XOR-EDGE based Video Steganography and Testing against Chi-Square Steganalysis

Full Text (PDF, 629KB), PP.31-39

Views: 0 Downloads: 0

Author(s)

Ramandeep Kaur 1,* Sharanjeet Kaur 1

1. Department of Computer Engineering, CT Group of Institutions, Jalandhar, 144001, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijigsp.2016.09.05

Received: 11 May 2016 / Revised: 2 Jul. 2016 / Accepted: 30 Jul. 2016 / Published: 8 Sep. 2016

Index Terms

Video Steganography, Edge Detector, LSB Substitution, Identical Match, Encryption, Histogram Analysis

Abstract

In this paper, our main aim is to compare different video formats and analyze what will be the effect on quality when we hide same secret message in different type of formats such as RGB color videos, .avi (colored and uncompressed video format), and mp4(colored and compressed video format) using edge detection and 7 pair identical match techniques. . In research work, edge areas are used to hide high capacity of secret data behind a video file. As edges are very sharp in nature and their frequency values are changed continuously, which can't be seen by the human visual system (HVS) due to the low probability of being perceived. The analysis is done on the basis of quality metrics such as PSNR, BER and Histogram Analysis for different format video clips. The Experimental results show that proposed algorithm provides resistance against Chi-square statistical attack and visual attacks. 

Cite This Paper

Ramandeep Kaur, Sharanjeet Kaur,"XOR-EDGE based Video Steganography and Testing against Chi-Square Steganalysis", International Journal of Image, Graphics and Signal Processing(IJIGSP), Vol.8, No.9, pp.31-39, 2016. DOI: 10.5815/ijigsp.2016.09.05

Reference

[1]Ramandeep Kaur, Pooja, and Varsha, "The NonTangible Masking of Confidential Information using Video Steganography", International Journal of Computer Applications (IJCA), Vol.119, No.17, June 2015.

[2]Ramandeep Kaur, Pooja, "XOR Encryption Based Video Steganography", International Journal of Science and Research (IJSR), Vol.4, Issue 11, November 2015.

[3]Sunil. K. Moon, Rajeshree. D. Raut (2013), "Analysis of Secured Video Steganography Using Computer Forensics Technique for Enhance Data Security", IEEE Second International Conference on image information processing (ICIIP- 2013), pg 660-665.

[4]Pooja Yadav, Nishchol Mishra, and Sanjeev Sharma (2013)," A Secure Video Steganography with Encryption Based on LSB Technique", IEEE International Conference on Computational Intelligence and Computing Research.

[5]Geetha C.R., H. D. Giriprakash (2012), "Image Steganography by Variable Embedding and Multiple Edge Detection using Canny Operator", International Journal of Computer Applications (0975 – 888) ,Volume 48, No.16, June.

[6]Sarabjeet Kaur and Sonika Jindal (2013), "Image Steganography using Hybrid Edge Detection and First Component Alteration Technique", International Journal of Hybrid Information Technology Vol.6, No.5, pp.59-66.

[7]Amrinder Singh, Sukhjit Singh (2014), "A Robust Video Watermark Embedding and Extraction Technique Based on Random Frame Selection", IJRIT International Journal of Research in Information Technology, Volume 2, Issue 2, February, pp: 28-37.

[8]Soumyajit Sarkar, Arijit Basu (2014), "Comparison of various Edge Detection Techniques for maximum data hiding using LSB Algorithm", International Journal of Computer Science and Information Technologies, Vol. 5 (3).

[9]Shivani Khosla, Paramjeet Kaur (2014), "Secure Data Hiding Technique Using Video Steganography and Watermarking", International Journal of Computer Applications, Volume 95, No.20, June. 

[10]Mamta Juneja and Parvinder Singh Sandhu (2014), "Improved LSB based Steganography Techniques for Color Images in Spatial Domain", International Journal of Network Security, Vol.16, No.6, pp.452-462, Nov.

[11]Mamta Juneja, Parvinder Singh Sandhu, "A New Approach for Information Hiding in Color Images using Adaptive Steganography and Hybrid Feature Detection with Improved PSNR and Capacity", International Journal of Engineering and Technology (IJET), Vol. 5, No. 2, Apr-May 2013. 

[12]Youssef Bassil (2012), "Image Steganography based on a Parameterized Canny Edge Detection Algorithm", International Journal of Computer Applications, Volume 60– No.4, December.

[13]Arijit Basu, Gaurav Kumar, Soumyajit Sarkar (2014), "A Video Steganography Approach using Random Least Significant Bit Algorithm", International Journal of Science and Research (IJSR), Volume 3 Issue 6, June.

[14]A.Swathi, Dr.S.A.K Jilani (2012), "Video-Steganography by LSB Substitution Using Different Polynomial Equations", International Journal Of Computational Engineering Research, Vol. 2, Issue. 5, September. 

[15]Vijay Kumar Sharma, Vishal Shrivastava (2012), "A steganography algorithm for hiding the image in image improved LSB substitution by minimizing Detection", Journal of Theoretical and Applied Information Technology, Vol. 36 No.1, February.

[16]Wen-Jan Chen, Chin-Chen Chang , T. Hoang Ngan Le (2010) , "High payload steganography mechanism using hybrid edge detector", Expert Systems with Applications, Elsevier (37).

[17]Atallah M. Al-Shatnawi (2012), "A New Method in Image Steganography with Improved Image Quality", Applied Mathematical Sciences, Vol. 6, no. 79, pp .3907 – 3915.

[18]Krishna Nand Chaturvedi, Amit Doeger (2014), "A Novel Approach for Data Hiding using LSB on Edges of a Gray Scale Cover Images", Volume 86 – No 7, January.

[19]K.V.Vinodkumar, V. Lokeswara Reddy (2013), "A Novel Data Embedding Technique for Hiding Text in Video File using Steganography", International Journal of Computer Applications, Vol. 77, No.17, September 2013.

[20]Yeuan-Kuen Lee, Graeme Bell, Shih-Yu Huang, Ran-Zan Wang, and Shyong-Jian Shyu, "An Advanced Least-Significant-Bit Embedding Scheme for Steganographic Encoding", Springer, 2009, pp-349-360.

[21]Poonam Dhankhar, Neha Sahu, "A Review and Research of Edge Detection Techniques for Image segmentation", International Journal of Computer Science and Mobile Computing, Vol. 2, Issue 7, July 2013, pp. 86-92.

[22]Dr.S.Vijayarani, Mrs. M. Vinupriya, "Performance Analysis of canny and Sobel Edge Detection Algorithm in Image Mining", International journal of Innovative Research in Computer and Communication Engineering, Vol.1, Issue 8, October 2013.

[23]http://Stegnao.net/tutorial/steh-history.html- accessed on 12 March 2016.

[24]K. Naveen BrahmaTeja, Dr.G. L. Madhumati, K. Rama Koteswara Rao, "Data Hiding using EDGE based steganography", International journal of Emerging Technology and advanced Engineering, Vol.2, Issue 11, November 2012.

[25]Parveen.P, Arun.R, "Audio-video Crypto Steganography using LSB substitution and advanced chaotic algorithm", International Journal of Engineering Inventions, Vol. 4, Issue 2, August 2014, pp. 01-07.

[26]Ramandeep Kaur, Pooja, Varsha, "A Hybrid Approach for Video Steganography using Edge Detection and Identical Match Techniques", IEEE WISPNET 2016 conference, March 2016.