CFP last date
02 December 2024
Call for Paper
January Edition
CAE solicits high quality original research papers for the upcoming January edition of the journal. The last date of research paper submission is 02 December 2024

Submit your paper
Know more
Reseach Article

A Modified High Capacity Video Steganography Technique Based On Spatial Domain Method, Asymmetric Cryptography and Huffman Code Algorithms

by Richard Apau, J. B. Hayfron-Acquah, Frimpong Twum
Communications on Applied Electronics
Foundation of Computer Science (FCS), NY, USA
Volume 5 - Number 10
Year of Publication: 2016
Authors: Richard Apau, J. B. Hayfron-Acquah, Frimpong Twum
10.5120/cae2016652390

Richard Apau, J. B. Hayfron-Acquah, Frimpong Twum . A Modified High Capacity Video Steganography Technique Based On Spatial Domain Method, Asymmetric Cryptography and Huffman Code Algorithms. Communications on Applied Electronics. 5, 10 ( Sep 2016), 53-60. DOI=10.5120/cae2016652390

@article{ 10.5120/cae2016652390,
author = { Richard Apau, J. B. Hayfron-Acquah, Frimpong Twum },
title = { A Modified High Capacity Video Steganography Technique Based On Spatial Domain Method, Asymmetric Cryptography and Huffman Code Algorithms },
journal = { Communications on Applied Electronics },
issue_date = { Sep 2016 },
volume = { 5 },
number = { 10 },
month = { Sep },
year = { 2016 },
issn = { 2394-4714 },
pages = { 53-60 },
numpages = {9},
url = { https://www.caeaccess.org/archives/volume5/number10/662-2016652390/ },
doi = { 10.5120/cae2016652390 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-09-04T19:55:15.315302+05:30
%A Richard Apau
%A J. B. Hayfron-Acquah
%A Frimpong Twum
%T A Modified High Capacity Video Steganography Technique Based On Spatial Domain Method, Asymmetric Cryptography and Huffman Code Algorithms
%J Communications on Applied Electronics
%@ 2394-4714
%V 5
%N 10
%P 53-60
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The Technology as a product of knowledge has vulnerabilities so that its development is continuously undertaken. Researching steganography and cryptography relates to the perception of secrecy and privacy. Based on this perception some basic requirements of steganographic applications are often ignored. Beyond security, steganographic applications are required to provide high payload or embedding capacity as well as very good and appreciable level of robustness. Emphasis has always been placed on security to the point that capacity is often not mention or ignored. Most steganographic applications or software currently in the market increase the size of the resultant file after embedding. Conceptually, the resultant file size is supposed to increase when using an embedding technique. This is effectively so, because noise is being added to the low bits which will always increase the size. The main aim of this research is to ensure same file size output after embedding and also reduce the file size to be embedded drastically. To obtain same file size, the cover video was re-encoded and reconstructed using the techniques of video encoding. The file was then embedded in a converted frame using LSB. The high capacity or payload was achieved by employing RSA and Huffman code compression algorithms. The results and analysis of the proposed system revealed that when a file is embedded in a cover video, the properties of the original video and the stego video are the same and the level of compression achieved is far above the average 20% normally obtained

References
  1. Odeh, A., & Elleithy, K. (2012). Steganography in Arabic Text Using Zero Width and Kashidha Letters. International Journal of Computer Science & Information Technology (IJCSIT), 4(3), 1-11
  2. Dengre , A. R., Gawande, A. D. Deshmukh, , A. B.( June, 2013). Effect of Audio Steganography based on LSB insertion with Image Watermarking using AVI video . International Journal of Application or Innovation in Engineering & Management (IJAIEM), 2(6), 2319 – 4847.
  3. Al-Vahed, A., & Sahhavi, H. (2011). An overview of modern cryptography. World Applied Programming, 1(1), 3-8
  4. Kundalakesi,M., Sharmathi.R, Akshaya.R (2015) Overview of Modern Cryptography. International Journal of Computer Science and Information Technologies(IJCSIT), Vol. 6 (1), 350-353.
  5. Raghu, D., Rao, M. S., & Jacub, C. R. (2012).The File Encryption Method in Cryptographic Key Management Wireless Ad Hoc Networks. International Journal of Computer Science and Information technologies, vol 3(1), 3279-3282
  6. Venkateswaralu, S., Chhabra, N., & GNI, M. (2012). Secret Key Generation and Eavesdropping detection using Quantum Cryptography. International Journal of Computer Science and Information Technologies (IJCSIT), Vol. 3 (2) ,3348 – 3354.
  7. Bhaumik, A. K., Choi, M., Robles, R. J., & Balitanas, M. O. (2009). Data hiding in video. International Journal of Database Theory and Application, 2(2), 9-16.
  8. Elbayoumy, M., Elmogy, M., Abouelfetouh, A., & Elhadary, R. (2014). A Proposed Technique For Hiding Data Into Video Files. International Journal of Computer Science Issues (IJCSI), 11(2), 68.
  9. Xu, C., Ping, X., & Zhang, T. (2006, August). Steganography in compressed video stream. In Innovative Computing, Information and Control, 2006. ICICIC'06. First International Conference on (Vol. 1, pp. 269-272). IEEE.
  10. Dasgupta, K., Mondal, J. K., & Dutta, P. (2013). Optimized Video Steganography Using Genetic Algorithm (GA). Procedia Technology, 10, 131-137.
  11. Rhoads, G. B. (2007). “Video Steganography”.U.S. Patent No. 7,242,790. Washington, DC: U.S. Patent and Trademark Office.
  12. Zhou, X., & Tang, X. (2011, August). Research and implementation of RSA algorithm for encryption and decryption. In Strategic Technology (IFOST), 2011 6th International Forum on (Vol. 2, pp. 1118-1121). IEEE.
  13. Ren, W., & Miao, Z. (2010, May). A hybrid encryption algorithm based on DES and RSA in Bluetooth communication. In Modeling, Simulation and Visualization Methods (WMSVM), 2010 Second International Conference on (pp. 221-225). IEEE.
  14. Sarmah, D. K., & Bajpai, N. (2010). A new horizon in data security by Cryptography & Steganography. IJCSIT) International Journal of Computer Science and Information Technologies, 1(4), 212-220.
  15. Kaur, R. and Singh, T. (2015). Hiding Data in Video Sequences using LSB with Elliptic Curve Cryptography. International Journal of Computer Applications (0975 – 8887) Volume 117 – No. 18
  16. Singh, K.U. (2014) Video Steganography: Text Hiding In Video By LSB Substitution. International Journal of Engineering Research and Applications. ISSN : 2248-9622, Vol. 4, Issue 5( Version 1), pp.105-108
  17. Basheer, R & Safiya M.K (2014).Video data hiding in selective pixels of forbidden zone using mapping function. International Journal of Advanced Computer Technology (IJACT).ISSN:2319-7900.
  18. Apau, R., Hayfron-Acquah, J.B., and Twum, F. (June 2016). Enhancing Data Security using Video Steganography, RSA and Huffman Code Algorithms with LSB Insertion. International Journal of Computer Applications, 143 (4), 28-36.
Index Terms

Computer Science
Information Sciences

Keywords

MSE PSNR LSB Stego Video Encryption Data Hiding.