Application of Data Hiding in Audio-Video Using Anti Forensics Technique for Authentication and Data Security

被引:0
作者
Moon, Sunil K. [1 ]
Raut, Rajeshree D. [2 ]
机构
[1] Pune Inst Comp Technol, Dept Elect & Telecommun, Pune, Maharashtra, India
[2] Ramdeobaba Coll Engg & Mgmt, Dept Elect & Commun, Nagpur, India
来源
SOUVENIR OF THE 2014 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC) | 2014年
关键词
4LSB; Data Hiding; Steganography; Computer Forensics; Histogram; PSNR; Authentication;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Steganography is the method of hiding any secret information like password, text, and image, audio behind original cover file. In this pap er we proposed the au dio-video cryptosteganography which is the combination of image steganography and audio steganography using computer forensics technique as a tool for authentication. Our aim is to hide secret information behind image and audio of video file. As video is the application of many still frames of images and audio, we can select any frame of video and audio for hiding our secret data. Suitable algorithm such as 4LSB is used for image steganography and phase coding algorithm for audio steganography. Suitable parameter of sccu rity and authentication like PSNR, histogram arc obtained at receiver and transmitter side which are exactly identical, hence data security can he increased. This paper focus the idea of computer forensics technique and its use of video steganography in both investigative and security manner.
引用
收藏
页码:1110 / 1115
页数:6
相关论文
共 17 条
  • [1] Abboud George, 2010, 2010 IEEE 5 INT WORK, P25
  • [2] Balguri P.P, IEEE2012 ICCICT OCT, P1
  • [3] Bhaumik A.K., 2009, International Journal of Database Theory and Application, V2, P9
  • [4] cvesic Nedeljko, 2012 IEEE INT C, P336
  • [5] Djebbar Fatiha, 2011, IEEE INT C INN INF T
  • [6] Gao S., 2008, 2008 IEEE INT C, P1
  • [7] GUIZANI S, 2012, AUDIO VIDEO CRYPTO A, P1057
  • [8] Habes Alkhraisat, 2006, INFORM TRANSMISSION, V52, P1
  • [9] Jalab Hamid A., 2009, IEEE J COMPUTING, V1, P108
  • [10] Data security using data hiding
    Moon, S. K.
    Kawitkar, R. S.
    [J]. ICCIMA 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND MULTIMEDIA APPLICATIONS, VOL IV, PROCEEDINGS, 2007, : 247 - +