The Video Hiding Technique Based On DWT And Genetic Algorithm With Boolean Functions

被引:0
作者
Sowmya, G. [1 ]
Meghana, K. [1 ]
Subbarayudu, B. [1 ]
Naidu, R. Ch. A. [2 ]
Keerthi, G. [1 ]
机构
[1] JNTUH, St Martins Engn Coll, IT Dept, Hyderabad, Andhra Pradesh, India
[2] JNTUH, St Martins Engn Coll, CSE Dept, Hyderabad, Andhra Pradesh, India
来源
PROCEEDINGS ON 2016 2ND INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT) | 2016年
关键词
Video steganography; DWT; Genetic algorithm; Boolean functions;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Steganography is a method of hiding a secret message within an ordinary message, where as the goal of cryptography is to make data unreadable by an unauthorized persons. Video steganography is expansion of image steganography where video files can simply viewed in a sequence of images. There are many difference between video and image steganography. As the video content is very dynamic and have less chances of detecting the hiding data compare to image steganography. So it is helpful than other existing stegnographic techniques because of it high security. It can also hold large amount of secret data. We introduced a technique called Discrete Wavelet Transformation (DWT) and Genetic algorithm to convert the data into a video file to make the video Steganography, which is an efficient method of embedding information into a carrier file. The DWT technique convert the cover image as 4 x 4 level of blocks in which each levels LL, LH, HL, and HH sub band images are developed. The current paper uses the DWT technique where the data is hidden in specific location of selected structure. Genetic algorithm is also introduced to minimize the selected frame and improve the security so that probability of detecting the hidden information into cover media is difficult. Boolean functions have been generated from different position arrays and measures the quality of the video indifferent byte streams by stego video.
引用
收藏
页码:843 / 849
页数:7
相关论文
共 10 条
[1]   A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm [J].
Ahmed M.A. ;
Kiah L.M. ;
Zaidan B.B. ;
Zaidan A.A. .
Journal of Applied Sciences, 2010, 10 (01) :59-64
[2]  
[Anonymous], ACM MULTIMEDIA
[3]  
Bhowal Krishna, 2016, International Journal of Network Security, V18, P758
[4]   A GA based audio steganography with enhanced security [J].
Bhowal, Krishna ;
Bhattacharyya, Debnath ;
Pal, Anindya Jyoti ;
Kim, Tai-Hoon .
TELECOMMUNICATION SYSTEMS, 2013, 52 (04) :2197-2204
[5]  
Gurvinder S., 2010, 4 NAT C COMP NAT DEV
[6]  
Jouhari H., J THEORETICAL APPL I, V32, P55
[7]   Data hiding in H.264 encoded video sequences [J].
Kapotas, Spyridon K. ;
Varsaki, Eleni E. ;
Skodras, Athanassios N. .
2007 IEEE NINTH WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING, 2007, :373-376
[8]  
Kumar G. S. N., 2014, ICPVS C
[9]  
Kumar G. S. Naveen, IJESAT, P170
[10]   Steganalysis of audio based on audio quality metries [J].
Özer, H ;
Avcibas, I ;
Sankur, B ;
Memon, N .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS V, 2003, 5020 :55-66