Open Access Open Access  Restricted Access Subscription Access

Random Pattern Based Steganography Using Sequential Bit Encoding for Hiding Data in 3D Ultrasound Video


Affiliations
1 Department of Computer Engineering, UCoE, Punjabi University, Patiala, India
 

The hackers always remain the point to grab the chance to steal the important information to make money by selling it or when working for the spy or detective organizations. Hence the data embedding techniques becomes very important for the purpose of information security. The data is being embedded in the several types of data such as image into images, signal into images, text into image, signal or video, image to image, etc. The proposed model focuses upon the embedding of the image data into the video frames. The specialized part of the proposed model lies with the embedding of the secret data in the various segments before embedding and then embeds each segment of data into the different frames of the video to minimize the probability of detection. The proposed model is robust model for the purpose of embedding the secret medical imagery data into the 3-D medical video data. The data security lies within the process of embedding where the data is encrypted before being embedded into the video frames. The proposed model is based upon the deterministic but random pixel list generation, where the heuristic embedding takes place for the embedding of each pixel in the given data. The proposed model has been analyzed for its performance under the various domains such as mean squared error, peak signal to noise ratio, histogram difference etc. The proposed model has performed better on the basis of all of the performance evaluation parameters. The histogram model has shown the least difference between the two histograms obtained from the embedding process before and after the embedding. In the clear words, the proposed model can be declared winner over the previous models of steganography.

Keywords

Video Steganography, Transform Domain Embedding, Frequency Embedding, Heuristic Steganography.
User
Notifications
Font Size

Abstract Views: 209

PDF Views: 0




  • Random Pattern Based Steganography Using Sequential Bit Encoding for Hiding Data in 3D Ultrasound Video

Abstract Views: 209  |  PDF Views: 0

Authors

Raghvir Singh Grewal
Department of Computer Engineering, UCoE, Punjabi University, Patiala, India
Gaurav Deep
Department of Computer Engineering, UCoE, Punjabi University, Patiala, India

Abstract


The hackers always remain the point to grab the chance to steal the important information to make money by selling it or when working for the spy or detective organizations. Hence the data embedding techniques becomes very important for the purpose of information security. The data is being embedded in the several types of data such as image into images, signal into images, text into image, signal or video, image to image, etc. The proposed model focuses upon the embedding of the image data into the video frames. The specialized part of the proposed model lies with the embedding of the secret data in the various segments before embedding and then embeds each segment of data into the different frames of the video to minimize the probability of detection. The proposed model is robust model for the purpose of embedding the secret medical imagery data into the 3-D medical video data. The data security lies within the process of embedding where the data is encrypted before being embedded into the video frames. The proposed model is based upon the deterministic but random pixel list generation, where the heuristic embedding takes place for the embedding of each pixel in the given data. The proposed model has been analyzed for its performance under the various domains such as mean squared error, peak signal to noise ratio, histogram difference etc. The proposed model has performed better on the basis of all of the performance evaluation parameters. The histogram model has shown the least difference between the two histograms obtained from the embedding process before and after the embedding. In the clear words, the proposed model can be declared winner over the previous models of steganography.

Keywords


Video Steganography, Transform Domain Embedding, Frequency Embedding, Heuristic Steganography.