Video Steganography : Hiding Secret Video insideCover Video Using LSB Algorithm

Dhananjay M.Dumbere*, Nitin J.Janwe**
* Assistant Professor, Department of Computer Science and Engineering, Rajiv Gandhi College of Engineering, Chandrapur, India
** Associate Professor & HOD, Department of Computer Technology, Rajiv Gandhi College of Engineering, Chandrapur, India.
Periodicity:March - May'2014
DOI : https://doi.org/10.26634/jcom.2.1.2846

Abstract

The huge development of computer science, escorted by another vast development in the hiding techniques, has created great possibilities, in which it is difficult to break traditional techniques. Those techniques were classified depending on the method of embedding like inserting, replacing or exchanging the positions. In this paper, a data (video) hiding scheme by simple LSB substitution is proposed so as to hide complete secret video inside cover video. Both secret video and cover video is segmented into frames, which is a three dimensional image of RGB (Red-Green-Blue) type and each frame of secret video is embedded with each frame of cover video, resulting in complete secret video hiding (Stego-Video). The proposed algorithm followed in this research paper led to get a video segment in which it is difficult to find the embedded video within.

Keywords

Video Hiding, Secret Video, Cover Video, LSB (Least Significant Bit) Substitution, Stego-Video. Most Significant Bit (MSB).

How to Cite this Article?

Dumbere, D.M., and Janwe, N.J. (2014). Video Steganography: Hiding Secret Video inside Cover Video Using LSB Algorithm. i-manager’s Journal on Computer Science, 2(1), 13-18. https://doi.org/10.26634/jcom.2.1.2846

References

[1]. Anderson, R.J., and Petitcolas F.A.P., (1998). “On the Limits of Steganography,” Journal on Selected Areas in Comm., Vol. 16, No. 4, pp. 474–481.
[2]. Petitcolas F.A.P., Anderson, R.J, and Kuhn, M.G, (1999). “InformationHiding—A Survey,” Proc. IEEE, Vol. 87, No. 7, pp. 1062–1078.
[3]. Fridrich, J., and Goljan, M., (2002). “Practical Steganalysis—Stateof the Art,” Proc. SPIE Photonics Imaging, Security and Watermarking of Multimedia Contents, Vol. 4675, SPIE Press, pp. 1–13.
[4]. Chen, B. and Wornell, G.W. (2001). Quantization Index Modulation: “A Class of Provably Good Methods for Digital Watermarking and Information Embedding,” IEEE Trans. Information Theory, Vol. 47, No. 4, pp.1423–1443.
[5]. Johnson, N.F. and Jajodia, S., (1998). “Exploring Steganography: Seeing the Unseen,” Computer, Vol. 31, No. 2, pp.26–34.
[6]. Kerckhoffs, A., “La Cryptographie Militaire (Military Cryptography),” Journal on Sciences Militaires (J. Military Science, inFrench).
[7]. Robert., K,. Steganography and steganalysis.
[8]. Udit Budhiaa, Deepa Kundura. “Digital video steganalysis exploiting collusion sensitivity”.
[9]. Katzenbeisser, Petitcolas, “Information Hiding Techniques for Steganography and Digital Watermarking”.
[10]. Jacokes, B., Kodysh,Y., Lisy, A., “Audio Steganography”.
[11]. Brainos, A.C., II. “A Study of Steganography and the Art of Hiding Information”.
[12]. Ahsan, K. & Kundur, D., (2002). “Practical Data hiding in TCP/IP”, Proceedings of the Workshop on Multimedia Security at ACM Multimedia.
[13]. Handel, T. & Sandford, M., (1996). “Hiding data in the OS network model”, Proceedings of the 1st International Workshop on Information Hiding.
[14]. Chan, C.K., Cheng, L.M., (2004). “Hiding data in images by simple LSB substitution”. Pattern Recognition, 37, 469–474.
[15]. Sharp, T. (2001). “An implementation of key-based digital signal steganography,” in Proc. Information Hiding Workshop, Vol. 2137, Springer LNCS, pp. 13–26.
[16]. Chandramouli, R. and Memon, N., (2001). "Analysis of LSB Based Image Steganography Techniques", IEEE.
[17]. Johnson, N. F., Katzenbeisser, S.C., “A survey of steganography technique.”
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.