Abstract: Steganography is an art for hiding the secret information inside other information which are digitally cover. The definition of steganography can also be given as study of unseen communication that usually deals with existence of communicated message. The hidden message can be text, audio, image or video accordingly to that it can be cover from either image or video. In steganography, hiding information achieved to insert a message into cover image which generates a stego image. In this paper, we have analyze various steganography methods and also covered classification and applications.
Video Steganography using Discrete Wavelet Transform and Artificial Intelligenceijtsrd
Several developments in the transfer of data through the internet make it easier to transfer the data faster and accurately to the destination. But in this, anyone can misuse and modify the critical information through hacking. Video steganography is a technique which is used to hide the message and to transfer the message inside a video. Video is an application of many frames of audio, text, and images. The segmentation is known as the advanced technology that provides rich information of an image. The purpose of this paper is to propose a new technique to hide the data using video steganography with the help of artificial intelligence and DWT. This paper focuses on analyzing the various video steganography techniques which were proposed for securing the data transmission. In this paper, artificial intelligence is applied in order to improve the integrity and security of data transfer. The performance of the proposed method is evaluated on the basis of Bit error, mean square error, and PSNR metrics. Shivani Gupta | Gargi Kalia | Preeti Sondhi ""Video Steganography using Discrete Wavelet Transform and Artificial Intelligence"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25067.pdf
Paper URL: https://www.ijtsrd.com/computer-science/artificial-intelligence/25067/video-steganography-using-discrete-wavelet-transform-and-artificial-intelligence/shivani-gupta
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Images Steganography using Pixel Value Difference and Histogram AnalysisNortheastern University
A new data hiding method is proposed in this project , which can increase the steganographic security of a data hiding scheme .In this method a cover image is first mapped into a 1D pixels sequence by Hilbert filling curve and then it has been divided into non-overlapping embedding units .The division is made such that it gives two consecutive pixel values .As human eye has limited tolerance when it comes to texture and edge areas than in smooth areas , and as the difference between the pixel pairs in those areas are larger , therefore the method exploites pixel value difference (PVD) to solve out overflow underflow problem .
While transferring a file from one point to another through Intranet and Internet we need more file secure concepts. Ordinary, file Encryption-Decryption Concepts, which are readily available in java examples are easily captured by middle way itself. So we need more security combination. This project helps to send a file from one place to another in a secured manner. Firstly the target file is encrypted and it is embedded into an audio or video or any media file. The resultant file will be protected by a password. This resultant media file is not changed in its original format and it can be run in the player, we can’t find any encrypted data inside it. This format will be sent through net. In the destination point it will be retrieved only by our software and giving the relevant password. So it is highly secured.
A brief over overview of steganographical security techniques and how it has been applied, is applied and will continue to be applied in maintaining confidentiality between two communication parties
Abstract: Steganography is an art for hiding the secret information inside other information which are digitally cover. The definition of steganography can also be given as study of unseen communication that usually deals with existence of communicated message. The hidden message can be text, audio, image or video accordingly to that it can be cover from either image or video. In steganography, hiding information achieved to insert a message into cover image which generates a stego image. In this paper, we have analyze various steganography methods and also covered classification and applications.
Video Steganography using Discrete Wavelet Transform and Artificial Intelligenceijtsrd
Several developments in the transfer of data through the internet make it easier to transfer the data faster and accurately to the destination. But in this, anyone can misuse and modify the critical information through hacking. Video steganography is a technique which is used to hide the message and to transfer the message inside a video. Video is an application of many frames of audio, text, and images. The segmentation is known as the advanced technology that provides rich information of an image. The purpose of this paper is to propose a new technique to hide the data using video steganography with the help of artificial intelligence and DWT. This paper focuses on analyzing the various video steganography techniques which were proposed for securing the data transmission. In this paper, artificial intelligence is applied in order to improve the integrity and security of data transfer. The performance of the proposed method is evaluated on the basis of Bit error, mean square error, and PSNR metrics. Shivani Gupta | Gargi Kalia | Preeti Sondhi ""Video Steganography using Discrete Wavelet Transform and Artificial Intelligence"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25067.pdf
Paper URL: https://www.ijtsrd.com/computer-science/artificial-intelligence/25067/video-steganography-using-discrete-wavelet-transform-and-artificial-intelligence/shivani-gupta
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Images Steganography using Pixel Value Difference and Histogram AnalysisNortheastern University
A new data hiding method is proposed in this project , which can increase the steganographic security of a data hiding scheme .In this method a cover image is first mapped into a 1D pixels sequence by Hilbert filling curve and then it has been divided into non-overlapping embedding units .The division is made such that it gives two consecutive pixel values .As human eye has limited tolerance when it comes to texture and edge areas than in smooth areas , and as the difference between the pixel pairs in those areas are larger , therefore the method exploites pixel value difference (PVD) to solve out overflow underflow problem .
While transferring a file from one point to another through Intranet and Internet we need more file secure concepts. Ordinary, file Encryption-Decryption Concepts, which are readily available in java examples are easily captured by middle way itself. So we need more security combination. This project helps to send a file from one place to another in a secured manner. Firstly the target file is encrypted and it is embedded into an audio or video or any media file. The resultant file will be protected by a password. This resultant media file is not changed in its original format and it can be run in the player, we can’t find any encrypted data inside it. This format will be sent through net. In the destination point it will be retrieved only by our software and giving the relevant password. So it is highly secured.
A brief over overview of steganographical security techniques and how it has been applied, is applied and will continue to be applied in maintaining confidentiality between two communication parties
A Study of Various Steganographic Techniques Used for Information Hidingijcses
The art of information hiding has received much attention in the recent years as security of information has
become a big concern in this internet era. As sharing of sensitive information via a common communication
channel has become inevitable, Steganography – the art and science of hiding information has gained
much attention. We are also surrounded by a world of secret communication, where people of all types are
transmitting information as innocent as an encrypted credit card number to an online-store and as
insidious as a terrorist plot to hijackers. Steganography derives from the Greek word steganos, meaning
covered or secret, and graphy (writing or drawing) [1]. Steganography is a technology where modern data
compression, information theory, spread spectrum, and cryptography technologies are brought together to
satisfy the need for privacy on the Internet. This paper is an attempt to analyse the various techniques used
in steganography and to identify areas in which this technique can be applied, so that the human race can
be benefited at large.
Steganography and Its Applications in SecurityIJMER
ABSTRACT: Steganography is the dark cousin of cryptography, the use of codes. While cryptography provides privacy,
steganography is intended to provide secrecy. Steganography is a method of covertly communicating. Steganography is a
process that involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then
be sent to a receiver without anyone else knowing that it contains a hidden message. This is a process, which can be used for
example by civil rights organizations in repressive states to communicate their message to the outside world without their
own government being aware of it. In this article we have tried to elucidate the different approaches towards implementation
of Steganography using ‘multimedia’ file (text, static image, audio and video). Steganalysis is a newly emerging branch of
data processing that seeks the identification of steganographic covers, and if possible message extraction. It is similar to
cryptanalysis in cryptography. The technique is ancient emerging monster that have gained immutable notice as it have
newly penetrated the world of digital communication security. Objective is not only to prevent the message being read but
also to hide its existence.
