IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
0.2
2019CiteScore
 
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020

CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 9 - Issue 4, April 2020 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



A Framework Work For Data Security Using Cryptography And Video Steganography

[Full Text]

 

AUTHOR(S)

Dr. Balajee Maram, Dr Satya Keerthi , Gorripati , Dr. N Supriya

 

KEYWORDS

Pixel, MSE, PSNR, LSB, distortion

 

ABSTRACT

Cryptography is the technology for data confidentiality and steganography is the research area data hiding. Steganography hides the data in various multimedia cover files like image, audio and video. This paper handles videos for steganography, which have high redundant frames and pixels. In this paper, Lease Significant Bit (LSB) method hides the secret message bits in least significant bits of each pixel. The performance metrics MSE and PSNR are used to check the strength of the proposed algorithm. The proposed algorithm also checks payload capacity, video quality and security of the confidential data by applying cryptography and steganography algorithm and various parameters.

 

REFERENCES

[1] Ron Crandall, Some Notes on Steganography, Posted on Steganography Mailing List, 1998.
[2] M. Ramadhan, E. Khaled, A High Payload Video Steganography Algorithm in DWT Domain Based on BCH Codes (15, 11), Wireless Telecommunications Symposium (WTS), New York, April 2015, 1-8
[3] Swathi,S.A.K Jilani, " Video Steganography by LSB Substitution Using Different Polynomial Equations", International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5,sep 2012
[4] A. Saleema and T. Amarunnishad, A new steganography algorithm using hybrid fuzzy neural networks, in: International Conference on Emerging Trends in Engineering, Science and Technology (ICETEST-2015), 24, pp. 1566–1574, 2016
[5] S. Mumthas and A. Lijiya, Transform domain video steganography using RSA, random DNA encryption and Huffman encoding, in: 7th International Conference on Advances in Computing and Communications ICACC-2017, 115, pp. 660–666, 2017
[6] Kefa Rabah,“Steganography The Art Of Hiding”,Information Technology Journal: 3(3),245-269,2004.
[7] A.K. Bhaumik, M. Choi, R.J. Robles and M.O. Balitanas,“Data Hiding in Video”,in International Journal of Database Theory and Application ,Vol. 2, No. 2, pp. 9-16, June 2009.
[8] Mritha Ramalingam, “Stego Machine Video Steganography using Modified LSB Algorithm”, in World Academy of Science, Engineering and Technology, 50, pp. 497-500, 2011.
[9] Pritish Bhautmage, Prof. Amutha Jeyakumar, Ashish Dahatonde, “Advanced Video Steganography Algorithm”, International Journal Of Engineering Research And Applications (IJERA) , Pp.1641-1644 1641 Vol. 3, Issue 1, January -February 2013
[10] J Fridrich, M Goljian, R Du, “Detecting LSB steganography in color and gray-scale images”. Magazine of IEEE Multimedia Special Issue on Security, Vol.8, No.4, pp.22-28, 2001
[11] G. Swain, S.K. Lenka, “A novel steganography technique A novel steganography technique by mapping words with LSB array”, International Journal of Signal and imaging Systems Engineering, vol.8, no.1, pp.115-122, 2015.
[12] G. Swain, S. K. Lenka, “LSB array based image steganography technique by exploring the four least significant bits”, Global Trends in Information Systems and Software Applications, Communications in Computer and Information Science, vol.270, pp.479-488, 2012.
[13] G. Swain, S. K. Lenka, “A technique for secret communication using a new block cipher with dynamic steganography”, International Journal of Security and Its
Applications, vol.6, no.2, pp.1-12, 2012.
[14] G Swain, S K Lenka, “A robust image steganography technique using dynamic embedding with two least significant bits”, Advanced Materials Research, vols. 403-
408, pp.835-841, 2012
[15] N. F. Johnson and S. Jajodia, “Exploring steganography: seeing the unseen,” IEEE Computer, vol. 31, no. 2, pp. 26–34, 1998.

[16] R. J. Anderson, “Stretching the limit of steganography in information hiding,” Springer Lecture Notes in Computer Science, vol. 1174, pp. 39–48, 1996.
[17] M. Owens, “A Discussion of Covert Channels and Steganography”, as part of the Information Security Reading Room. SANS Institute 2002.
[18] Dr Balajee Maram, Dr J M Gnanasekar, Gunasekaran Manogaran, M. Balaanand “Intelligent Security Algorithm For Unicode Data Privacy And Security In IoT”, Service Oriented Computing and Applications (SPRINGER), ISSN: 1863-2386 (Print) 1863-2394 (Online),
[19] Balajee Maram, Gnanasekar JM (2015) Light weight cryptographic algorithm to improve avalanche effect for data security using prime numbers and bit level operations, International Journal of Applied Engineering Research (IJAER) 10(21):41977–41983. ISSN 0973-4562.
[20] Dr Balajee Maram, Dr. Guru Kesava Dasu Gopisetty, Dr P Srinivasa Rao, “A Framework Work for Data Security using Cryptography and Image Steganography”, International Journal of Innovative Technology and Exploring Engineering’, ISSN:2278-3075 (Online), Volume-8 Issue-11, pp.1066-1070, September 2019