We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

A Novel Video Steganography Technique using Dynamic Cover Generation

Published on May 2012 by Vivek Sampat, Kapil Dave, Jigar Madia, Parag Toprani
National Conference on Advancement of Technologies – Information Systems and Computer Networks
Foundation of Computer Science USA
ISCON - Number 2
May 2012
Authors: Vivek Sampat, Kapil Dave, Jigar Madia, Parag Toprani
3087a4d6-d555-4f93-8a2e-a49be9d741c0

Vivek Sampat, Kapil Dave, Jigar Madia, Parag Toprani . A Novel Video Steganography Technique using Dynamic Cover Generation. National Conference on Advancement of Technologies – Information Systems and Computer Networks. ISCON, 2 (May 2012), 26-30.

@article{
author = { Vivek Sampat, Kapil Dave, Jigar Madia, Parag Toprani },
title = { A Novel Video Steganography Technique using Dynamic Cover Generation },
journal = { National Conference on Advancement of Technologies – Information Systems and Computer Networks },
issue_date = { May 2012 },
volume = { ISCON },
number = { 2 },
month = { May },
year = { 2012 },
issn = 0975-8887,
pages = { 26-30 },
numpages = 5,
url = { /proceedings/iscon/number2/6467-1014/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Advancement of Technologies – Information Systems and Computer Networks
%A Vivek Sampat
%A Kapil Dave
%A Jigar Madia
%A Parag Toprani
%T A Novel Video Steganography Technique using Dynamic Cover Generation
%J National Conference on Advancement of Technologies – Information Systems and Computer Networks
%@ 0975-8887
%V ISCON
%N 2
%P 26-30
%D 2012
%I International Journal of Computer Applications
Abstract

Since the dawn of technology, communication has always been in need of novel techniques of data security. The confidentiality, integrity and authenticity of data are of prime importance while communicating over a network. To satisfy these requirements, we propose a steganographic system using an advanced approach which generates a personalised video cover to hide the data within itself in accordance to multiple factors such as the data to be transmitted and key selected. This approach will make sure that the transfer of data becomes more secure against security breaches providing privacy and safe communication environment.

References
  1. Siponen, M. T. and Oinas-Kukkonen, H. 2007. A review of information security issues and respective research contributions. SIGMIS Database 38, 1 (Feb. 2007), 60-80.
  2. Yang, S. 2003 Security and Trust Management in Collaborative Computing. Doctoral Thesis. UMI Order Number: AAI3127699, University of Florida.
  3. Wikipedia [Online]. Available: http://www. wikipedia. org/Steganography
  4. C. L. Chang, et al. "A steganographic method based upon JPEG and quantization table modification". An International Journal - Information Science. , 2000.
  5. Wang, C. , et. al "New image steganographic methods using un-length approach". 2004, Information Science, Elsevier Inc. All Rights Reserved, p. 16, 2004.
  6. I. Avcibas, N. Memon, and B. sankur, Steganalysis using image quality metrics. " Security and Watermarking of Multimedia Contents, San Jose, Ca. , Feruary 2001.
  7. J. Fridrich and M. Goljan, Digital image steganography using stochastic modulation," SPIE Symposium on Electronic Imaging, San Jose, CA,, 2003.
  8. J. Fridrich, M. Goljan, D. Hogea, and D. Soukal, Quantitive steganalysis of digital images: Estimating the secret message lenght," ACM Multimedia Systems Journal, Special issue on Multimedia Security, 2003.
  9. Petitcolas, FAP; Anderson RJ; Kuhn MG (1999). "Information Hiding: A survey" (pdf). Proceedings of the IEEE (special issue) 87 (7): 1062–78. doi:10. 1109/5. 771065. Retrieved 2008-09-02.
  10. Bartosz Jankowski, Wojciech Mazurczyk and Krzysztof Szczypiorski (11 May 2010). "Information Hiding Using Improper Frame Padding".
  11. Fenlin Liu; et al. , B. "Real-time steganography in compressed video". MRCS, NCS, Springer, p. 6, 2006.
  12. Video Steganography for Confidential Documents: Integrity, Privacy and Version Control Diego F. de Carvalho1, Rafael Chies,Andre P. Freire, Luciana A. F. Martimiano and Rudinei Goularte
Index Terms

Computer Science
Information Sciences

Keywords

Digital Steganography Digital Video Cover Block-based Transformation