Keywords: Carrier, Privacy, Secrecy, Steganalysis, Steganography
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...IOSR Journals
Abstract: Steganography is the art of hiding the fact that communication is taking place, by hiding information
in other information. There are many application of Steganography with different carrier file format. Here we
perform Steganography Technique with sending OTP on receiver mobile, which is one of the best secured
technique in current scenario. This technique is hiding file information into image with OTP password that is
only known by receiver. And can decrypt using that OTP only this is pure Steganography. Pure Steganography
means that there is none prior information shared by two communication parties. We are not sharing OTP
information by two communication parties. So this is more secure than other technique.
Key Words : Steganography, OTP, ICT, Password, IP, UDP, SIHS, LSB.
Video steganography based on DCT psychovisual and object motionjournalBEEI
Steganography is a technique of concealing the message in multimedia data. Multimedia data, such as videos are often compressed to reduce the storage for limited bandwidth. The video provides additional hidden-space in the object motion of image sequences. This research proposes a video steganography scheme based on object motion and DCT-psychovisual for concealing the message. The proposed hiding technique embeds a secret message along the object motion of the video frames. Motion analysis is used to determine the embedding regions. The proposed scheme selects six DCT coefficients in the middle frequency using DCT-psychovisual effects of hiding messages. A message is embedded by modifying middle DCT coefficients using the proposed algorithm. The middle frequencies have a large hiding capacity and it relatively does not give significant effect to the video reconstruction. The performance of the proposed video steganography is evaluated in terms of video quality and robustness against MPEG compression. The experimental results produce minimum distortion of the video quality. Our scheme produces a robust of hiding messages against MPEG-4 compression with average NC value of 0.94. The proposed video steganography achieves less perceptual distortion to human eyes and it's resistant against reducing video storage.
One of the reasons that intruders can be successful is that most of the information they acquire from a system is in a form that they can read and comprehend. Intruders may reveal the information to others, modify it to misrepresent an individual or organization, or use it to launch an attack. One solution to this problem is, through the use of Steganography. Steganography is a technique of hiding information in digital media. In contrast to cryptography, it is not to keep others from knowing the hidden information but it is to keep others from thinking that the information even exists. In this review paper we will understand what Steganography, Cryptography is and what are the advantages of using them? In last we will discuss our goal of this paper that what types of techniques worked on video Steganography?
Optimization of video steganography with additional compression and encryptionTELKOMNIKA JOURNAL
Currently, data such as text, images and video are very important. Therefore, data must be secured from unauthorized parties. In this paper, we propose a number of security levels, first using compression techniques on the data that will be hidden to reduce the size of the data, second using encryption techniques on data that has been compressed so that data is more secure, third using video steganography techniques on compressed and encrypted data so that unauthorized parties are increasingly difficult to extract data. Measurement of differences in quality of cover-video and stego-video using MSE (Mean Square Error), PSNR (Peak Signal to Noise Ratio), evolution histogram of video tags, and video playback. The results show that the proposed algorithm gives better results than the previous algorithm which has a smaller MSE, larger PSNR, smaller histogram evolution of video tags, and play video without distortion.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
For increase network security of messages sent on
internet the steganography is mostly preferred. To transmit data
secretly steganography is used in open system environment. In
this paper discussed the reviews of image steganography and the
general framework of image steganography using different
method. Steganography is nothing but art of hide information
behind the other information without leaving remarkable track
on original message.
This project figure out the pattern of the bytes in the stego file and how steganalysis tool can identify the bytes appended to the truck file by steganography tool. This analysis is based on basic theory of steganography and steganalysis, and using a hex editor in order to check what kind of bytes that the steganography tool appends to the truck file.
---
Please contact to lailiaidi at gmail.com for download request
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
Embedding a message in media files, also known as steganography, is a common approach to hide secret
information. It has been exploited by some criminals to confidentially exchange messages. As a countermeasure, tools have been developed in order to detect hidden information form digital media such as text, image, audio or video files. However the efficiency and performance of previous approaches still have room for improvement. In this research, we focus on algorithm design for better efficiency of hidden message detection from PNG files. We employ three classic AI approaches including neural network, fuzzy logic, and genetic algorithm and evaluate their efficiency and performance in controlled experiments. Finally we introduce our message detection system for PNG files based on LSB approach and present its usability in different case scenarios.
A brief over overview of steganographical security techniques and how it has been applied, is applied and will continue to be applied in maintaining confidentiality between two communication parties
Nowadays, several methods are used for communicating secret messages for defense purposes or in order to ensure the privacy of communication between two parties. So we go for hiding information in ways that prevent its detection.
Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...Edureka!
** Cyber Security Course: https://www.edureka.co/cybersecurity-certification-training **
This Steganography Tutorial by Edureka will help you understand how to hide data from plain sight using various techniques and tools.
Below is the list of topics covered in this session:
1. What is Steganography?
2. History of Steganography
3. Basic Steganographic Model
4. LSB Steganography
5. Demo: LSB Steganography
6. Demo: Steganographic Tools
Cyber Security Playlist: https://bit.ly/2N2jlNN
Cyber Security Blog Series: https://bit.ly/2AuULkP
Instagram: https://www.instagram.com/edureka_lea...
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
Review Paper on LSB Based Stegnography to Enhance Image Securityijtsrd
Steganography is the technique of hiding a secret message or information in a cover message like an image, text or sound in such a way that only the desired or intended recipient knows about the existence of the secret data. It can be defined as the study of invisible communication which usually deals with the technique of hiding the existence of the secret message. The hidden message may be in the form of text, image, audio and video etc. An image after inserting the secret message into it by using a stego key is known as a stego image. Nowadays steganography is important due to an exponential growth in secret communication by potential computer users over the internet. In this paper we have analyzed the various steganography techniques and observed that the security of the secret message can be enhanced by random selection of the pixels for substitution in LSB steganography. Further the error metrics PSNR Peak Signal to Noise Ratio should be high and MSE Mean Square Error should be low indicating good quality re construction. Naveen Verma | Preeti Sondhi | Gargi Kalia "Review Paper on LSB Based Stegnography to Enhance Image Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25326.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-security/25326/review-paper-on-lsb-based-stegnography-to-enhance-image-security/naveen-verma
A Study of Various Steganographic Techniques Used for Information Hidingijcses
The art of information hiding has received much attention in the recent years as security of information has
become a big concern in this internet era. As sharing of sensitive information via a common communication
channel has become inevitable, Steganography – the art and science of hiding information has gained
much attention. We are also surrounded by a world of secret communication, where people of all types are
transmitting information as innocent as an encrypted credit card number to an online-store and as
insidious as a terrorist plot to hijackers. Steganography derives from the Greek word steganos, meaning
covered or secret, and graphy (writing or drawing) [1]. Steganography is a technology where modern data
compression, information theory, spread spectrum, and cryptography technologies are brought together to
satisfy the need for privacy on the Internet. This paper is an attempt to analyse the various techniques used
in steganography and to identify areas in which this technique can be applied, so that the human race can
be benefited at large.
