A Novel Approach of Encrypted Video Steganography

International Journal of Computer Trends and Technology (IJCTT)          
© 2017 by IJCTT Journal
Volume-50 Number-1
Year of Publication : 2017
Authors : T.Venkat Narayana Rao, M.Likhitha, A.Anukritha Reddy, K.Sravani


T.Venkat Narayana Rao, M.Likhitha, A.Anukritha Reddy, K.Sravani "A Novel Approach of Encrypted Video Steganography". International Journal of Computer Trends and Technology (IJCTT) V50(1):14-19, August 2017. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Steganography is immediate need of today’s world due to want for of privacy in modern age. It is an essential system to hide a secret information within a digitally covered media which can be either a text, an image, an audio or a video in a way that the data embedded in it is transmitted secretly and securely. The hidden message can be image, text, speech (audio) or a video. The existing scheme of using image as a cover media has a restriction of embedding dimension. This paper implements a video as a cover media to overcome the limitation of embedding dimension. The proposed scheme uses a complete Java language based approach for both encryption and embedding processes. The concealed message is first encrypted by XOR and shifting the bit positions of the data file along with the key followed by split and swap operations to ensure double encryption, later it is embedded on the cover media in a way that the video do not mislay its functionality. By this process, the possibility of finding the hidden information by the attacker is slighter as compared to the standard method of hiding information frame-by-frame in a sequential approach. It also reduces the computational time taken for extraction process.

[1] F.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn, ―Information Hiding—A Survey, Proc. IEEE, 1999.
[2] Niels Provos and Peter Honeyman, ―Hide and Seek: An Introduction to Steganography, University of Michigan, IEEE 2003.
[3] Mamta Juneja, Parvinder S. Sandhu, and Ekta Walia,‖Application of LSB Based Steganographic Technique for 8-bit Color Images, WASET 2009.
[4] Sutaone, M.S.; Khandare, Image based Steganography using LSB insertion technique, IET, 2008. [5] Mazdak Zamani, Azizah A. Manaf, and Shahidan Abdullah, ―A Genetic- Algorithm-Based Approach for Audio Steganography WASET 2009.
[6] Neeta Deshpande, Kamalapur Sneha, Daisy Jacobs, ―Implementation of LSB Steganography and Its Evaluation for various Bits_ Digital Information Management, 2006 1st International Conference on. 06/01/2007; DOI: 10.1109/ICDIM.2007.369349.
[7] Kharrazi, M., Sencar, H. T., and Memon, N. (2004). Image steganography: Concepts and practice. In WSPC Lecture Notes Series.
[8] Neil F. Johnson, Duric, Z., Jajodia, S. Information Hiding Steganography and Watermarking Attacks and Countermeasure. Kluwer Academic Press. Norwrll, MA, New York, The Huague, London vol 32.8(2010) 79-94.
[9] Neil F. Johnson and S.Jajodia Exploring Steganography. Seeing the Unseen, IEEE Computer, vol. 31.2 (2009) 26 - 34.
[10] Min. Wu Joint Security and Robustness Enhancement for Quantization Embedding. IEEE Transactions, vol 0-78037750-8/03 (2009) 483-486.
[11] C. E. Shannon A mathematical theory of communication. Bell System Technical journal, vol. 27 (1948) 379-423.
[12] G. J. SimmonsTheprisoners’ problem and the subliminal channel, in Advances in Cryptology. Proceedings of Crypto 83 (D. Chaum, ed.), Plenum Press vol 12.9(2010)51-67.
[13] Ashish T. Bhole, Rachna Patel, ―Design and Implementation of Steganography Over Video File,The Indian Journal of Technical Education, Special Issue for NCEVT’ 12, pp. 69-72, April 2012.
[14] Ashish T. Bhole and Rachna Patel, ―Steganography over Video File using Random Byte Hiding and LSB Technique, International Conference on Computational Intelligence and Computing Research, pp. 189-194, 2012 IEEE.

Steganography, encryption, embedding, de-embedding, decryption, stego video.