Hiding Text in Video by Linked List Method:Dual Steganography

  • Neha Anjum
  • .Sidharth Kaushik
  • .Mounika K
  • B. Sharon
Keywords: Steganography, PSNR, MSE, ET(Elapse time),Fiestal Network.

Abstract

The recent growth in computational power and technology has propelled the need for highly secured data communication. One of the best techniques for secure communication is Steganography-a covert writing. It is an art of hiding the very existence of communicated message itself.The aim is to design a steganography algorithm which not only hide the message behind the image but also provide more security than others .A new steganography technique for embedding both text or image in cover images by using LSB & Link List method is implemented. This steganography technique is completely a time domain (pixel based) and secret messages are embedded directly into 24- bit color image. Two ways are provided for embedding the secret data inside cover image such as sequential encoding and random encoding for both text & image .For the purpose of security, encryption technique is used with a user defined key. RGB image format is used to improve the quality of the stego image. At last that RGB image will saved as BMP image file so that no lossy compression can occur and the original message do not destroy and can be extract as it is. Aspect ratio for both text and image after hiding in cover image maintains exactly same. Performance of proposed steganography technique is evaluated by calculating values of MSE(Mean square error), PSNR(Peak signal to noise ratio), ET(Elapse time). Dual Steganography is the process of using Steganography combined with Cryptography. Steganography is the process of hiding confidential data's in the media files such as audio, images, videos etc. Cryptography is a branch of mathematics concerned with the study of hiding and revealing information and also for proving authorship of messages. In this paper, Dual Steganography concept has been applied to secure the original videos from unauthorized person. The process has been done by embedding the original video inside another video. Both the videos are converted into frames first. Then the individual frames of original video are sampled with the frames of another video. After completing the sampling process, the output frames are combined to get the encrypted video.

References

[1] Kousik Dasgupta, J.K. Mandal and Paramartha Dutta, “Hash Based Least Significant Bit Technique for Video Steganography (HLSB”), International Journal of Security, Privacy and Trust Management (IJSPTM), Vol.1,No2, April 2012.
[2] A. Swathi and Dr. S.A.K. Jilani, “Video Steganography by LSB Substitution Using Different Polynomial Equations”, International Journal of Computational Engineering Research (IJCER), Vol. 2, Issue 5, September 2012.
[3]Ronak Doshi, Pratik Jain and Lalit Gupta, “Steganography and Its Applications in Security”,International Journal of Modern Engineering Research (IJMER), Vol. 2, Issue 6, November-December 2012.
[4] Rohit G Bal and Dr. P. Ezhilarasu, “An Efficient Safe and Secured Video Steganography using Shadow Derivation”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 2, Issue 3, March 2014.
[5] Hamdy M. Kelash, Osama F. Abdel Wahab, Osama A. Elshakankiry and Hala S. El-sayed, “Utilization of SteganographicTechniques inVideo Sequences”, International Journal of Computing and Network Technology, Sys. 2, No. 1 Pg. 17-24, January 2014.
[6]Hemant Gupta and Setu Chaturvedi, “Video Steganography through LSB Based Hybrid Approach”, International Journal of Computer Science and Network Security, Vol. 14, No. 3, March 2014.
[7] Anwar H. Ibrahim and Waleed M. Ibrahim, “Text Hidden in Picture Using Steganography: Algorithms and Implications for Phase Embedding and Extraction Time”,International Journal of Information Technology & Computer Science (IJITCS), Vol. 7, No. 3, February 2013.
[8] Krati vyas and B. L. Pal, “A Proposed Method in Image Steganography to improve Image Quality with LSB Technique”, International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), Vol. 3, Issue 1, January 2014.
[9] Deepak Kumar Sharma and Astha Gautam, “An Approach to hide Data in Video using Steganography”,International Journal of Research in Engineering and Technology (IJRET), Vol. 3, Issue 4, April 2014.
[10] Vipula Madhukar Wajgade and Dr. Suresh Kumar, “Enhancing Data Security using Video Steganography”, International Journal of Emerging Technology and Advanced Engineering (IJETAC), Vol. 3, Issue 4, April 2013.
[11] Ms. Fameela. K. A, Mrs. Najiya. A and Mrs. Reshma. V. K, “Survey on Reversible Data Hiding in EncryptedImages”.
Published
2018-11-05
How to Cite
Anjum, N., Kaushik, .Sidharth, K, .Mounika, & Sharon, B. (2018, November 5). Hiding Text in Video by Linked List Method:Dual Steganography. ASIAN JOURNAL FOR CONVERGENCE IN TECHNOLOGY (AJCT ) -UGC LISTED, 4(II). https://doi.org/https://doi.org/10.33130/asian%20journals.v4iII.600
Section
Article