatial and IWT Domain", 2016 IEEE International Conference on Advances in Computer Applications (ICACA)".
  5. Achmad Solichin and Painem,"Motion-based Less Significant Frame for Improving LSB-based Video Steganography", 2016 International Seminar on Application for Technology of Information and Communication.
  6. Yugeshwari Kakde, Priyanka Gonnade, Prashant Dahiwale, “Audio-Video steganography,” in IEEE Sponsored 2nd International Conference on Innovations in Information Embedded and Communication Systems [Online]. pp. 1-6. 2015.
  7. C.C. Chang, Y. Liu and T.S. Nguyen, A Novel Turtle Shell Based Scheme for Data Hiding, Proc. Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing,2014.
  8. Monu U. Ragashe l, Sneha M. Ramteke2, " Combine use of steganography and visual cryptography in computer forensics", Discovery, Volume 18, Number51, May7, 2014.
  9. S. K. Moon and R. D. Raut, “Analysis of secured video steganography using computer forensics technique for enhance data security,” Second International Conference on Image Information Processing, pp. 660-665, 2013.
  10. Keren Wang., Hong Zhao., Hongxia Wang., "Video Steganalysis Against Motion Vector-Based Steganography by Adding or Subtracting One Motion Vector Value", vol.9, no.5, pp.741-751, 2014.
  11. Yun Cao., Xianfeng Zhao., Dengguo Feng. ,"Video Steganalysis Exploiting Motion Vector Reversion-Based Features", vol.19, no.1, pp.35-38, 2012.
  12. Pasumarthy Saradha and Bala Swamy, “Improving Image Data Hiding Capacity Scheme using Sudoku Puzzle in Color Images”, International Journal of Engineering Research and Applications, Vol. 2, No. 3, pp. 2741-2744, May-June 2012.
  13. H. Aly, “Data hiding in motion vectors of compressed H. Aly, “Data hiding in motion vectors of compressed, “IEEE Trans. Inf. Forensics Security, vol. 6, no. 1, pp. 14–18, Mar. 2011.
  14. Hung min Sun, Chi Yao Weng, Chin Feug Lee. “Anti-Forensics with steganography data embedding in digital images” IEEE journal on selected areas in Communication vol. 29. no.7 pp. 1392- 1403. August 2011.
  15. Hui-Lung Lee, Chia-Feng Lee and Ling-Hwei Chen, “A Perfect Maze Based Steganographic Method”, The Journal of Systems and Software, Vol. 83, No. 12, pp. 2528-2535, July 2010.
  16. Stephan W. Thomas, Bram Adams, Ahmed E. Hassan and Dorothea Blostein” Validating the Use of Topic Models for Software Evolution”, IEEE, 14 October 2010.
  17. Kamaldeep Joshi, Rajkumar Yadav and Sachin Allwadhi, “PSNR and MSE based investigation of LSB”, ICCTICT, INSPEC Accession Number-16156341,2016.
  18. Soosan Beheshti , Masoud Hashemi and Ervin Sejdic , “Mean Square Error Estimation in Thresholding”, IEEE,Volume-18,Issues-2,Ferbruary-2011.
  19. Brian Hahn and Daniel Valentine, “Essentials Matlab for Engineers and Scientist”,4thedition, eBook ISBN: 9780080952116,2009.
  20. Anupam Kumar Garg, “Braille-8 The unified braille Unicode system: Presenting an ideal unified system around 8-dot Braille Unicode for the braille users world-over”, IEEE, 6-9 Nov. 2016.
Index Terms

Computer Science
Information Sciences

Keywords

Video Steganography Zero Order Hold Peak Signal Noise Ratio Mean Squared Error Data Embedding.