Steganography and Its Applications in SecurityIJMER
ABSTRACT: Steganography is the dark cousin of cryptography, the use of codes. While cryptography provides privacy,
steganography is intended to provide secrecy. Steganography is a method of covertly communicating. Steganography is a
process that involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then
be sent to a receiver without anyone else knowing that it contains a hidden message. This is a process, which can be used for
example by civil rights organizations in repressive states to communicate their message to the outside world without their
own government being aware of it. In this article we have tried to elucidate the different approaches towards implementation
of Steganography using ‘multimedia’ file (text, static image, audio and video). Steganalysis is a newly emerging branch of
data processing that seeks the identification of steganographic covers, and if possible message extraction. It is similar to
cryptanalysis in cryptography. The technique is ancient emerging monster that have gained immutable notice as it have
newly penetrated the world of digital communication security. Objective is not only to prevent the message being read but
also to hide its existence.
Keywords: Carrier, Privacy, Secrecy, Steganalysis, Steganography
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...IOSR Journals
Abstract: Steganography is the art of hiding the fact that communication is taking place, by hiding information
in other information. There are many application of Steganography with different carrier file format. Here we
perform Steganography Technique with sending OTP on receiver mobile, which is one of the best secured
technique in current scenario. This technique is hiding file information into image with OTP password that is
only known by receiver. And can decrypt using that OTP only this is pure Steganography. Pure Steganography
means that there is none prior information shared by two communication parties. We are not sharing OTP
information by two communication parties. So this is more secure than other technique.
Key Words : Steganography, OTP, ICT, Password, IP, UDP, SIHS, LSB.
Video steganography based on DCT psychovisual and object motionjournalBEEI
Steganography is a technique of concealing the message in multimedia data. Multimedia data, such as videos are often compressed to reduce the storage for limited bandwidth. The video provides additional hidden-space in the object motion of image sequences. This research proposes a video steganography scheme based on object motion and DCT-psychovisual for concealing the message. The proposed hiding technique embeds a secret message along the object motion of the video frames. Motion analysis is used to determine the embedding regions. The proposed scheme selects six DCT coefficients in the middle frequency using DCT-psychovisual effects of hiding messages. A message is embedded by modifying middle DCT coefficients using the proposed algorithm. The middle frequencies have a large hiding capacity and it relatively does not give significant effect to the video reconstruction. The performance of the proposed video steganography is evaluated in terms of video quality and robustness against MPEG compression. The experimental results produce minimum distortion of the video quality. Our scheme produces a robust of hiding messages against MPEG-4 compression with average NC value of 0.94. The proposed video steganography achieves less perceptual distortion to human eyes and it's resistant against reducing video storage.
One of the reasons that intruders can be successful is that most of the information they acquire from a system is in a form that they can read and comprehend. Intruders may reveal the information to others, modify it to misrepresent an individual or organization, or use it to launch an attack. One solution to this problem is, through the use of Steganography. Steganography is a technique of hiding information in digital media. In contrast to cryptography, it is not to keep others from knowing the hidden information but it is to keep others from thinking that the information even exists. In this review paper we will understand what Steganography, Cryptography is and what are the advantages of using them? In last we will discuss our goal of this paper that what types of techniques worked on video Steganography?
Optimization of video steganography with additional compression and encryptionTELKOMNIKA JOURNAL
Currently, data such as text, images and video are very important. Therefore, data must be secured from unauthorized parties. In this paper, we propose a number of security levels, first using compression techniques on the data that will be hidden to reduce the size of the data, second using encryption techniques on data that has been compressed so that data is more secure, third using video steganography techniques on compressed and encrypted data so that unauthorized parties are increasingly difficult to extract data. Measurement of differences in quality of cover-video and stego-video using MSE (Mean Square Error), PSNR (Peak Signal to Noise Ratio), evolution histogram of video tags, and video playback. The results show that the proposed algorithm gives better results than the previous algorithm which has a smaller MSE, larger PSNR, smaller histogram evolution of video tags, and play video without distortion.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
For increase network security of messages sent on
internet the steganography is mostly preferred. To transmit data
secretly steganography is used in open system environment. In
this paper discussed the reviews of image steganography and the
general framework of image steganography using different
method. Steganography is nothing but art of hide information
behind the other information without leaving remarkable track
on original message.
This project figure out the pattern of the bytes in the stego file and how steganalysis tool can identify the bytes appended to the truck file by steganography tool. This analysis is based on basic theory of steganography and steganalysis, and using a hex editor in order to check what kind of bytes that the steganography tool appends to the truck file.
---
Please contact to lailiaidi at gmail.com for download request
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
Embedding a message in media files, also known as steganography, is a common approach to hide secret
information. It has been exploited by some criminals to confidentially exchange messages. As a countermeasure, tools have been developed in order to detect hidden information form digital media such as text, image, audio or video files. However the efficiency and performance of previous approaches still have room for improvement. In this research, we focus on algorithm design for better efficiency of hidden message detection from PNG files. We employ three classic AI approaches including neural network, fuzzy logic, and genetic algorithm and evaluate their efficiency and performance in controlled experiments. Finally we introduce our message detection system for PNG files based on LSB approach and present its usability in different case scenarios.
A brief over overview of steganographical security techniques and how it has been applied, is applied and will continue to be applied in maintaining confidentiality between two communication parties
Nowadays, several methods are used for communicating secret messages for defense purposes or in order to ensure the privacy of communication between two parties. So we go for hiding information in ways that prevent its detection.
Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...Edureka!
** Cyber Security Course: https://www.edureka.co/cybersecurity-certification-training **
This Steganography Tutorial by Edureka will help you understand how to hide data from plain sight using various techniques and tools.
Below is the list of topics covered in this session:
1. What is Steganography?
2. History of Steganography
3. Basic Steganographic Model
4. LSB Steganography
5. Demo: LSB Steganography
6. Demo: Steganographic Tools
Cyber Security Playlist: https://bit.ly/2N2jlNN
Cyber Security Blog Series: https://bit.ly/2AuULkP
Instagram: https://www.instagram.com/edureka_lea...
