INFORMATION CHANGE THE WORLD

International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)

Published By: MECS Press

IJCNIS Vol.13, No.2, Apr. 2021

A Novel Secure Data Hiding Technique into Video Sequences Using RVIHS

Full Text (PDF, 1203KB), PP.53-65


Views:4   Downloads:1

Author(s)

Vinay D R, Ananda Babu J

Index Terms

RVIH;SVM;MSE;2D-Logistic Map;3D Lorenz map;chaotic map

Abstract

Most of the present hiding techniques on video are considered over plaintext domain and plain video sequences are used to embed information bits. The work presented here reveals the novelty for information embedding in a video sequence over the ciphered domain. The carrier video signal is encrypted using chaos technique which uses multiple chaotic maps for encryption. The proposed reversible video information hiding scheme (RVIHS) exhibits an innovative property that, at the decoding side we can perfectly extract the information along with carrier video without any distortion. The public key modulation is a mechanism used to achieve data embedding, where as in secret key encryption is not required. The proposed approach is used to differentiate encoded and non-encoded picture patches at decoder end by implementing 2 class Support Vector Machine grouping. This helps for us to retrieve the original visual sequence with embedded message and to scale up embedding capacity. The experiment is conducted using real time videos for embedding the information. The outcome of proposed work bring about best embedding capacity, compared to existing techniques.

Cite This Paper

Vinay D R, Ananda Babu J, "A Novel Secure Data Hiding Technique into Video Sequences Using RVIHS", International Journal of Computer Network and Information Security(IJCNIS), Vol.13, No.2, pp.53-65, 2021. DOI: 10.5815/ijcnis.2021.02.05

Reference

[1]Dawen Xu, Rangding Wang, Yani Zhu, “Tunable data hiding in partially encrypted H.264/AVC videos”, Journal of Visual Communication and Image Representation, Vol. 45, pp.34-45,2017. DOI: 10.1016/j.jvcir.2017.02.008.

[2]D.W. Xu, R.D. Wang, “Context adaptive binary arithmetic coding-based data hiding in partially encrypted H.264/AVC videos”, Journal of Electronic Imaging, Vol.24,No.3,pp. ,2015. DOI: 10.1117/1.JEI.24.3.03

[3]Lakshmi M, Arjun K P, Sreenarayanan N M, Arya K A, “Reversible Data Hiding in Videos for Better Visibility and Minimal Transfer”, Procedia Technology”, Vol.25,pp.256-263, 2016. DOI: 10.1016/j.protcy.2016.08.105.

[4]S. Manisha, T. Sree Sharmila, “A two-level secure data hiding algorithm for video steganography”, “Multidimensional Systems and Signal Processing”, Vol.30,pp. 529–542,2018.DOI: 10.1007/s11045-018-0568-2.

[5]Sunanda Jana, Arnab Kumar Maji, Rajat Kumar Pal,”A novel SPN‐based video steganographic scheme using Sudoku puzzle for secured data hiding”,Innovations in Systems and Software Engineering,Vol.15,pp.65–73,2019, 10.1007/s11334-019-00324-8.

[6]Arash Jalali, Hassan Farsi,”A new steganography algorithm based on video sparse representation”, Multimedia Tools and Applications, Vol.79, No.6,2020,DOI: 10.1007/s11042-019-08233-5.

[7]Hassan Farsi,”Improvement of minimum tracking in Minimum Statistics noise estimation method”, Signal Processing: An International Journal (SPIJ), Vol.4,No.1,pp.17-22,2010. 

[8]Mstafa RJ, Elleithy KM, “A novel video steganography algorithm in DCT domain based on hamming and BCH codes”, IEEE, pp.208–213,2016. DOI: 10.1109/SARNOF.2016.7846757. 

[9]Rajesh GR, Nargunam AS, “Steganography algorithm based on discrete cosine transform for data embedding into raw video streams”, IET Chennai Fourth International Conference on Sustainable Energy and Intelligent Systems (SEISCON), Chennai, pp 554–558,2013. 

