A two-level secure data hiding algorithm for video steganography

Sensitive data is exchanged frequently through wired or wireless communication that are vulnerable to unauthorized interception. Cryptography is a solution to overcome this issue, but once decrypted the information secrecy does not exist. Apart from hiding data in an image, it can be extended for digital media. In this work, data hiding and extraction is proposed for Audio Video Interleave videos, that embeds the image in Bitmap Image File, that has the secret information in a frame of the video by segmenting the bytes of the secret image and placing them in the video frame providing a higher level of encryption. This novel method provides a two level encryption, thus to decipher the data, the way in which the secret image is originally decomposed and the frame in which it is embedded should be known. The quality of the secret image embedded and the size of the video is not altered before and after encryption of the secret data. The secret image may contain any multimedia data that can be further extracted and recognized.

[1]  Z. Jane Wang,et al.  A Sparse Representation-Based Wavelet Domain Speech Steganography Method , 2015, IEEE/ACM Transactions on Audio, Speech, and Language Processing.

[2]  V. Thakur,et al.  Hiding secret image in video , 2013, 2013 International Conference on Intelligent Systems and Signal Processing (ISSP).

[3]  Kemal Tütüncü,et al.  Comparison of LSB image steganography technique in different color spaces , 2017, 2017 International Artificial Intelligence and Data Processing Symposium (IDAP).

[4]  Wojciech Mazurczyk,et al.  Steganography in Modern Smartphones and Mitigation Techniques , 2014, IEEE Communications Surveys & Tutorials.

[5]  Kuo-Chen Wu,et al.  Steganography Using Reversible Texture Synthesis , 2015, IEEE Transactions on Image Processing.

[6]  Rupali Bhardwaj,et al.  Image Steganography Based on Complemented Message and Inverted Bit LSB Substitution , 2016 .

[7]  T. Sree Sharmila,et al.  Text frame classification and recognition using segmentation technique , 2016, 2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT).

[8]  Yun Q. Shi,et al.  Uniform Embedding for Efficient JPEG Steganography , 2014, IEEE Transactions on Information Forensics and Security.

[9]  Nicolas Tsapatsoulis,et al.  Remote Authentication via Biometrics: A Robust Video-Object Steganographic Mechanism Over Wireless Networks , 2016, IEEE Transactions on Emerging Topics in Computing.

[10]  Mohammad Ali Akhaee,et al.  One-third probability embedding: a new ±1 histogram compensating image least significant bit steganography scheme , 2014, IET Image Process..

[11]  Bin Li,et al.  Investigation on Cost Assignment in Spatial Image Steganography , 2014, IEEE Transactions on Information Forensics and Security.

[12]  Wojciech Mazurczyk,et al.  Information Hiding as a Challenge for Malware Detection , 2015, IEEE Security & Privacy.