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
Review Paper on LSB Based Stegnography to Enhance Image Securityijtsrd
Steganography is the technique of hiding a secret message or information in a cover message like an image, text or sound in such a way that only the desired or intended recipient knows about the existence of the secret data. It can be defined as the study of invisible communication which usually deals with the technique of hiding the existence of the secret message. The hidden message may be in the form of text, image, audio and video etc. An image after inserting the secret message into it by using a stego key is known as a stego image. Nowadays steganography is important due to an exponential growth in secret communication by potential computer users over the internet. In this paper we have analyzed the various steganography techniques and observed that the security of the secret message can be enhanced by random selection of the pixels for substitution in LSB steganography. Further the error metrics PSNR Peak Signal to Noise Ratio should be high and MSE Mean Square Error should be low indicating good quality re construction. Naveen Verma | Preeti Sondhi | Gargi Kalia "Review Paper on LSB Based Stegnography to Enhance Image Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25326.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-security/25326/review-paper-on-lsb-based-stegnography-to-enhance-image-security/naveen-verma
(𝛕𝐢, 𝛕𝐣)− RGB Closed Sets in Bitopological SpacesIOSR Journals
In this paper we introduce and study the concept of a new class of closed sets called (𝜏𝑖, 𝜏𝑗)− regular generalized b- closed sets (briefly(𝜏𝑖, 𝜏𝑗)− rgb-closed) in bitopological spaces.Further we define and study new neighborhood namely (𝜏𝑖, 𝜏𝑗)− rgb- neighbourhood (briefly(𝜏𝑖, 𝜏𝑗)− rgb-nhd) and discuss some of their properties in bitopological spaces. Also, we give some characterizations and applications of it.
Role of soluble urokinase plasminogen activator receptor (suPAR) as prognosis...IOSR Journals
Biological marker suPAR was used in many pathological conditions, including infection. suPAR
was correlated with the severity of sepsis. The purpose of this study to determine levels of suPAR infants with
risk of infection as a prognostic indicator for sepsis. Groups of infants with the risk of infection (n = 43) were
followed prospectively on days 0, 3rd and 7th and observed for the incidence of sepsis compared to the control
group (n = 10). suPAR was measured by ELISA and the course of infection measured by clinical criteria.
Results suPAR day 0, 3 and 7, displayed in the form of bloxpot and AUC as prognostic power. suPAR control
levels 9.32 ng / mL, sepsis cutoff 15, 41 ng / mL and AUC of 80.3% [95% CI 65.7%, 94.9%, p = 0.00]. Graph
shows ROC AUC sepsis suPAR day 0, the 3rd and 7th respectively 61.9%, 66.6% and 94.4%. Sepsis with
improved output 16.53 ng / mL and worsening 22.19 ng / mL and AUC of 80.8% [95% CI (0.62 to 0.99), p =
0.02]. suPAR levels was increased in neonatal sepsis patients. suPAR could be used as a prognostic factor for
neonatal sepsis.
Phytochemical, cytotoxic, in-vitro antioxidant and anti-microbial investigati...IOSR Journals
Zizyphus rugosa Lam. (Family: Rhamnaceae), locally known as “Bon Boroi” or as “Jongli Boroi” in Bangladesh generally found as a herb on the hills in bunches on thorny branches of the Zizyphus rugosa trees. Its bark and wood are used medicinally for dysentery in China, India, Laos, Burma, Sri Lanka, Thailand and Vietnam. Phytochemical screening of the Leaf extract of Zizyphus rugosa Lam showed different phytoconstituents including carbohydrates (monosaccharides, reducing and mixed-reducing sugars), alkaloid, glycosides, steroids, tannins and saponin. No flavonoid was detected. In DPPH and NO radical scavenging methods, IC50 was moderately satisfactory. IC50 was found 179.713μg/ml and 769.909μg/ml respectively compare with the reference ascorbic acid (15.707μg/ml and 82.642μg/ml respectively). In LPO (Lipid peroxidation) assay the Leaf fraction extract showed moderate inhibition potentiality (IC50 402.835μg/ml) in comparison to standard drug BHT (IC50 32.94μg/ml). In CUPRAC assays, the fraction was found to possess low Total antioxidant content, good flavonoid, and moderate amounts of phenolics, tannin and alkaloid content. The Leaf fraction extract was found to show good toxicity to Brine Shrimp nauplii, (LC50 212.402μg/ml & LC90 10715.91μg/ml) compare with the reference anticancer drug vincristine sulphate (LC50 2.47μg/ml & LC90 42μg/ml). In the antimicrobial study the fraction showed moderate activity against only one bacterium (Shiggla sonni) while the standard drug Chloramphenicol showed very good zone of inhibition against all five types (Salmonella typhi, Staphylococcus aureus, Shiggla sonni, Salmonella paratyphi, Salmonella grb) of bacteria. These findings provide scientific basis for the use of Zizyphus rugosa Lam. leaf ethanolic extract in traditional medicine in the treatment of aforementioned diseases. The plant also possesses moderate antimicrobial activity, good cytotoxic and good to moderate antioxidant activity.
A variety of solutions have been proposed to mitigate the reduction in mobility due to VI.
A variety of solutions have been proposed to mitigate the reduction in mobility due to VI.
The project proposes the enhancement of security system for secret data
communication through video file using adaptive data hiding with cryptographic
technique. A given input video file is converted into frame sequences and then
Encrypted the video using Chaos Encryption algorithm. And one of frame will be
selected to conceal the secret data for secured data communication. The proposed
technique also uses RC7 Encryption for encrypting a secret text data into cipher text
to avoid data hacking issues. After data encryption, the data hider will conceal the
secret encrypted data into the selected frame using adaptive LSB embedding
algorithm. Although encryption achieves certain security effects, they make the secret
messages unreadable and unnatural or meaningless. These unnatural messages
usually attract some unintended observers’ attention. The data hiding technique uses
the adaptive LSB replacement algorithm for concealing the secret message bits into
the image. In the data extraction module, the secret data will be extracted by using
relevant key for choosing the pixel coefficients and it will be decrypted to get original
data using encryption key. Finally the performance of this proposal in data encryption
and hiding will be analysed based on image and data recovery.
An Efficient Code-word Substitution Method for Data Embedding Technique in Encrypted H.264/AVC Video Streams Anisha Jose – PG Scholar,
Anu K Kuriakose – Assistant Professor,
Department of Electronics and Communication,
Federal Institute of Science and Technology, Ernakulam, India
International Refereed Journal of Engineering and Science (IRJES)irjes
International Refereed Journal of Engineering and Science (IRJES) is a leading international journal for publication of new ideas, the state of the art research results and fundamental advances in all aspects of Engineering and Science. IRJES is a open access, peer reviewed international journal with a primary objective to provide the academic community and industry for the submission of half of original research and applications.
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s): INFOGAIN PUBLICATION
As there is a lot of advancement in the field of internet or communication technology, we have various means of storing, accessing and distribution of the data in the digital format. Due to the rapid advancement in this field has also introduced many challenges to the researchers to provide security to the information which is transmitted over the network. The digital information circulating over the network also includes the medical information. In order to provide security, confidentiality and integrity, the steganographic techniques can be employed. In the section 1, it gives the introduction about available hiding techniques; the section 2 explains the various steganography properties, the section 3 gives the types of steganographic techniques, the section 4 gives the applications of steganography, the section 5 gives the quality parameters to be measured for medical information, and the section 6 gives the steganographic algorithms available. Finally the section 7 concludes that to prevent unauthorized access steganography is the suitable technique.
