INFORMATION CHANGE THE WORLD

International Journal of Image, Graphics and Signal Processing(IJIGSP)

ISSN: 2074-9074 (Print), ISSN: 2074-9082 (Online)

Published By: MECS Press

IJIGSP Vol.12, No.1, Feb. 2020

Secure Data Transmission in Video Format Based on LSB and Huffman Coding

Full Text (PDF, 914KB), PP.10-17


Views:0   Downloads:0

Author(s)

Shwe Sin Myat Than

Index Terms

Bit Data;Cryptography;Huffman Chunk Coding;LSB (Least significant bit);Video Steganography

Abstract

The growth of needing to transmit bit amount of data through the internet in secure format encourage the research for steganography technique, especially in video file. Stenographic technics in video format gives many advantages to transportation of important data because video files are a part of people’s daily life and the attackers can’t notice easily. The high embedding capacity of video file improves the popularity of video steganography among the various media types. Therefore, the simplest form but with many advantage of (Least significant bit) LSB, that is enforced with the high compression method of Huffman chunk coding method is proposed in this paper to embed data in video file in multi-step cryptography embedding schemes. The intension is to get more secure nature of the system and to get more embedding capacity system. The experiments are carried out with various sizes of video files and text file sizes are used to show the effectiveness of the proposed methods. The results manifest superior performance for proposed algorithm with the performance parameters like Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE) and Bit Error Rate (BER) are calculated to test the quality of stego video.

Cite This Paper

Shwe Sin Myat Than, " Secure Data Transmission in Video Format Based on LSB and Huffman Coding", International Journal of Image, Graphics and Signal Processing(IJIGSP), Vol.12, No.1, pp. 10-17, 2020.DOI: 10.5815/ijigsp.2020.01.02

Reference

[1]K. Rajalakshmi and K. Mahesh, “Robust secure video steganography using reversible patch-wise code-based embedding”, Springer Science+Business Media, LLC, part of Springer Nature 2018

[2]Mohammed Mahdi Hashim, Mohd Shafry Mohd Rahim, Fadil Abass Johi , Mustafa Sabah Taha, Hassan Salman Hamad, “Performance evaluation measurement of image steganography techniques with analysis of LSB based on variation image formats”, International Journal of Engineering & Technology, 3505-3514, 7 (4) (2018) 

[3]K. Rajalakshmi and Dr. K. Mahesh, “Video Steganography Based on Embedding THE Video Using PCF Technique”, International Conference on Information , Communication & Embedded Systems (ICICES 2017)

[4]Abhinav Thakur, Harbinder Singh and Shikha Sharda, “Different Techniques of Image and Video Steganography: A Review”, International Journal of Electronics and Electrical Engineering, Volume-2, Issue-2, 2015 

[5]M. Bashardoost, G. B. Sulong, and P. Gerami, “Enhanced LSB image Steganography method by using knight Tour algorithm, Vigenere Encryption and LZW compression”, IJCSI International Journal of Computer Science Issues, Vol.10, No.2, pp.221-227, 2013

[6]M. Dixit, N. Bhide, S. Khankhoje, R. Ukarande, “Video Steganography”, 2015 International Conference on Pervasive Computing (ICPC -2015), Pune, India,  8-10 January 2015.

[7]Sudeepa K B, Raju K, Ranjan Jumar H S and Ganesh Aithal, “A New Approach for Video Steganography Based on Randomization and Parallelization”, International Conference on Information Security and Privacy (ICISP2015), 11-12 December, 2015, Nagpur, India, Procedia Computer Science 78, 483 – 490 ( 2016 ) 

[8]Anamika Saini, Kamaldeep Joshi, Kirti Sharma  and Rainu Nandal, , “An Analysis of LSB Technique in Video Steganography using PSNR and MSE”, International Journal of Advanced Research in Computer Science, Volume 8, No. 5, May – June 2017

[9]P. A. S. L. E. Ningsih, G. M. A. Sasmita and N. M. I. M. Mandenni, “MP4 Video Steganography using Least Significant Bit (LSB) Substitution and Advanced Encryption Standard (AES)”, Journal of Theoretical and Applied Information Technology,  Vol.95. No 21, November 15, 2017. 

[10]S. Balu, C. Nelson Kennedy Babu and  K. Amudha, “Secure and efficient data transmission by video steganography in medical imaging system”, Springer Science+Business Media, LLC, part of Springer Nature 2018.

[11]S. Gosalia, S. Shetty and Revathi A.S, “Embedding Audio inside a Digital Video Using LSB Steganography”, 2016 International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi , India, 16-18 March, 2016.

[12]Pooja Yadav1, Nishchol Mishra2, Sanjeev Sharma3, “A Secure Video Steganography with Encryption Based on LSB Technique”, 2013 IEEE International Conference on Computational Intelligence and Computing Research, Madurai, India. 26-28 December 2013. 

[13]V. K. Jha, S. Roy, S. Mukherjee and G. Sanyal, “Video Steganography technique using Factorization and Spiral LSB methods”, 2017 International Conference on Computer, Communications and Electronics (Comptelix), Manipal University Jaipur, Malaviya National Institute of Technology Jaipur & IRISWORLD, July 01-02, 2017

[14]Wa'el Ibrahim A. Al-Mazaydeh, “ Image Steganography using LSB and LSB+Huffman Code”,  International Journal of Computer Applications (0975 – 8887) Volume 99– No.5, August 2014

[15]H. T. Khan,  H. Saleem, “ Improved Image Steganography Algorithm using Huffman Codes”, International Journal of Computer Applications (0975 – 8887) Volume 147 – No.12, August 2016

[16]Li, B., Li, Z., Zhou, S., Tan, S., & Zhang, X. (2018). “New stegoanalytic features for spatial image steganography based on derivative filters and threshold LBP operator”. IEEE Transactions on In-formation Forensics and Security, 13(5), 1242-1257. https://doi.org/10.1109/TIFS.2017.2780805. 

[17]Zhang, Y., Qin, C., Zhang, W., Liu, F., & Luo, X., “On the fault-tolerant performance for a class of robust image steganography”,Signal Processing, 146, 99-111. 8-10 January 2018, https://doi.org/10.1016/j.sigpro.2018.01.011. 

[18]S. Mahato, D. A. Khan and D. K. Yadav, “A modified approach to data hiding in Microsoft Word documents by change-tracking technique”, Journal of King Saud University – Computer and Information Sciences (2017) 

[19]matlab documentation, https://uk.mathworks.com/ help/comm/ug/huffman-coding-1.html, last view at July, 2019

[20]R. Singh et al. (eds.), “A Highly Secure Video Steganography Inside DWT Domain Hinged on BCD Codes”, Intelligent Communication, Control and Devices, Advances in Intelligent Systems and Computing 624, Springer Nature Singapore Pte Ltd. 2018, https://doi.org/10.1007/978-981-10-5903-2_74

[21]“Bit error rate”, https://en.wikipedia.org/wiki/ Bit_error_rate, last view at July, 2019