[10]Yadav P, Mishra N, Sharma S,”A secure video steganography with encryption based on LSB technique”, IEEE International Conference on Computational Intelligence and Computing Research,pp.1–5,2013. DOI: 10.1109/ICCIC.2013.6724212.

[11]Shuvendu Rana, Rohit Kamra, Arijit Sur,”Motion vector based video steganography using homogeneous block selection”,Multimedia Tools and Applications,Vol.79,No.3,pp.1-16,2020. DOI:10.1007/s11042-019-08525.

[12]Alharthi N, Gutub A,”Data visualization to explore improving decision- making within hajj services”,Scientific Modelling and Research, Vol.2,No.1,pp.9–18,2017. DOI: 10.20448/808.2.1.9.18

[13]Rajeev Kumar, Satish Chand, Samayveer Singh,”An optimal high capacity reversible data hiding scheme using move to front coding for LZW codes”, Multimedia Tools and Applications,Vol.78,No.10,2019. DOI: 10.1007/s11042-019-7640-2

[14]Yi Chen, Hongxia Wang, Hanzhou Wu, Yong Liu,”Reversible video data hiding using zero QDCT coefficient-pairs”,Vol.78,pp.23097–23115,2019. DOI: 10.1007/s11042-019-7635-z

[15]Weiqing Wang,”An efficient multiple-bit reversible data hiding scheme without shifting”,Multimedia Tools and Applications, Vol.79, pp.555–579,2020. DOI: 10.1007/s11042-019-08065-3

[16]Jafar IF et al,”An efficient reversible data hiding algorithm using two steganographic images”, Signal Processing,Vol.128,p.98-109,2016. DOI: 10.1016/j.sigpro.2016.03.023

[17]Chang JC, Lu YZ, Wu HL (2017) “A separable reversible data hiding scheme for encrypted JPEG bit streams”, Signal Processing,Vol.133,pp.135–143,2017. DOI:10.1016/j.sigpro.2016.11.003

[18]S. Manisha, T. Sree Sharmila,”A two-level secure data hiding algorithm for video steganography”,Multidimensional Systems and Signal Processing,Vol.30,No.1,2019.DOI: 10.1007/s11045-018-0568-2.

[19]Tarun Kumar, Shikha Chauhan, “Image Cryptography with Matrix Array Symmetric Key using Chaos based Approach”, I. J. Computer Network and Information Security, 2018

[20]Gat Pooja Rajkumar, Dr V. S. Malemath, “Video Steganography: Secure Data Hiding Technique”, I. J. Computer Network and Information Security, 2017.

[21]Sengul Dogan, “A New Approach for Data Hiding based on Pixel Pairs and Chaotic Map”, I. J. Computer Network and Information Security, 2018.

[22]Rosalina, Nur Hadisukmana, ” An Approach of Securing Data using Combined Cryptography and Steganography”, International  Journal  of  Mathematical Sciences and Computing (IJMCS), Vol.6, No.1, pp. 1-9, 2020. DOI: 10.5815/ijmsc.2020.01.01

[23]Sonia Bajaj, Manshi Shukla, “Performance Evaluation of an approach for Secret data transfer using interpolation and LSB substitution with Watermarking, “International Journal of Computer Science and Information Technologies(IJCSIT),Vol.5,pp.6213-6217,2014.

[24]E Divya,P Raj Kumar,“Steganographic Data Hiding using Modified APSO”, International Journal of Intelligent systems and Applications(IJISA),Vol.8,No.7,pp.37-55,2016.DOI: 10.5815/ijisa.2016.07.04

[25]Ravpreet Kaur,Manish Mahajan,"Random Pattern based sequential bit RaP-SeB) Steganography with Cryptography for Video Embedding", International Journal of Modern Education and Computer Science(IJMECS),Vol.8,No.9, pp.51-59,2016. DOI: 10.5815/ijmecs.2016.09.07