Chaos-based video steganography

In this paper a novel data hiding method has been proposed which is based on Non-Linear Feedback Shift Register and Tinkerbell 2D chaotic map. So far, the major work in Steganography using chaotic map has been confined to image steganography where significant restrictions are there to increase payload. In our work, 2D chaotic map and NLFSR are used to developed a video steganography mechanism where data will be embedded in the segregated frames. This will increase the data hiding limit exponentially. Also, embedding position of each frame will be different from others frames which will increase the overall security of the proposed mechanism. We have achieved this randomized data hiding points by using a chaotic map. Basically, Chaotic theory which is non-linear dynamics physics is using in this era in the field of Cryptography and Steganography and because of this theory, little bit changes in initial condition makes the output totally different. So, it is very hard to get embedding position of data without knowing the initial value of the chaotic map.

[1]  Hyoung Joong Kim,et al.  An Efficient Embedder for BCH Coding for Steganography , 2012, IEEE Transactions on Information Theory.

[2]  Hamdy M. Kelash,et al.  Hiding data in video sequences using steganography algorithms , 2013, 2013 International Conference on ICT Convergence (ICTC).

[3]  Baby Bhattacharya,et al.  An Improved DNA Based Dual Cover Steganography , 2015 .

[4]  Bhaskar Biswas,et al.  Study of NLFSR and Reasonable Security Improvement on Trivium Cipher , 2015 .

[5]  S. El-Rabaie,et al.  High security data hiding using image cropping and LSB least significant bit steganography , 2016, 2016 4th IEEE International Colloquium on Information Science and Technology (CiSt).

[6]  Guanrong Chen,et al.  Chaos-Based Encryption for Digital Images and Videos , 2004 .

[7]  Mritha Ramalingam,et al.  Stego Machine – Video Steganography using Modified LSB Algorithm , 2011 .

[8]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems Breaking the Steganographic Utilities EzStego , Jsteg , Steganos , and STools — and Some Lessons Learned , 2000 .

[9]  Hong Zhang,et al.  Video Steganography Based on Optimized Motion Estimation Perturbation , 2015, IH&MMSec.

[10]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[11]  K. Anusudha,et al.  An efficient reversible data hiding technique in encrypted images based on chaotic map , 2015, 2015 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT).

[12]  Md. Ismail Hossain,et al.  A new approach for LSB based image steganography using secret key , 2011, 14th International Conference on Computer and Information Technology (ICCIT 2011).

[13]  Zhong Wei-Dong,et al.  A novel steganography algorithm based on motion vector and matrix encoding , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[14]  D. Levicky,et al.  A novel JPEG steganography method secure against histogram steganalysis , 2012, Proceedings ELMAR-2012.

[15]  Yuewei Dai,et al.  An Adaptive Matrix Embedding for Image Steganography , 2011, 2011 Third International Conference on Multimedia Information Networking and Security.

[16]  Laiha Binti Mat Kiah,et al.  High Rate Video Streaming Steganography , 2009, 2009 International Conference on Information Management and Engineering.

[17]  Sung Wook Baik,et al.  A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image , 2015, Multimedia Tools and Applications.

[18]  R. N. Awale,et al.  Statistical Steganalysis of High Capacity Image Steganography with Cryptography , 2016 .

[19]  Prasenjit Das,et al.  A DNA based image steganography using 2D chaotic map , 2014, 2014 International Conference on Electronics and Communication Systems (ICECS).

[20]  Yu-Chee Tseng,et al.  Data Hiding in 2-Color Images , 2002, IEEE Trans. Computers.