Today piracy is one of the most important issues that the owners of multimedia contents are facing now. So
it becomes necessary to protect the copyright of digital media. The new technology proposed to solve the “problem”
of enforcing the copyright of content transmitted across shared networks is Invisible Digital Watermark. It is a
technique of steganography that allow a copyright holder to insert a hidden message (invisible watermark) within
images, sound files, moving pictures and even raw text. To watermark a video it is divided into frames then extract
each bit of a frame and modify it with reference to original RGB value to embed a watermark in it. The location of
the embedded text is maintained as a key file and the frames are integrated as a video again. The slight changes in
RGB value scattered across the frame makes it impossible to visibly detect the difference when compared to original
video. To detect the piracy of video using the key file the copyright information is extracted from the watermarked
data. From the copyright information it is possible to find the source of piracy and thus necessary action can be
taken.
Keywords — hacking, authentication, cryptography, steganography, copyright.
Improved method for image security based on chaotic-shuffle and chaotic-diffu...IJECEIAES
In this paper, we propose to enhance the security performance of the color image encryption algorithm which depends on multi-chaotic systems. The current cryptosystem utilized a pixel-chaotic-shuffle system to encode images, in which the time of shuffling is autonomous to the plain-image. Thus, it neglects to the picked plaintext and known-plaintext attacks. Also, the statistical features of the cryptosystem are not up to the standard. Along these lines, the security changes are encircled to make the above attacks infeasible and upgrade the statistical features also. It is accomplished by altering the pixel-chaotic-shuffle component and including another pixel-chaotic-diffusion system to it. The keys for diffusion of pixels are extracted from the same chaotic arrangements created in the past stage. The renovation investigations and studies are performed to exhibit that the refreshed version of cryptosystem has better statistical features and invulnerable to the picked plaintext and known plaintext attacks than the current algorithm.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...ijiert bestjournal
Steganography is the art of covered or hidden text message. The purpose of steganography is covert com munication- to hide the existence of a secret message from a th ird party. This paper is intnded as a high-level te chnical introduction to steganography for those unfamiliar with the field. It is directed at forensic computer examiners who need a practical understanding of steganography wit hout study into the mathematical,although referenc es are provided to many of the ongoing research for the pe rson who needs or wants additional detail covered b y audio- video file. Although in this paper gives a historic al context for steganography,the significance is o n digital applications use anti Forensics technique,focusing on hiding information in online audio and video fi les. Examples for tools of software that employ steganography to hide data inside of audio-video file as well as sof tware to detect such hidden files will also be presented. Suitable algorithm such as LSB is used for image steganograp hy suitable parameter of security and authentication is like PS NR,histogram are obtained at transmitter\sende and receiver side which are exactly identical,hence data security ca n be increased. This paper focus on the idea of com puter anti forensics technique and its use of video steganogra phy in both investigative and security manner.
Cryptography Based MSLDIP Watermarking AlgorithmCSCJournals
In recent years, internet revolution resulted in an explosive growth in multimedia applications. The rapid advancement of internet has made it easier to send the data accurate and faster to the destination. Aside to this, it is easier to modify and misuse the valuable information through hacking at the same time. Digital watermarking is one of the proposed solutions for copyright protection of multimedia data. In this paper cryptography based MSLDIP watermarking method (Modified Substitute Last Digit in Pixel) is proposed. The main goal of this method is to increase the security of the MSLDIP technique besides to hiding the watermark in the pixels of digital image in such a manner that the human visual system is not able to differentiate between the cover image and the watermarked image. Also the experimental results showed that this method can be used effectively in the field of watermarking.
DCT Based Secret Image Hiding In Video SequenceIJERA Editor
Internet which is ever more accessible to interference by not with authority people over the World. It is important to bring down a chance of Information being sensed while Transmitting is the major issue these days. To overcome these problems one of the solution is cryptography. There will be no solitude once it is decoded. So hiding data to make it confidential. Copyright is one of the ways for hiding data and it is security for digital media. Its significance and techniques used in executing hiding of data let us see in brief. The existing LSB modification technique as in this approach the bits are randomly distributes the bits of message in image so which will becomes complex for anonymous persons to extract original message information, it opens the gates for loosing important hidden information. Here hiding and extraction method is used for AVI (Audio Video Interleave). As Higher order coefficients maintains Secret message bits. The hidden information will be in the form of gray scale image pixel values. Grayscale value then converted into binary values .The resultant binary values will be assigned to the higher order coefficient values of DCT of AVI video frames. These experiments were successful. We can analyze the results using Mat lab simulation software.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
1. IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 1, Ver. III (Jan – Feb. 2016), PP 11-17
www.iosrjournals.org
DOI: 10.9790/0661-18131117 www.iosrjournals.org 11 | Page
Video Steganography: A Survey
Bharti Chandel1
, Dr.Shaily Jain2
1
(Computer Science, Chitkara University, India)
2
(Computer Science, Chitkara University, India)
Abstract: Recent advances in information technology have made quick delivery and sharing of multimedia
information possible. But these advances in technology are leading breaches to information security and
personal information. Digital Steganography provides capability to protect private communication that has
become necessity in today’s Internet era. Steganography is a technique to protect and conceal multimedia
information in disguised manner or we can say it is the study of invisible communication. Steganography is a
mixture of compression, encryption, watermarking and cryptography. Generally sharing of information takes
place in the form of text, image, audio and video. Steganography uses image, text, video and audio to disguise
secret information. In this paper we have analyzed only video steganography. In video steganography secret
information is enveloped inside a video to make it safe from intruders. In this paper we have critically analyzed
fundamental concepts, performance metrics and security aspects of video steganography. Different methods
used for protecting secret information by using a video as cover media are explored. Comparisons between
different video steganography techniques are also provided. Steganalysis is also discussed in brief.
Keywords: Frequency Domain, Steganography, Steganalysis, Spatial Domain
I. Introduction
Steganography is a method of sharing secret information by making it inconspicuous to non
authenticated users. [1] Steganography has been originated from Greek word Steganos and graphics. Steganos
means covered or hidden and graphics means writing. Greek People used steganography to convey secret
message through different methods [2]. Other method to maintain security of information is Cryptography and
Watermarking. Of which former is mainly used for authentication and later is used for hiding message using
encryption. A comparison of cryptography, watermarking and steganography has been provided through Table
1. Steganography is mainly used in security applications like covert communication, legal fields and copyright
Control.
Security systems are mainly focusing on protection of secret information by using encryption or
cryptography. Cryptography [3] provides security of information by altering meaning of information through
scrambling or encoding by using encryption key. No matter how shatter proofed is our encrypted message, it
will always be vulnerable to attack as intruder already knows the existence of secret information. Steganography
is better than cryptography as it hides the existence of secret message from intruder. Adding information to a
media file by altering its contents in an imperceptible way is known as Watermarking [4]. Watermarking is used
for protection of copyright material as it must be robust against any type of attack. Watermarking makes our
data protected through hiding data in the form of copyright protection but steganography hides data inside a
cover object. In summary we can say that steganography provides us the mixture of cryptography and
watermarking by adding imperceptibility.
