Video Steganography technique using Factorization and Spiral LSB methods

被引:0
|
作者
Jha, Vivek Kumar [1 ]
Roy, Subhajit [1 ]
Mukherjee, Srilekha [1 ]
Sanyal, Goutam [1 ]
机构
[1] Natl Inst Technol, Comp Sc & Engn Dept, Durgapur, India
关键词
Steganography; Pixel Randomization Using Factorization Method; Spiral (extended) LSB technique; Peak Signal-to-Noise Ratio(PSNR);
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The protection of confidential information from intruder has been a great matter of concern since ancient times. Nowadays use of internet has increased tremendously. As a result of it Digital media gathers maximum amount of confidential data. To maintain the secrecy over confidential data, different methods of hiding have been evolved. Steganography is one of the emergent area where maintaining the privacy of secret data is of utmost importance. It is an art of hiding the secret data or confidential information inside the digitally covered information. In this paper we proposed a new technique of video steganography by implementing cover frame pixel randomization, de-randomization and data embedding technique which maintain the quality of the secret data(video file) and prevents it from being accessed by intruders while communication through an open channel. Here we have proposed a new technique using factorization method to scramble pixels of cover frames of cover video file. Then the frames of secret video file is inserted in the scrambled cover frame of cover video file using Spiral (Extended) LSB technique. This method of hiding the secret video in the cover video gives a new security concept of securing the secret data from unauthorized accesses. Peak Signal-to-Noise Ratio (PSNR) is used to measure the quality of stegovideo. Thus this new approach of video steganography shows a very high imperceptibility to human vision and hence is quite efficient.
引用
收藏
页码:315 / 320
页数:6
相关论文
共 50 条
  • [41] Very High Capacity Image Steganography Technique Using Quotient Value Differencing and LSB Substitution
    Gandharba Swain
    Arabian Journal for Science and Engineering, 2019, 44 : 2995 - 3004
  • [42] LSB-Based Steganography Using Hamiltonian Paths
    Iranpour, Mehran
    2013 NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2013), 2013, : 586 - 589
  • [43] Comparison of different image formats using LSB Steganography
    Kaur, Harpreet
    Kakkar, Ajay
    PROCEEDINGS OF 4TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMPUTING AND CONTROL (ISPCC 2K17), 2017, : 97 - 101
  • [44] Image Steganography Using LSB and Hybrid Encryption Algorithms
    Alanzy, May
    Alomrani, Razan
    Alqarni, Bashayer
    Almutairi, Saad
    APPLIED SCIENCES-BASEL, 2023, 13 (21):
  • [45] Audio Steganography Using Dual Randomness LSB Method
    Vimal, Jithu
    Alex, Ann Mary
    2014 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), 2014, : 941 - 944
  • [46] Multicore implementation and performance analysis of a chaos based LSB steganography technique
    Gaurav Gambhir
    Jyotsna Kumar Mandal
    Microsystem Technologies, 2021, 27 : 4015 - 4025
  • [47] Multicore implementation and performance analysis of a chaos based LSB steganography technique
    Gambhir, Gaurav
    Mandal, Jyotsna Kumar
    MICROSYSTEM TECHNOLOGIES-MICRO-AND NANOSYSTEMS-INFORMATION STORAGE AND PROCESSING SYSTEMS, 2021, 27 (11): : 4015 - 4025
  • [48] Encryption based LSB Steganography Technique for Digital Images and Text Data
    Kaur, Manpreet
    Sharma, Vinod Kumar
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2016, 16 (09): : 90 - 97
  • [49] Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption
    Juneja, Mamta
    Sandhu, Parvinder Singh
    2009 INTERNATIONAL CONFERENCE ON ADVANCES IN RECENT TECHNOLOGIES IN COMMUNICATION AND COMPUTING (ARTCOM 2009), 2009, : 302 - 305
  • [50] Detection of LSB Matching Steganography using the Envelope of Histogram
    Zhang, Jun
    Hu, Yuping
    Yuan, Zhibin
    JOURNAL OF COMPUTERS, 2009, 4 (07) : 646 - 653