CFP last date
20 January 2025
Reseach Article

A New Cryptic Steganographic Approach using Video Steganography

by Neethu Prabhakaran, D. Shanth
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 49 - Number 7
Year of Publication: 2012
Authors: Neethu Prabhakaran, D. Shanth
10.5120/7639-0722

Neethu Prabhakaran, D. Shanth . A New Cryptic Steganographic Approach using Video Steganography. International Journal of Computer Applications. 49, 7 ( July 2012), 19-23. DOI=10.5120/7639-0722

@article{ 10.5120/7639-0722,
author = { Neethu Prabhakaran, D. Shanth },
title = { A New Cryptic Steganographic Approach using Video Steganography },
journal = { International Journal of Computer Applications },
issue_date = { July 2012 },
volume = { 49 },
number = { 7 },
month = { July },
year = { 2012 },
issn = { 0975-8887 },
pages = { 19-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume49/number7/7639-0722/ },
doi = { 10.5120/7639-0722 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:45:39.221680+05:30
%A Neethu Prabhakaran
%A D. Shanth
%T A New Cryptic Steganographic Approach using Video Steganography
%J International Journal of Computer Applications
%@ 0975-8887
%V 49
%N 7
%P 19-23
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Nowadays, Data transmission over internet is not at all secure and they are vulnerable to various attacks. So in order to prevent our valuable information we require special security measures. One of the methods for secure data transmission is cryptography where the information is protected by transforming it into unintelligible format. But we can ensure more security if the existences of the hidden message itself is concealed. Steganography is one such method in which the message may be hidden in image, audio, video, text etc. In this paper a sequential hybrid method to integrate cryptography and steganography in order to provide more than one level security is being proposed. And it is proposed to use video steganography in order to store high capacity data. The secret information is encrypted using the standard encryption algorithm AES. Then the encrypted message is embedded in the motion vector of the compressed video. The motion vector for embedding data is selected based on their associated macro block prediction error. Then the secret message is embedded in both horizontal and vertical component of the motion vector. At the same time in each GOP, the control information for data extraction will be embedded in I frame. At the receiving end the control information in I frame should be extracted first then the encrypted message can be extracted from P and B frames accordingly. The original message is retrieved back by applying decryption algorithm

References
  1. T Morkel, JHP Eloff and MS Olivier, "An Overview of Image Steganography," in Proceedings of the Fifth Annual Information Security South Africa Conference(ISSA2005), Sandton, South Africa, June/July 2005 (Published electronically).
  2. M. B. Ould MEDENI, El Mamoun SOUIDI "A Novel Steganographic Method for Gray-Level Images With four-pixel Differencing and LSB Substitution"
  3. G. Sahoo RajeshKumarTiwari "Hiding Secret Information in Movie Clip: A Steganographic Approach" International Journal of Computing and Applications, Vol. 4, No. 1, June 2009, pp. 87-94.
  4. Spyridon K. Kapotas, Eleni E. Varsaki and Athanassios N. Skodras"Data Hiding in H. 264 Encoded Video Sequences" in IEEE 9th Workshop on Multimedia Signal Processing (MMSP07), Oct. 2007, pp. 373–376.
  5. Dipti Kapoor Sarmah, Neha Bajpai "Proposed System for Data Hiding Using Cryptography and Steganography" International Journal of Computer Applications (0975 – 8887) Volume 8– No. 9, October 2010.
  6. Sujay Narayana and Gaurav Prasad "Two New Approaches For Secured Image Steganography Using Cryptographic Techniques And Type Conversions" Signal & Image Processing : An International Journal(SIPIJ) Vol. 1, No. 2, December 2010.
  7. J. Zhang, J. Li, and L. Zhang, "Video watermark technique in motion vector," in Proc. XIV Symp. Computer Graphics and Image Processing, Oct. 2001, pp. 179–182.
  8. C. Xu, X. Ping, and T. Zhang, "Steganography in compressed video stream," in Proc. Int. Conf. Innovative Computing, Information and Control (ICICIC'06), 2006, vol. II, pp. 803–806.
  9. D. -Y. Fang and L. -W. Chang, "Data hiding for digital video with phase of motion vector," in Proc. Int. Symp. Circuits and Systems (ISCAS), 2006, pp. 1422–1425.
Index Terms

Computer Science
Information Sciences

Keywords

cryptography steganography motion vector prediction error