On the basis of type of cover object steganographic has been classified in five forms as shown in Fig
1[13].Text Steganography mainly deals with concealing Text in Text Files and in Binary Files.[14] Text can be
scrambled or concealed in any way inside a video. Text steganographic has very high capacity to hide text data
in Cover Text File. Digital image steganography mainly deals with concealing data inside a cover image [15].
Being very popular in current internet era Digital images are considered to be highly used cover media in
steganography [16]. Digital Image can be defined as a collection of pixels. Pixels based on their intensities are
selected to hide data. Video can be considered as combination of audio and collection of still images which
moves in constant time sequence. Videos are getting popular as a cover object in steganography due to high
embedding payload than a digital image [5] [13] and temporal features of video also provide perpetual
redundancy which is not available in digital images .Due to availability of large number of frames secret data
can be easily disguised inside a video. Disguising secret information in some network protocols is known as
protocol steganography. Noreka et. al. [17] described steganography in application layer TCP/IP protocol.
Bartosz et.al [18] had described protocol steganography using relation between two or more protocols.DNA
2. Video Steganography: A Survey
DOI: 10.9790/0661-18131117 www.iosrjournals.org 12 | Page
Criteria Cryptography Steganography Watermarking
Carrier Object Text files or image Any media file Digital image/Audio
Secret information Text Any type of file watermark
Secret key Necessary Optional optional
Visibility YES Never May or may not be
Objective Protection Secret communication Copyright protection
Security High Very High High
Capacity High High Low
Table 1.1 Comparisons between Cryptography, Steganography and Watermarking
steganography is getting popular due to high security, high embedding capacity and high embedding
efficiency. Andre et.al [19] had described steganography using DNA binary strands.
Fig 1.1 Types of Steganography
In this article Section II and Section III describes the General model of video steganography and
describes the Video Steganography technique evaluation parameters, In Section III we have provided brief
introduction of various video steganography techniques and Section IV provides the Literature review and
Critical analysis of various techniques followed by conclusion in Section V.
II. General Model Of Video Steganography
The Video Steganography refers to using video as a cover object (carrier file) to hide some secret
message inside the video file by using some embedding procedure. Video Steganography procedure can be
mathematically represented as follows (Fig 1 is showing the graphical representation of video steganography
procedure).
Let SM denote the secret message to conceal inside cover video. Before applying anything on video (V)
it must be divided into video frames. Cf denotes video the individual video frame. SM will be embedded in Cf
after applying Encryption algorithm (EC).SM can be anything like text file, video, audio or any other type of
message. Three main procedures are included in this approach, namely Video file to frame conversion (VTF),
Embedding Procedure (Em) and Extraction Procedure (Ex) [12].
VTF: V -> CF
EM: CF +EM (EC(SM, EK)) -> SF
EX: EX (DC, DK, SF) -> SM
Where EC(SM, EK) is SM encryption procedure which combines with video frame to produce Stego
Frame (SF) .Further SM is extracted from SF using Extraction Procedure as shown in Fig 1.2
III. Video Steganography Measures
A. Imperceptibility
Imperceptibility refers to the visibility of modification inside the cover media. High Imperceptibility
means increasing the invisibility of slight modifications in cover object. Modern day steganalysis approaches are
highly intelligent to detect slight modifications. High Imperceptibility has motivated researches to design
steganalysis resistant video steganography methods [6] [7].
B. Payload
Payload or capacity refers to the amount of secret message that can be concealed inside cover media
[8]. Video are gaining popularity as highly used cover media object due to their high embedding capacity and
embedding efficiency.
3. Video Steganography: A Survey
DOI: 10.9790/0661-18131117 www.iosrjournals.org 13 | Page
C. Statistical Attacks
The attacks or methods applied on stego object to extract hidden or secret information are known as
statistical attack [9].Steganography algorithm must be robust against statistical attacks.
D. Security
The most important feature of any steganographic algorithm is security. The embedding process
should have high security with minimum vulnerability to attacks. Several approaches have been proposed to
secure message in steganography [10].
E. Computational Cost
Data hiding and Data retrieval are the two parameters used to calculate computational cost of any
steganography approach [11] .Data hiding time refers to the time required to embed data inside a cover video
frame and data retrieval refers to extraction time of secret message from the stego frame.
Fig 1.2 Video Steganography Diagram
F. Perceptual Quality
Increment in embedding capacity may also lead to degradation of video quality or degradation of
original contents of video. Video steganography approach must handle control degradation of video quality.
IV. Video Steganography Techniques
High spatial and temporal redundancy of video streams makes them good candidate for security
applications like military and intelligence communications applications [20]. Video Steganography Techniques
can be classified into various techniques. One way to categorize video steganography techniques is on the basis
of embedding method i.e. Spatial or Substitution based techniques[21,22,23,24] and transform based
techniques[24,25]. Videos can also be classified on the basis of Compression i.e. Compressed [26] and
Uncompressed Video techniques [27, 28] as shown in Fig 3.1. Another approach to classify video
steganography techniques is based on classification i.e. Format based and Video Codec Methods [13].
A. Spatial Domain Based Method
Spatial Domain Methods basically deals with hiding information in pixels of video frames. The most
popular method of steganography is Least Significant Bit method (LSB) [12] due to its high embedding
capacity, less embedding complexity and ease in implementation .Least Significant method performs embedding
of secret message in least significant or most significant bit by randomly selecting pixel from a digital image or
a digital video frame .Let P[i] is representing pixel of an image. Binary form of this pixel can be
P[i] = {a7, a6, a5, a4, a3, a2, a1, a0}
Where a7 is most significant bit (MSB) and a0 is least significant bit (LSB). Pixel Value Differencing
(PVD) [29] is another approach of achieving spatial domain based steganography. Secret message bits are
concealed in pixels by dividing them on the basis of their difference which provides better results in terms of
imperceptibility and high embedding capacity.
4. Video Steganography: A Survey
DOI: 10.9790/0661-18131117 www.iosrjournals.org 14 | Page
Spatial Domain based methods are popular due to high embedding capacity but these are highly
vulnerable to statistical attacks like image filters, rotation, cropping and scaling. To achieve high robustness and
high security against steganalysis attacks Transform domain methods are preferred as described below.
Fig 3.1 Video Steganography Techniques Classification
B. Transform Domain Based Technique
Table Transform Domain Based Techniques are considered to be less prone to attacks due to high
security. Digital image is collection of pixels which are present in high and low frequency components of image.
The edge pixels are high frequency pixels and non edge pixels are low frequency pixels. Discrete Cosine
Transform (DCT) and Discrete Wavelet Transform (DWT) are the two most popular transform based techniques
in video steganography. DCT coefficients are considered as main destination of hiding in DCT transform
method. Yanquing et al. [30] had achieved high security and high visual quality by using DCT coefficients
based on Genetic algorithm. Difference of non-zero DCT coefficients had been chosen to achieve PSNR of
38.26 at high embedding rate with high security [31].
