Lightweight and Optimized Multi-Layer Data Hiding using Video Steganography Paper

被引:0
作者
Kamil, Samar [1 ]
Ayob, Masri [1 ]
Abdullah, Siti Norul Huda Sheikh [2 ]
Ahmad, Zulkifli [3 ]
机构
[1] Univ Kebangsaan Malaysia, Fac Informat Sci & Technol, CAIT, Bangi, Selangor, Malaysia
[2] Univ Kebangsaan Malaysia, Fac Informat Sci & Technol, Cyber Secur, Bangi, Selangor, Malaysia
[3] Univ Kebangsaan Malaysia, Fac Social Sci & Humanities, Sch Language Studies & Linguist, Bangi, Selangor, Malaysia
关键词
Video steganography; least significant bit technique; optimized data hiding; cloud computing; boron cipher;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The ever-escalating attacks on the internet network are due to rapid technological growth. In order to surmount such challenges, multi-layer security algorithms were developed by hybridizing cryptography and steganography techniques. Consequently, the overall memory size became enormous while hybridizing these techniques. On the other side, the least significant bit (LSB) and modified LSB replacing approaches could provide the variability as detected by steganalysis technique, most found to be susceptible to attack too due to numerous reasons. To overcome these issues, in this paper a lightweight and optimized data hiding algorithm is proposed which consume less memory, provide less variability, and robust against histogram attacks. The proposed steganography system was achieved in two stages. First, data was encrypted using lightweight BORON cipher that only consumed less memory as compared to conventional algorithm such as 3DES, AES. Second, the encrypted data was hidden in the complemented or non-complemented form to obtain minimal variability. The performance of the proposed technique was evaluated in terms of avalanche effect, visual quality, embedding capacity and peak signal to noise ratio (PSNR). The results revealed that the lightweight BORON cipher could produce approximate same avalanche effect as the AES algorithm produced. Furthermore, the value of PSNR had shown much improvement in comparison to optimization algorithm GA.
引用
收藏
页码:256 / 262
页数:7
相关论文
共 21 条
  • [1] Abdul Rafidah, 2016, SOFT COMPUTING
  • [2] Ali A. Hussain, 2016, RES J APPL SCI ENG T, V12, P154, DOI 10.19026/rjaset.12.2316
  • [3] Ali Ahmed Hussain, 2017, J THEORETICAL APPL I, V95
  • [4] BORON: an ultra-lightweight and low power encryption design for pervasive computing
    Bansod, Gaurav
    Pisharoty, Narayan
    Patil, Abhijit
    [J]. FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2017, 18 (03) : 317 - 331
  • [5] Optimized Video Steganography using Genetic Algorithm (GA)
    Dasgupta, Kousik
    Mondal, Jyotsna Kumar
    Dutta, Paramartha
    [J]. FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE: MODELING TECHNIQUES AND APPLICATIONS (CIMTA) 2013, 2013, 10 : 131 - 137
  • [6] A real-time dual watermarking algorithm of H.264/AVC video stream for Video-on-Demand service
    He Yingliang
    Yang Gaobo
    Zhu Ningbo
    [J]. AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2012, 66 (04) : 305 - 312
  • [7] Image steganography in spatial domain: A survey
    Hussain, Mehdi
    Wahab, Ainuddin Wahid Abdul
    Bin Idris, Yamani Idna
    Ho, Anthony T. S.
    Jung, Ki-Hyun
    [J]. SIGNAL PROCESSING-IMAGE COMMUNICATION, 2018, 65 : 46 - 66
  • [8] Hussein WA, 2015, INT J ADV COMPUT SC, V6, P23
  • [9] Jain Mamta, 2016, PERSPECTIVES SCI, V8, P417
  • [10] Kumar V., 2017, MULTIMED TOOLS APPL, V77