CFP last date
20 December 2024
Reseach Article

Enhancement of Data Security using Video Steganography

by Mandeep Kaur, Kanwalvir Singh Dhindsa
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 181 - Number 6
Year of Publication: 2018
Authors: Mandeep Kaur, Kanwalvir Singh Dhindsa
10.5120/ijca2018917472

Mandeep Kaur, Kanwalvir Singh Dhindsa . Enhancement of Data Security using Video Steganography. International Journal of Computer Applications. 181, 6 ( Jul 2018), 34-38. DOI=10.5120/ijca2018917472

@article{ 10.5120/ijca2018917472,
author = { Mandeep Kaur, Kanwalvir Singh Dhindsa },
title = { Enhancement of Data Security using Video Steganography },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2018 },
volume = { 181 },
number = { 6 },
month = { Jul },
year = { 2018 },
issn = { 0975-8887 },
pages = { 34-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume181/number6/29771-2018917472/ },
doi = { 10.5120/ijca2018917472 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:05:14.513783+05:30
%A Mandeep Kaur
%A Kanwalvir Singh Dhindsa
%T Enhancement of Data Security using Video Steganography
%J International Journal of Computer Applications
%@ 0975-8887
%V 181
%N 6
%P 34-38
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is an approach used to transfer secret information by updating data carrying medium i.e video, audio, text file in an imperceptible manner and is a manner of masking secret data in ways that prevents revealing of hidden messages. By using steganography secure data transmission over internet could be achieved. Video files are generally a batch of still images. So, most of the techniques used for images and audio can also be applied in video steganography. The main advantage of video stream is amount of data they carry that cannot be easily detectable. Above all, it is a moving sequence of still pictures. The internet provides a method of communication to distribute information to the masses. With the growth of data communication over computer network, the security of information has become a major issue. Steganography and cryptography are two different data hiding techniques. Cryptography, on the other hand obscures the content of the message. In this research work a high capacity data embedding approach is developed by the combining two approaches LSB and DWT.

References
  1. R. Kumar, J.Singh “Understanding Steganography over Cryptography and Various Steganography Techniques” International Journal of Computer Science and Mobile Computing, Vol. 4, Issue. 3, pp.253 – 258, 2015.
  2. R. J. Mstafa, K. M. Elleithy, E.Abdelfatteh "Video Steganography techniques:Taxonomy, Challnges and Future Directions” IEEE Conference on System Applications and Technology (LISAT). Long,pp-1-6, Farmingdale, NY, USA.
  3. W. Jyun-Jie, C. Houshou, L. Chi-Yuan, and Y. Ting-Ya, "An embedding strategy for large payload using convolutional embedding codes," 12th international conference on ITS Telecommunications, pp. 365-369,Taipai, Taiwan, 2012.
  4. R. Zhang, V. Sachnev and H. Kim, "Fast BCH Syndrome Coding for Steganography," In Information Hiding.vol. 5806, S. Katzenbeisser and A. R. Sadeghi, Eds., ed: Springer Berlin Heidelberg, pp. 48-58, 2009.
  5. R. J. Mstafa and K. M. Elleithy, "A high payload video steganography algorithm in DWT domain based on BCH codes (15, 11)" International IEEE Conference on wireless telecommunications symposium, pp.1-8, Newyork, America, 2015.
  6. R. J. Mstafa and K. M. Elleithy, "A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes" International journal of Multimedia Tools and Applications, Vol. 75, pp. 1-23, 2015.
  7. S. K. Dubey and V. Chandra “Steganography Cryptography and Watermarking: A Review” International Journal of Innovative Research in Science, Engineering and Technology, Vol. 6, Issue 2, pp.2595-2599, February 2017.
  8. H. S. M Reddy and K. B. Raja. "High capacity and security steganography using discrete wavelet transform." International Journal of Computer Science and Security (IJCSS), Vol. 3, Issue.6, pp.462-472, 2009.
  9. A. Nag, S. Biswas, D. Sarkar and P. P. Sarkar. "A Novel Technique for Image Steganography Based on DWT and Huffman Encoding" International Journal of Computer Science and Security, Vol. 4, Issue.6, pp.561-570, 2011.
  10. Sherly A. P. and P. P. Amritha. "A compressed video steganography using TPVD."  International Journal of Database Management Systems, Vol. 2, No.3, pp.67-79, August 2010.
  11. M. S. Rani and L. Senthoorpandi “A Study on Video Steganography using Transform Domain Techniques” 5th National conference on Computational Methods, Communication Techniques and Informatics, Vol.1, pp.257-260, Gandhigram, Dindigul, India, 2017.
  12. D.Baby, J.Thomsa, G.Augustinea, E. Georgea, N.R.Michael “A Novel DWT based Image Securing Method using Steganography” International Conference on Information and Communication Technologies,pp.216-218,Kochi, India, 2015
  13. G. Prabakaran, and R. Bhavani. "A modified secure digital image steganography based on Discrete Wavelet Transform."  International Conference on Computing, Electronics, Electrical Technologies pp. 1096-1100, Kumaracoil, India, 2012.
  14. D. B. Suryawanshi and S. S. Belsare “An Efficient Implementation of Video Steganography on FPGA using DWT and LSB Algorithm” International Journal of Scientific & Engineering Research, Vol.7, Issue.5, pp.450-453, 2016.
  15. K. S. Jenifer, G. Yogaraj, K. Rajalakshmi “LSB Approach for Video Steganography to Embed Images" International Journal of Computer Science and Information Technologies, Vol. 5 , pp.319-322, 2014.
  16. Disha and K.Saini. "A review on video steganography techniques in spatial domain" IEEE Conference on Recent Developments in Control, Automation & Power Engineering , Noida, India, 2017.
  17. S. Kamesh, K. Durga Devi, S. N. V. P. Raviteja “ DWT based data hiding using video steganography” international journal of engineering sciences & research technology, pp.361-367, 2017.
  18. M. Ramalingam & N. A. Mat “A steganography approach for sequential data encoding and decoding in video images” International Conference on Computer, Control, Informatics and Its Application, pp.120-125, Indonesia, 2014.
  19. H. Almara'beh “Steganography Techniques - Data Security Using Audio and Video” International Journal of Advanced Research in Computer Science and Software Engineering Volume 6, Issue 2, pp.45-50, February 2016.SW
  20. R. Singh and K. S. Dhindsa “Critical Path Based Ant Colony Optimization for cloud Computing using meta heuristic approach”, International journal Research in Electronics and Computer Engineering, Vol.5, No.4, pp.225-230, 2017.
  21. K. K. Jassar and K. S. Dhindsa “Comparative Study and Performance Analysis of Clustering Algorithms” International Journal of Computer Applications (0975 – 8887), pp.1-6, 2015.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Data hiding File Security Frame Extraction LSB DWT.