Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Innovative Data Hiding Security Model Using Forensic Audio Video Crypto-Steganography


Affiliations
1 Department of Electronics and Telecommunication Engineering, Pune Institute of Computer Technology, India
2 Department of Electronics and Communication Engineering, Shri Ramdeobaba College of Engineering and Management, India
     

   Subscribe/Renew Journal


Secret information concealing using steganography is simple but to maintain its security, perceptibility, robustness, embedding capacity and good recovery of both cover as well as secret information are the major issues. In this paper we have applied Block Plane Coding Technique (BPCT) for concealing the secret data into the randomly obtained frames of video and Least Significant Bit (LSB) algorithm for audio of same video. We have obtained the key security parameters like Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), Normalize Cross Correlation Factor (NCCF), Bit Error Rate (BER), histogram and spectrograph before embedding and after recovering the protected data from stego video using forensic technique to increase the data security. Moreover, the proposed scheme provides a large hiding capacity, more security for secret data and good visual recovery of both secret data and original video than any other existing methods. Through many attack during transmission on stego video, it is found that the suggested approach is more robust than any other existing methods.

Keywords

Audio Video Steganography, BPCT, Information Hiding, 4LSB, Visual Attack, Histogram.
Subscription Login to verify subscription
User
Notifications
Font Size

  • Manasi Subhedar and V.H. Mankar, “Current Status and Key Issues in Image Steganography: A Survey”, Computer Science Review, Vol. 13-14, pp. 95-113, 2014.
  • Mennatallah M. Sadek, Amal S Khalifa and Mostafa G.M Mostafa, “Video Steganography: a Comprehensive Review”, Multimedia Tools Application, Vol. 74, No. 17, pp. 7063-7094, 2015.
  • George Abboud, Jeffrey Marean and Roman Yampolskiy, “Steganography and Visual Cryptography in Computer Forensics”, Proceedings of IEEE 5th International Workshop on Systematic Approaches to Digital Forensic Engineering, pp. 25-32, 2010.
  • SghaierGuizani and Nidal Nasser, “An Audio /Video Crypto Adaptive Optical Steganography Technique”, Proceedings of IEEE 8th International Conference on Wireless Communication and Mobile Computing, pp. 1057-1061, 2012.
  • Smita Bansod, Vanita Mane and R. Ragha, “Modified BPCS Steganography using Hybrid Cryptography for Improving Data Embedding Capacity”, Proceedings of IEEE International Conference on Communication, Information and Computing Techniques, pp. 1-5, 2012.
  • Souvik Bhattacharyya and Aparajita Khan, “Pixel Mapping Method based Bit Plane Complexity Segmentation Steganography”, Proceedings of IEEE World Congress on Information and Communication Technique, pp. 36-41, 2011.
  • Peipei Shi, Zhaohui Li and Tao Zhang, “Technique of Improved Steganography Text based on Chaos and BPCS”, Proceedings of IEEE 2nd International Conference on Advanced Computer Control, pp. 232-236, 2010.
  • Rosane English, “Comparison of High Capacity Steganography Techniques”, Proceedings of 2nd IEEE International Conference on Soft Computing and Pattern Recognition, pp. 448-453, 2010.
  • Sunil K. Moon and Rajeshree D. Raut, “Analysis of Secured Video Steganography using Computer Forensic Technique for Enhanced Data Security”, Proceedings of IEEE 2nd International Conference on Image Information Processing, pp. 660-665, 2013.
  • Hamdy M. Kelash, Osama F. Abdel Waheb, Osama A. Elshakankiry and Hala S.EI Sayed, “Hiding Data in Video Sequence using Steganography Algorithms”, Proceedings of International Conference on ICT Convergence, pp. 353358, 2013.
  • Jidagam Venkata Kartik and B Venkateswara Reddy, “Authentication of Secret Information in Image Steganography”, International Journal of Latest Trends in Engineering and Technology, Vol. 14, No. 6, pp. 97-104, 2013.
  • G. Swain and S .Lenka, “LSB Array based Image Steganography Technique By Exploring the Four Least Significant Bits”, Global Trends in Information System and Software Application, Vol. 270, pp. 479-488, 2012.
  • S.F. Mare, M. Vladutiu and L. Prodan, “Decreasing change Impact using smart LSB Pixel Mapping and Data Rearrangement”, Proceedings of IEEE 11th International Conference on Computer and Information Technology, pp. 269-276, 2011.
  • Anant M. Bagade and Sanjay N.Talbar, “A High Quality Steganography Musing Morphing”, Journal of International Process System, Vol. 10, No. 2, pp. 256-270,2014.
  • Geeta Kasana, Kulbir Singh and Stavanger Singh Bhatia, “Data Hiding Algorithm for Images using Discrete Wavelet Transform and Arnold Transform”, Journal of Information Processing System, Vol. 13, No. 5, pp. 1331-1344, 2015.
  • F. Arab, M. Shahidan and S. Abdullah, “A Robust Video Watermarking Technique for the Tamper Detection of Surveillance System”, Multimedia Tools and Application, Vol. 75, No. 18, pp. 10855-10865, 2016.
  • Hung-Min Sun, Chi-Yao Weng, Chin-Feng Lee and ChengHsing Yang, “Anti-Forensics with Steganographic Data Embedding in Digital Images”, IEEE Journal on Selected Areas in Communications, Vol. 29, No. 7, pp. 1392-1403, 2011.

Abstract Views: 329

PDF Views: 3




  • Innovative Data Hiding Security Model Using Forensic Audio Video Crypto-Steganography

Abstract Views: 329  |  PDF Views: 3

Authors

Sunil K. Moon
Department of Electronics and Telecommunication Engineering, Pune Institute of Computer Technology, India
Rajeshree D. Raut
Department of Electronics and Communication Engineering, Shri Ramdeobaba College of Engineering and Management, India

Abstract


Secret information concealing using steganography is simple but to maintain its security, perceptibility, robustness, embedding capacity and good recovery of both cover as well as secret information are the major issues. In this paper we have applied Block Plane Coding Technique (BPCT) for concealing the secret data into the randomly obtained frames of video and Least Significant Bit (LSB) algorithm for audio of same video. We have obtained the key security parameters like Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), Normalize Cross Correlation Factor (NCCF), Bit Error Rate (BER), histogram and spectrograph before embedding and after recovering the protected data from stego video using forensic technique to increase the data security. Moreover, the proposed scheme provides a large hiding capacity, more security for secret data and good visual recovery of both secret data and original video than any other existing methods. Through many attack during transmission on stego video, it is found that the suggested approach is more robust than any other existing methods.

Keywords


Audio Video Steganography, BPCT, Information Hiding, 4LSB, Visual Attack, Histogram.

References