International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020


IJSTR >> Volume 3- Issue 4, April 2014 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616

Secret Data Sharing Through Video Using Adaptive Data Concealment With Crypto System

[Full Text]



B.Prabhakaran, A.Murugan



Index Terms: chaos encryption, adaptive embedding algorithm, LSB replacement.



Abstract: Nowadays, Internet and digital media are getting more popular. So, the need and requirement for secure transmission of data also increasing rapidly.A given input video file is converted into frame sequences and one of frame will be selected to conceal the secret data for secured data communication. The proposed technique uses chaos crypto system for encrypting a secret text data into cipher text to avoid data hacking issues. After data encryption, the data hider will conceal the secret encrypted data into the selected frame using adaptive embedding algorithm. Although encryption achieves certain security effects, they make the secret messages unreadable and unnatural or meaningless. These unnatural messages usually attract some unintended observers’ attention. The data hiding technique uses the adaptive LSB replacement algorithm for concealing the secret message bits into the image in frequency domain. An Integer wavelet transform is used to determine the high frequency components for effective data concealing for preserving image quality. In the data extraction module, the secret data will be extracted by using relevant key for choosing the pixel coefficients and it will be decrypted to get original data using encryption key. Finally the data encryption and hiding will be analyzed based on image and data recovery.



[1]. C. H. Yang, C. Y. Weng, S. J. Wang, and H. M. Sun, “Adaptive data hiding in edge areas of images with spatial LSB domain systems,” IEEE Trans. Inf. Forensics Security, vol. 3, no. 3, pp. 488–497, Sep. 2008.

[2]. F. C. A. Fernandes, R. L. C. van Spaendonck, and C. S. Burrus, “A new framework for complex wavelet transforms,” IEEE Trans. Signal Process., vol. 51, no. 7, pp.1825–1837, Jul. 2003.

[3]. T. Wiegand, G. J. Sullivan, G. Bjntegaard, and A. Luthra, “A Feasible Chaotic Encryption Scheme for Image,” IEEE Trans.., vol. 13, no. 7, pp. 557–559, Jul. 2003.

[4]. T Mrkel,JHPEloff and MS Olivier .”An Overview of Image Steganography,” in proceedings of the fifth annual Informa-tion Security South Africa Conference ,2005.

[5]. Souvik Bhattacharyya, Avinash Prasad Kshitij, Gautom-Sanyal, “A Novel Approach to Develop a Secure Image based Steganographic Model using Integer Wavelet Trans-form.,” 2010 International Conference on Recent Trends in Information, Telecommunication and Computing.

[6]. C. S. Burrus, R. A. Gopinath, and H. Guo, Introduction to Waveletsand the Wavelet Transform—A Primer. Englewood Cliffs, NJ: Prentice-Hall, 1998, Expansion of notes for the IEEE Signal Processing Society’stutorial program held in conjunction with the ICASSP-93 on Apr.26, 1993.