ENHANCED DATA SECURITY USING DIGITAL MEDIA-VIDEO STEGNOGRAPHY
Information security has become the area of concern as a result of widespread use of communication medium over theÂ internet. This paper focuses on the data security approach when combined with encryption and steganographic techniques forÂ secret communication by hiding it inside the multimedia files. The high results are achieved by providing the security to dataÂ before transmitting it over the internet. The files such as images, audio, video contains collection of bits that can be furtherÂ translated into images, audio and video. The files composed of insignificant bits or unused areas which can be used forÂ overwriting of other data. This paper explains the proposed algorithm using video steganography for enhancing data security.
Nutzinger,M.C.Fabian, and M.Marschalek. â€Secure Hybrid Spread Spectrum System for Steganography in Auditive Mediaâ€. In Intelligent Information Hiding and Multimedia Signal Processing(IIH-MSP), 2010 Sixth International Conference.
Abbas Cheddad,Joan Condell,Kevin Curran,Paul Kevitt,â€Enhancing Steganography In Digital Imagesâ€.Proc.Canadian Conference on Computer and Robot Vision. [
B.Dunbar.A Detailed look at steganographic techniques and their use in an Open-Systems Environment,Sans Institute,1(2002).
Alain,C.Brainos,â€A study of Steganography and Art Of Hiding Information,â€East Carolina University.
Bender,W,Grulh,D,Morimoto,N. & Lu,A.,â€Techniques for Data Hidingâ€,IBM Systems Journal,Vol 35,1996.
Dunbar,B.,â€Steganography Techniques and their use in an Open-Systems environmentâ€,SANS Institute,January 2002.
Marvel,L.,M.,Boncelet Jr.,C.G.& Retter,C.,â€Spread Spectrum Steganographyâ€,IEEE Transactions on Image Processing,1999.
Wang,H & Wang,S,â€Cyber Warfare:Steganography vs. Steganalysisâ€,Communications of the ACM,47:10,October 2004.
Stefan Katznbeisser, Fabien.A., P.Petitcolas editors, Information Hiding Techniques for Steganography and Digital Watermarking,Artech House, Boston.London,2000.
Jamil,T.,â€Steganography:The art of Hiding Information is Plain Sightâ€,IEEE Potentials,18:01,1999.
B.Pfitzmann,â€Information Hiding Terminology,â€proc.First Intâ€™l Workshop Information Hiding,Lecturer Notes in Computer Science No.1,174,Spring â€“Verlag,Berlin,1996,pp.347-356.
Yeuan-Kuen Leea and Ling-Hwei Cheng,â€High capacity steganographic modelâ€,IEEE Proc.Visual Image Signal Process.,Vol.147,No.3,June 2000.
Ross J.Anderson,Fabien A.P.Petitcols,on The limits of steganography,IEEE Journal of Selected Areas in Communication,16(4);474-481,May 1998.
M.Ashourian,R.C. Jain,and Y.H.Ho,Dithered Quantization for Image Data Hiding In DCT domain,Proc.of IST2003,2003,171-175.
C.C.lin,P.F.Shiu,High Capacity Data Hiding scheme for DCT-based images.Journal of Information Hiding and Multimedia Signal Processing,1(3),2010,314-323.
A.Nag,S.Biswas,D.Sarkar,P.Sarkar,A Novel Technique for Image Steganography based on Block-DCT and Huffman Encoding,International Journal of Computer Science and Information Technology.
C.C.Chang,C.C.Lin,C.S.Tseng,and W.L.Tai Reversible hiding in DCT-based Compressed Images,Information Sciences Journal,177(13),2007,2768-2786.
M.Iwata,k.miyake,A. Shiozaki,Digital Steganography utilizing Features of JPEG Images,IEICE Trans.Fundamentals,E87-A,2004,929-936.
C.C. Chang,T.S.Chen,and L.Z. Chung,A Steganographic Method Based Upon JPEG quantization table modification,Information Sciences Journal,2002,141(1,2),123-138.
Kumar.B.,D.,Bhattacharya,P.Das,D.Ganguly and S.Mukherjee,â€ A tutorial review on Steganographyâ€,International Conference on Contemporary Computing (IC3-2008),Noida,India,August 7-9,2008,pp.105-114.
The submitter hereby warrants that the Work (collectively, the “Materials”) is original and that he/she is the author of the Materials. To the extent the Materials incorporate text passages, figures, data or other material from the works of others, the undersigned has obtained any necessary permissions. Where necessary, the undersigned has obtained all third party permissions and consents to grant the license above and has all copies of such permissions and consents.
The submitter represents that he/she has the power and authority to make and execute this assignment. The submitter agrees to indemnify and hold harmless the COMPUSOFT from any damage or expense that may arise in the event of a breach of any of the warranties set forth above. For authenticity, validity and originality of the research paper the author/authors will be totally responsible.