A Hybrid Approach For Video Steganography Using Edge Detection and Identical Match Techniques
A Hybrid Approach For Video Steganography Using Edge Detection and Identical Match Techniques
A Hybrid Approach For Video Steganography Using Edge Detection and Identical Match Techniques
I. INTRODUCTION
Nowadays security of private information is a major issue
over the internet. Because in todays digitized world, the
whole communication is done through internet and
transferring private data from one end to another using various
applications such as e-mails, chats, etc. but there is main issue
that is how to protect our confidential information from
hackers or cyber criminals over internet. To solve such
problems and to maintain the security of data, we should
follow a algorithm which should not only encrypt the data into
another form but also hides its presence and video
steganography helps to provide such a secure environment
over internet. To protect the private information from being
misused by the attackers and to overcome the alteration of
information, a novel data hiding approach is used.
Steganography is one of the best information hiding technique,
which hides the presence of secret message behind a
multimedia file without changing the perceptual quality of
c
978-1-4673-9338-6/16/$31.00 2016
IEEE
896
This full-text paper was peer-reviewed and accepted to be presented at the IEEE WiSPNET 2016 conference.
897
This full-text paper was peer-reviewed and accepted to be presented at the IEEE WiSPNET 2016 conference.
Slab-size =
(1)
x
x
x
x
x
x
F1 = Secret-Key(d1) + Secret-Key(d2);
F2 = Secret-Key(d3) +Secret-Key(d4);
..
F10 = Secret-Key(d11) + Secret-Key(d12);
Where, d1,d2,d3,d4,d5,d6,d7,d8,d9,d10,d11,d12 are the
secret key digits ACSII values and F1to F10 are the
selected random and dynamic frames for hiding the
secret message bits. [12]
Enter text secret message (.txt) and encrypt it using
RSA algorithm.
Detect edges of selected frames using canny edge
operator as shown in Fig.5.
Hide secret key, selected frames addresses and
message length in RED (R), GREEN (G), BLUE (B)
components of first fixed frame respectively.
Now, Hide 4 bits of secret message in places of edge
pixels and non edge pixels using 4LSB substitution in
blue layer and 7pair based identical match technique
respectively.
In 7 pair identical match technique; firstly we will
check identical pair of secret message bits from 7 pair
identical values of bits in video frame pixels. If there
is existence of identical pair bits in non edge pixels
then we will note bit position in raw table. Otherwise
hide bits using 2LSB technique. Here we are hiding 2
bits in green and red layer each.
Compute quality metrics for all selected frames such
as MSE, PSNR, BER and histogram analysis.
Recombine, all the frames to generate a stego video
file and transfer it over network using any
communication media such as e-mail etc.
898
This full-text paper was peer-reviewed and accepted to be presented at the IEEE WiSPNET 2016 conference.
Pre-Processing (Fragmentation of
Video)
Embedding Process
Fig. 1. Selected Video Frame, Edge of Frame and Stego Frame
Edge
Pixels
Non-Edge
Pixels
Using 4 LSB
Substitution
Using Identical
Match Technique
Extraction Process
Select
ed
Fram
es
Edge
Detectio
n Using
Canny
Edge
Detector
Edg
e- G
OR
Operat
or
(|)
Edg
e-B
EdgedFrames
899
This full-text paper was peer-reviewed and accepted to be presented at the IEEE WiSPNET 2016 conference.
Previous Work
Proposed Work
MSE
PSNR(db)
BER
MSE
PSNR(
db)
BER
9.3361
e-004
0.0124
78.44
0.0127
96.98
0.0104
67.19
0.0149
3.2976
e-005
0.0051
75.11
0.0134
0.0249
64.17
0.0156
0.0108
71.65
0.0141
0.0996
58.15
0.0172
0.0547
63.45
0.0159
0.1986
55.15
0.0181
0.1337
57.92
0.0173
ERROR
Capacity
Exceeded
ERROR
ERRO
R
0.2987
53.55
0.0173
ACKNOWLEDGMENT
The authors would like to thank to the previous work
for proposing different mechanisms for video steganography
which contributes a lot for work made in this paper. All work
done in this paper will surely help to the new researchers for
doing future work in video steganography field.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
900