DWT method decompose the digital image or frame into four sub band with lower sub band having
relevant information and high sub band having finer details [12].Ghasemi et al.[32] had proposed embedding in
4 X 4 block of DWT coefficients using Genetic algorithm based functions and then OPAP is applied to achieve
PSNR of 35.17 db.
C. Format Based Method
Various techniques have been designed for a particular video format. H.264/AVC is latest video
compression standard with high efficiency in compression and well adaptation for network transmission [12].
Due to simple structure and small size Flash Video (.FLV) format video files are considered to be very popular
on internet. Mozo et al [33] has described a technique based on its simple structure to embed secret message in
video tags to achieve good visual quality without any distortion.
V. Literature Survey
In 2007 Daniel Socek et.al [20] has proposed an extended version of encryption algorithm of video
which is applicable on both lossy and lossless low motion video codec and extension to this encryption
algorithm as a new steganography algorithm to disguise a video inside a video with high security and low
computational cost. There are two main types of video encoding standards i.e. compressed and uncompressed.
Bin Liu et.al [26] has proposed compressed video secure steganography algorithm to achieve high security with
robustness against statistical attacks without decompression process. Run level pairs which are formed by
quantization of 8X8 discrete cosine transformed (DCT) are selected as positions to embed secret bits. Video
steganography is famous due to high spatial and temporal redundancy. This feature can be easily applied to
5. Video Steganography: A Survey
DOI: 10.9790/0661-18131117 www.iosrjournals.org 15 | Page
design a steganography algorithm with high security and high embedding efficiency. For example M.Jafar et.al
[34] has proposed a compressed video steganography using temporal and spatial features of video signal. The
proposed algorithm has constant bit rate, high imperceptibility and embedded data has been extracted without
full decomposition. There are many video steganography schemes proposed on motion vectors as they are used
to remove temporal redundancies in video frames. Feng Pan et. al [35] has proposed an enhanced version of
motion vector based video steganography algorithm by concealing data in motion vectors of cover media. This
algorithm has maintained embedding capacity of 4 bits of secret message per 6 motion vectors i.e.
approximately 2/3 of total number of motion vectors and PSNR value of more than 30dB. Due to low
computational complexity and high bit rate of watermark channel Least Significant bit (LSB) is high used to
embed secret data in steganography algorithm. R.Mritha [23] has proposed a modified least significant
algorithm for video steganography with high security.
Significant growth of video data over internet had made it a popular choice for steganography.
Embedding capacity and embedding efficiency are contrary to each other. Maintaining security along with high
embedding capacity in steganography is a difficult task. Ramadhan et.al [25] had proposed high payload and
high secure video steganography algorithm with hiding ration of 28.12% and PSNR ranged between 35.58-
45.68dBs.To achieve high security BCH(15,11) encoding and segmentation has been applied on secret message
before embedding using 2D-DWT domain , two security keys have been used to provide additional security.
Ramadhan et.al [43] had also proposed another technique using Wavelet Domain based on the KLT Tracking
Algorithm and High security using BCH codes.KLT algorithm has been applied for the detection of facial
region of interest in video frames and message has been embedded in RGB pixel values of these pixels using
2D-DWT domain method by generating four sub bands. This proposed algorithm needs some further
modification for robustness against some video processing attacks and artificial attacks.
RGB pixel’s intensity values can be easily used to embed information in LSB of cover video file
because modifications made to these pixels are almost invisible to HVS (Human Visual System) [25].LSB
substitution being the most simple and less complex method can be easily utilized to embed secret information.
A.Swathi et.al [37] has proposed a method of video steganography using selection of embedding location by
applying polynomial equations. Speed of data extraction and data embedding depends on the steganography
algorithm. M.Ramalingam et.al [45] has proposed an enhanced version of Hidden Markov model to increase the
speed of data embedding and extraction process. Hidden Markov models (HMM) are based on markov chains
which are considered to be most suitable for increasing the speed of retrieval and extraction process due to no
use of memory for states and independence of conditional probabilities of all states on the time in sequence. The
HMM performs embedding of secret data by locating colored objects and applying some mathematical tools to
model these objects in spatial domain.
Any successful steganography technique must consider some factors like imperceptibility,
antisteganalysis and payload capacity but some factors contradict to each other, for example increasing payload
capacity leads to distortion of imperceptibility and distortion of imperceptibility leads to vulnerability to attacks.
Hence any steganography scheme can be considered as optimization problem where steganography technique
hides secret message inside the cover video frame. Koushik et.al [38] had proposed an optimized technique for
basic video steganography technique using genetic algorithm. Optimizer has been used to optimize a 3-3-2 LSB
technique to achieve PSNR between 20 to 40dB and improved image fidelity (IF) as compared to previous
existing method.
VI. Conclusion
In this paper summarization of common approaches and tools used for digital video steganography
techniques has been done. A comparison between common video steganographic methods in digital video is
also provided with a highlight on strength and weakness of each method in conclusion. The research of video
steganography techniques can be explored in effective selection of cover media, to identify methods for
embedding secret message with high imperceptibility, high embedding capacity, high embedding efficiency
with optimum data hiding locations, low computational cost of data retrieval and data embedding rate, high
security, different video files extension, different types of secret message like video inside video, image inside
video, audio inside video and so on. Research can be also be explored in the area of embedding secret text
message in different language other than English language. Further video encryption techniques can also be
improvised.
6. Video Steganography: A Survey
DOI: 10.9790/0661-18131117 www.iosrjournals.org 16 | Page
References
[1] F.A.P. Petitcolas, R.J. Anderson and M.G. Kuhn: Information Hiding-A Survey, Proc. IEEE, 1999.
[2] N. Provos and P. Honeyman, Hide and Seek: An introduction to steganography, IEEE Security and Privacy, 1(3), 2003, 32-44.
[3] K.G.Paterson, Cryptography from Painings: A snapshot of Current Research, Information Security Technical Report, 7(3),
September 2002, 41-54.
[4] M. Bachrach, F.Y. Shih, Image Steganography and steganalysis, Wiley Interdisciplinary Reviews: Computational Statistics, 3(3),
2011, 251-259.
[5] M. Jafar, K. Morteza, An adaptive scheme for compressed video steganography using temporal and spatial features of the video
signal, International Journal of Imaging System and Technology,19, December 2009,306-315.
[6] Yi-Tu.Wu, F.Y. Shih, Genetic algorithm based methodology for breaking the steganalytic systems, Systems, Man and Cybernetics,
Part B: Cybernetics, IEEE Transactions on,36(1),Feb 2006,24-31.
[7] M. Kharrazi, H.T. Cover Selection for Steganographic Embedding, Image Processing, IEEE International Conference, Oct 2006,
Atlanta, GA.
[8] C.Abbas, C.Joan and C.kevin, Digital Image steganography: survey and analysis of current methods, Signal Processing, 90(3),
March 2010, 727-752.
