Secure Data Transmission of Video Steganography Using Arnold Scrambling and DWT

Full Text (PDF, 523KB), PP.45-53

Views: 0 Downloads: 0

Author(s)

Hnin Lai Nyo 1,* Aye Wai Oo 1

1. University of Technology (Yatanarpon Cyber City), Pyin Oo Lwin, Myanmar

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2019.06.06

Received: 27 Mar. 2019 / Revised: 18 Apr. 2019 / Accepted: 24 Apr. 2019 / Published: 8 Jun. 2019

Index Terms

Security, Cryptography, Steganography, Arnold Scrambling, DWT

Abstract

For the sensitive information, the best privacy demand must be supported in commercial, technical and legal regulations. In this system we used combination of steganography and cryptography techniques in order to improve imperceptibility, robustness, payload capacity and to transmit data securely. As the preprocessing step, Arnold scrambling and discrete wavelet transform (DWT) techniques are used over the secret image. Then the referable values are calculated from the values of transformed secret image with the use of a secret key and embed these referable values in the video file by least significant bit (LSB) technique. Moreover, the secret key is encrypted with a pre-shared key by a new stream cipher Twisted Exchange Algorithm. And the result encrypted message is embedded behind the audio file by Parity coding technique. As the experimental results, performance of the system is tested with different real time images and various video quality files and measured by different parameters (PSNR, MSE), then it is also analyzed with attacks.

Cite This Paper

Hnin Lai Nyo, Aye Wai Oo, "Secure Data Transmission of Video Steganography Using Arnold Scrambling and DWT", International Journal of Computer Network and Information Security(IJCNIS), Vol.11, No.6, pp.45-53, 2019. DOI:10.5815/ijcnis.2019.06.06

Reference

[1]Ashawq T. Hashim, Dr. Yossra H. Alii & Susan S. Ghazoul, “Developed Method of Information Hiding in Video AVI File Based on Hybrid Encryption and Steganography”, Eng. & Tech. Journal, Vol.29, No.2, 2011
[2]Praveen. P and Arun. R, “Audio-Video Crypto Steganography Using LSB substitution and advanced chaotic algorithm”, International Journal of Engineering Inventions, e-ISSN: 2278-7461, p-ISSN: 2319-6491, Volume 4, Issue 2 (August 2014)
[3]Sadik Sli AI-Taweel, M. Husain AI-Hada and Ahmed Mahmoud Nasser, “Image in image Steganography Technique based on Arnold Transform and LSB Algorithms”, International Journal of Computer Applications (0975-8887), Volume 181- No.10, August 2018
[4]Sghaier Guizani and Nidal Nasser, “ An Audio/Video Crypto- Adaptive Optical Steganography Technique”, 978-1-4577-1379-8/12/$26.00c2012 IEEE
[5]Prof. D.J.Bonde and et al, “ Application of Data hiding using Anti-Forensic Technique”, International Research Journal of Engineering and Technology (IRJET), e-ISSN: 2395-0056, p- 2395-0072, Volume:03, Issue:03,Mar-2016
[6]Rambabu Mudusu, A. Nagesh, M. Sdanandam,” Enhancing Data Security Using Audio-Video Steganography”, International Journal of Engineering & Technology. 7(2.20) (2018) 276-279
[7]K.Parvathi Divya and K. mahesh, “Various Techniques in Video Steganography- A Review”, International Journal of Computer & Organization Trends- Volume 4 Issue 1 January to February 2014.
[8]Jayaram P and et al, “Information Hiding Using Audio Steganography-A Survey”,The International Journal of Multimedia & Its Applications (IJMA) Vol.3, No.3, August 2011
[9]MSU video quality measurement tool, Availabe:http://www.compression.ru/video/quality_measure/vqmt_pro.html
[10]Majid Bakhtiari and Mohd Aizaini Maarof, “An Efficient Stream Cipher Algorithm for Data Encryption”, IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 3, No.1, May 2011, ISSN (Online): 1694-0814.
[11]Pritish Bhautmage, Prof. Amutha Jeyakumar, Ashish Dahatonde, ”Advanced Video Steganography Algorithm”, International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622, Vol.3, Issue 1, January-February 2013, pp.1641-1644
[12]Anita Pradhan and et al, ‘Performance Evaluation Parameters of Image Steganography Techniques’, International Conference on Research Advances in Integrated Navigation System (RAINS-2016), April 06-07, R. I. Jalappa Institute of Technology, Doddaballapur, banglore, India.
[13]Abhinav Thakur, Harbinder Singh and Shikha Sharda, ‘ Secure Video Steganography based on Discrete Wavelet Transform and Arnold Transform’, International Journal of Computer Application (0975-8887), Volume 123-No.11, August 2015
[14]Madhuri R. Shende, Prof. Amit Welkar and Prof. S.V. Wajurkar Nagpur, ‘Advanced Steganography for Hiding Data and Image using Audio-Video’, International Conference on Modern Trends in Engineering Science and Technology (ICMITST 2016), Volume 2, Issue 5, ISSN 2454-4248, 24-30
[15]Olatunde Yusuf Owolabi, P.B. Shols and Muhammed Besiru Jibrin, ‘ Improved Data Security System Using Hybrid Cryptosystem’, 2017 IJSRSET, Volume 3, Issue 3, Print ISSN: 2395-1990, Online ISSN 2394-4099
[16]Daniyal M. Alghazzawi, Syed Hamid Hasan and Mohamed Salim Trigui,’ Stream Ciphers: A Comparative Study of Attacks and Structures’, International Journal of Computer Applications (0975-8887), Volume 83-No1, December 2013
[17]Tarik Idbeaa, Salina Abdul Samad and Hafizah Husain, ‘A Secure and Robust Compressed Domain Video Steganography for Intra- and Inter- Frames Using Embedded –Based Byte Differencing (EBBD) Scheme’, PLoS ONE 11(3):e0150732. Doi:10.1371/ journal.pone.0150732, March 10, 2016