CFP last date
20 January 2025
Reseach Article

Video Steganography Schemes for Hiding Acoustic Data: A Comparison

by Namrata Singh, Renu Prasad
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 182 - Number 2
Year of Publication: 2018
Authors: Namrata Singh, Renu Prasad
10.5120/ijca2018917484

Namrata Singh, Renu Prasad . Video Steganography Schemes for Hiding Acoustic Data: A Comparison. International Journal of Computer Applications. 182, 2 ( Jul 2018), 41-45. DOI=10.5120/ijca2018917484

@article{ 10.5120/ijca2018917484,
author = { Namrata Singh, Renu Prasad },
title = { Video Steganography Schemes for Hiding Acoustic Data: A Comparison },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2018 },
volume = { 182 },
number = { 2 },
month = { Jul },
year = { 2018 },
issn = { 0975-8887 },
pages = { 41-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume182/number2/29738-2018917484/ },
doi = { 10.5120/ijca2018917484 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:10:14.418643+05:30
%A Namrata Singh
%A Renu Prasad
%T Video Steganography Schemes for Hiding Acoustic Data: A Comparison
%J International Journal of Computer Applications
%@ 0975-8887
%V 182
%N 2
%P 41-45
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography allows data secrecy of any form inside any cover type without getting identified by any third person. Not only hiding the data could secure the secret instead applying any security/encryption technique would ensure its full secrecy and security. This paper presents two audio data hiding scheme inside a cover video by using LSB replacement technique for steganography. The acoustic data is encrypted by using XOR method before embedding it inside LSBs of original video. The secret audio data bits are inculcated inside a random frame and also in all sequential frames of cover video. Comparison among the two embedding schemes is done in this paper. Comparative analysis among the approaches is done on the parametric grounds of steganography. The results show that the randomized embedding technique is better than the sequential embedding technique on the security grounds and require less time for embedding and extraction.

References
  1. Siddartha Gosalia et.al.,” Embedding Audio Inside a Digital Video Using LSB Steganography”, 2016 International Conference on Computing for Sustainable Global Development (INDIAcom) 2016 IEEE.
  2. Amritha Shekhar, Manoj Kumar G,.M Abdul Rahiman, “ Novel Approach for Hiding Data in Videos Using Network Steganography Methods”, 4th International Conference on Eco-friendy Computing and Communication Systems, 2015 Elsevier.
  3. Pratiksha Sethi, V. Kapoor,”A Proposed Approach Novel Architecture for Information Hiding in Image Steganography by Using Genetic Algorithm and Cryptography”, 2016 International Conference on Computational Science, Elsevier.
  4. Koushik Dasgupta, Jyotsana Kumar Mondal, Paramartha Dutta, “Optimized Video Steganography Using Genetic Algorithm”, International Conference on Computational Intelligence Modelling, Techniques and Applications (CIMTA) 2013, Elsevier.
  5. Lakshmi M et.al., “Reversible Data Hiding in Video for Better Visibility and Minimal Transfer”, Global Colloquium in Recent Advancement and Effectual Researches in Engineering, Science and Technology(RAEREST), 2016 Elsevier.
  6. V. Sathya et.al., “Data Hiding in Audio Signal, Video Signal, text and Jpeg Images”, IEEE International Conference on Advances in Engineering Science and Management (ICAESM 2012.
  7. Mritha Ramalingam, Nor Ashidi Mat Isa, “A Data Hiding Technique Using Scene Change Detection for Video Steganography” Computer and Electrical Engineering 54 Journal, 2016 Elsevier.
  8. Rahul Paul et.al. “High Rate Video Streaming Steganography” Proceedings of 2009 IEEE International Conference on Future Computer and Communications.
  9. Arup Kumar Bhaumik et.al., “Data Hiding in Video”, International Journal of Database Theory and Applications, June 2009.
  10. Poulami Dutta, Debnath Bhattacharya, Tai-hoon Kim, “Data Hiding in Audio Signal: A Review” International Journal of Database Theory and Application, Vol.2 No.2, June 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Least Significant Bit (LSB) XOR PSNR MSE