[9] W.Andreas, P.Andreas, Attacks on Steganographic Systems, Information Hiding, 1768, Oct 2000, 61-76.
[10] V. Sathya, K. Balasubraminvam, N. Murali, M. RajaKumaran, Vigneswari, Data Hiding in audio signal, video signal text and JPEG
images, IEEE International Conference on Advances in Engineering ,Science and Management(ICAESM),March 2012,30-31.
[11] T. Shanableh, Data Hiding in MPEG video files using multivariate regression and flexible macro block ordering, IEEE Transaction.
Inf. Forensics, Security, 7(2), 2012, 455-464.
[12] S. Mansi, M.Vijay, Current status and key issues in image steganography: A survey, Computer Science Review, 13-14, Nov 2014,
95-113.
[13] M.M. Sadek, A.S. Khalifa, G. M. Mostafa, Video Steganography: A Comprehensive Review, Multimedia Tools Applications, 74,
March 2014, 7063-7094.
[14] E. Satir, H. Isik, A Compression-based text steganography method, Journal of System and Software, 85(10), Oct 2012, 2385-2394.
[15] A.Cheddad, J.Condell, K.Curran, P. Mckevitt, Digital image steganography: Survey and analysis of current methods, Signal
Processing, 90(3), March 2010, 727-752.
[16] I.Anastasia, T.Spyros, T.Halkidis, S.George, A novel technique for image steganography based on high payload method and edge
detection, Expert System with Application, 39(14), October 2012, 11517-11524.
[17] L.Norka, P.James, Y.Payman, C.Steve, Syntax and Semantics-Preserving Application Layer Protocol Steganography, Information
hiding, 3200, 2005, 164-179.
[18] J.Bartosz, M.Wojciech, S.Krzysztof, PadSteg:introducing inter-protocol steganography, Telecommunication Systems,52(2),February
2013,1101-1111.
[19] L. Andre, R.Christoph, B. Wolfgang, R. Hlimar, Cryptography with DNA binary strands, Biosystems,57(1),June 2000,13-22.
[20] F. Petitcolas, R.J. Anderson, M.G. Kuhn, Information hiding – a survey, Proc IEEE, 87(7), 1062-1078.
[21] C. Ozdemir, O. Turan, A new steganography algorithm based on color histograms for data embedding into raw video streams,
Computer & Security,28(7),October 2009,670-682.
[22] S.Manish,K.Sushmita, R.Richa, Video Steganography using Pixel Intensity Value LSB Technique, International Journal on Recent
and Innovation Trends in Computing and Communication,3(2),2015,287-290.
[23] R.Mritha, Stego Machine- Video Steganography using Modified LSB Algorithm, World Academy of Science, Engineering and
Technology,5, Feb 2011.
[24] K. Naveen,B. NagKishore, M. Vasujadevi, Image Hiding in a Video-based on DWT & LSB Algorithm, International Conference on
Photonics, VLSI & Signal Processing ,2014.
[25] M. Ramadhan, E. Khaled, A High Payload Video Steganography Algorithm in DWT Domain Based on BCH Codes (15, 11),
Wireless Telecommunications Symposium (WTS), New York, April 2015, 1-8.
[26] Bin Liu, Y.Chunfang, L. Fenlin, S.Yifeng, Secure Steganography in Compressed Video Bitstreams, Availability, Reliability and
Security (ARES), Barcelona, March 2008.
[27] H. Frank, G. Bernd, Watermarking of uncompressed and Compressed Video, Signal Processing, 66(3), May 1998, 283-301.
[28] X.Changyong, P.Xijian, A Steganographic Algorithm in Uncompressed Video Sequence Based on Difference between Adjacent
Frames, Image and Graphics(ICIG), Aug.2007, 297-302.
[29] H.-C. Wu, N.-I. Wu, C.-S. Tsai, M.-S. Hwang, Image Steganographic scheme based on pixel-value differencing and LSB
replacement methods, IEE Proceedings- Vision, Image and Signal Processing,152(5),October 2005,611-615.
[30] G. Yanqing, K.Siangwi, Y. Xingang, Secure Steganography based on binary particle swarm optimization, Journal of Electronics
(China), 26(2), February 2009, 285-288.
[31] L. Chiang, L. Shiang, High-Performance JPEG steganography using complementary embedding strategy, Pattern Recognition, 41(9),
September 2008, 2945-2955.
[32] E. Ghasemi, J. Shanbehzadeh, B. ZahirAzami, A Steganographic method based on Integer Wavelet Transform and Genetic
Algorithm, Communication and Signal Processing ,February 2011,pp 42-45.
[33] A.J. Mozo, M.E Obien, C. J. Rigor, D. F. Ravel , Video Steganography using Flash Video(FLV) ,Instrumentation and Measurement
Technology Conference, May 2009, 822-827.
[34] M.Jafar, K.Morteza, An adaptive scheme for compressed video steganography using temporal and spatial features of the video
signal, International Journal of Imaging Systems and Technology,19(4), December 2009,306-315.
[35] F.Pan, L. Xiang, X.Y. Yang, Y. Guo, Video Steganography using motion vector and linear block codes, Software Engineering and
Service Sciences, Beijing, July 2010, 592-595.
[36] S. Po- Chyi, L.Ming-Tse, W. Ching-Yu, A practical design of high volume steganography in digital video files, Multimedia Tools
and Applications,66(2), September 2013,247-266.
[37] A.Swathi, S.A.Kjilani, Video Steganography by LSB substitution using Different Polynomial Equations, International Journal of
Computational Engineering and Research ,2(5),September 2012,1621-1623.
[38] D. Kousik, K. Jyotsna, D. Paramartha, Optimized Video Steganography using Genetic Algorithm(GA) , International Conference on
Computational Engineering and Research, 2(5),September 2012,1621-1623.
[39] M. Athira, R. Reshma, S. B.Sasidhar, N.V.kalyankar, Audio-Video using Forensic Technique for Data Security, International
Journal of Computer Engineering & Technology,5(12),December 2014,154-157.
[40] K.Parvathi, K.Mahesh, Various Techniques in Video Steganography- A Review, International Journal of Computer & Organization
Trends, 5, February 2014.
7. Video Steganography: A Survey
DOI: 10.9790/0661-18131117 www.iosrjournals.org 17 | Page
[41] R.J.Mastafa ,Elleithy, K.M, A Highly Secure Video Steganography using Hamming Code(7,4),System, Applications and
Technology Conference(LISAT),IEEE Long Island ,Farmingdale New York,2014.
[42] Ramadhan J. Mstafa ,Khaled M. Elleithy, A Novel Video Steganography Algorithm in the Wavelet Domain Based on the KLT
Tracking Algorithm and BCH Codes.
[43] J. U. Duncombe, Infrared navigation—Part I: An assessment of feasibility (Periodical style), IEEE Trans. Electron Devices, 11, Jan.
1959, 34-39.