Innovative Data Hiding Security Model Using Forensic Audio Video Crypto-Steganography

Secret information concealing using steganography is simple but to maintain its security, perceptibility, robustness, embedding capacity and good recovery of both cover as well as secret information are the major issues. In this paper we have applied Block Plane Coding Technique (BPCT) for concealing the secret data into the randomly obtained frames of video and Least Significant Bit (LSB) algorithm for audio of same video. We have obtained the key security parameters like Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), Normalize Cross Correlation Factor (NCCF), Bit Error Rate (BER), histogram and spectrograph before embedding and after recovering the protected data from stego video using forensic technique to increase the data security. Moreover, the proposed scheme provides a large hiding capacity, more security for secret data and good visual recovery of both secret data and original video than any other existing methods. Through many attack during transmission on stego video, it is found that the suggested approach is more robust than any other existing methods.

[1]  Rosanne English Comparison of high capacity steganography techniques , 2010, 2010 International Conference of Soft Computing and Pattern Recognition.

[2]  Siti Zaiton Mohd Hashim,et al.  A robust video watermarking technique for the tamper detection of surveillance systems , 2015, Multimedia Tools and Applications.

[3]  Roman V. Yampolskiy,et al.  Steganography and Visual Cryptography in Computer Forensics , 2010, 2010 Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering.

[4]  Hamdy M. Kelash,et al.  Hiding data in video sequences using steganography algorithms , 2013, 2013 International Conference on ICT Convergence (ICTC).

[5]  Mircea Vladutiu,et al.  Decreasing Change Impact Using Smart LSB Pixel Mapping and Data Rearrangement , 2011, 2011 IEEE 11th International Conference on Computer and Information Technology.

[6]  K.R. Venugopal,et al.  Authentication of secret information in image Steganography , 2008, TENCON 2008 - 2008 IEEE Region 10 Conference.

[7]  Sunil K. Moon,et al.  Analysis of secured video steganography using computer forensics technique for enhance data security , 2013, 2013 IEEE Second International Conference on Image Information Processing (ICIIP-2013).

[8]  Amal Said Khalifa,et al.  Video steganography: a comprehensive review , 2015, Multimedia Tools and Applications.

[9]  S. P. Bansod,et al.  Modified BPCS steganography using Hybrid cryptography for improving data embedding capacity , 2012, 2012 International Conference on Communication, Information & Computing Technology (ICCICT).

[10]  Gandharba Swain,et al.  LSB Array Based Image Steganography Technique by Exploring the Four Least Significant Bits , 2011 .

[11]  Vijay H. Mankar,et al.  Current status and key issues in image steganography: A survey , 2014, Comput. Sci. Rev..

[12]  Kulbir Singh,et al.  Data Hiding Algorithm for Images Using Discrete Wavelet Transform and Arnold Transform , 2017, J. Inf. Process. Syst..

[13]  Cheng-Hsing Yang,et al.  Anti-Forensics with Steganographic Data Embedding in Digital Images , 2011, IEEE Journal on Selected Areas in Communications.

[14]  Nidal Nasser,et al.  An audio/video crypto — Adaptive optical steganography technique , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).

[15]  Gautam Sanyal,et al.  Pixel mapping method (PMM) based bit plane complexity segmentation (BPCS) steganography , 2011, 2011 World Congress on Information and Communication Technologies.

[16]  Zhaohui Li,et al.  A technique of improved steganography text based on chaos and BPCS , 2010, 2010 2nd International Conference on Advanced Computer Control.