Application of data hiding in audio-video using anti forensics technique for authentication and data security

Steganography is the method of hiding any secret information like password, text, and image, audio behind original cover file. In this paper we proposed the audio-video cryptosteganography which is the combination of image steganography and audio steganography using computer forensics technique as a tool for authentication. Our aim is to hide secret information behind image and audio of video file. As video is the application of many still frames of images and audio, we can select any frame of video and audio for hiding our secret data. Suitable algorithm such as 4LSB is used for image steganography and phase coding algorithm for audio steganography. Suitable parameter ofsecurity and authentication like PSNR, histogram are obtained at receiver and transmitter side which are exactly identical, hence data security can be increased. This paper focus the idea of computer forensics technique and its use of video steganography in both investigative and security manner.

[1]  S. K. Jagtap,et al.  Intelligent processing: An approach of audio steganography , 2012, 2012 International Conference on Communication, Information & Computing Technology (ICCICT).

[2]  Karim Abed-Meraim,et al.  A view on latest audio steganography techniques , 2011, 2011 International Conference on Innovations in Information Technology.

[3]  V. Sathya,et al.  Data hiding in audio signal, video signal text and JPEG images , 2012, IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012).

[4]  Sree Narayana,et al.  AUDIO - VIDEO STEGANOGRAPHY USING FORENSIC TECHNIQUEFOR DATA SECURITY , 2014 .

[5]  Cheng-Hsing Yang,et al.  Anti-Forensics with Steganographic Data Embedding in Digital Images , 2011, IEEE Journal on Selected Areas in Communications.

[6]  Roman V. Yampolskiy,et al.  Steganography and Visual Cryptography in Computer Forensics , 2010, 2010 Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering.

[7]  Priyanka Gonnade,et al.  Audio-Video steganography for Authentication and Data Security , 2015 .

[8]  Nidal Nasser,et al.  An audio/video crypto — Adaptive optical steganography technique , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).

[9]  I. Adum Babu,et al.  Application of Data Hiding in Audio -Video Using Anti Forensics Technique for Authentication and data Security , 2015 .

[10]  R.S. Kawitkar,et al.  Data Security Using Data Hiding , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).

[11]  K. J. Ray Liu,et al.  Forensic detection of image manipulation using statistical intrinsic fingerprints , 2010, IEEE Transactions on Information Forensics and Security.

[12]  Hong-Juan Zhang,et al.  Steganalysis of audio: attacking the Steghide , 2005, 2005 International Conference on Machine Learning and Cybernetics.

[13]  M. Pooyan,et al.  LSB-based Audio Steganography Method Based on Lifting Wavelet Transform , 2007, 2007 IEEE International Symposium on Signal Processing and Information Technology.

[14]  K.C. Navada,et al.  Determination of Sequences Responsible for Generation of a Sequence , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).