A Novel Approach for Video Steganography using LSB Technique

Authors

  • Khalil Ahmad  Department of CSE, BGSB University, Rajouri, J&K, India
  • Taseem Nazir  Department of CSE, BGSB University, Rajouri, J&K, India
  • Junaid Farooq War  Department of ECE, BGSB University, Rajouri, J&K, India

Keywords:

Steganography, LSB, Secret Key, Data hiding

Abstract

There are many kinds of steganography techniques available among which hiding data in video using logical operation by LSB substitution is a simple method. Here the information will be embedded using the stego key. Here 8 or 16-bit key is used. The input image or text file is encoded with the help of the secret key by performing logical operation using LSB substitution. By using this technique, capacity of embedding bits into the cover image can be increased and possibility of attacks can be decreased.

References

  1. H. Qi, W. Snyder and W. Sander, “Blind Consistency Based Steganography for Information Hiding In DigitalIEEE International Conference on Multimedia and Expo, 2002. ICME'02. Proceedings 2002, Volume: 1 , pp: 585 – 588, August. 2002.
  2. A Survey on various types of Steganography and Analysis of Hiding Techniques Navneet Kaur, Sunny Behal. “International Journal of Engineering Trends and Technology (IJETT) – Volume 11 Number 8 - May 2014”
  3. G. Elmasry and Y. Shi, “2- D Interleaving for Enhancing the Robustness of Watermark Signals Embedded in Still Imag International Conference on Multimedia and Expo (II) pp. 731 – 734, 2000.
  4. Information hiding using audio steganography – a surveyThe. “International Journal of Multimedia & Its Applications (IJMA) Vol.3, No.3, August 2011 ”
  5. Hiding the Text Information using Steganography. “M.GraceVennice, Prof. T.V.Rao, M. Swapna, Prof. J.Sasikiran/ International Journal of Engineering Research and Applications (IJERA) ”
  6. Data Hiding Using Video Steganography - A Survey. “Swetha V et al | IJCSET(www.ijcset.net) | June 2015 | Vol 5, Issue 6,206 - 213 ”
  7. D. Kundur, D. Hatzinakos, “Digital Watermarking using Multi - resolution Wavelet Decomposition, ”In IEEE ICASSP'98, volume 5, pages 2659 – 26 62, Seattle, May 1998.
  8. H. Liu, J. Liu, J. Huang, D. Huang and Y. Shi, “A robust DWT - based blind data hiding algorithm,” IEEE International Symposium on Circuits and Systems, ISCAS 2002, Volume: 2, pp. II - 672 - II - 675, May 2002.
  9. C.C. Chang, T.C. Lu, “A difference expand oriented data hiding scheme for restoring the original host images”, J. Systftw... 79 so (12) (2006) 1754 – 1766.
  10. H. B. Kekre, Archana A. Athawale, Pallavi N. Halarnkar, “Increased Capacity of In Hiding in s LSB method for text and Image, International Journal of Electrical, Computer and Systems Engineering , volume 2, No. 4 http://www.waset.org/ijecse/v2/ v2 - 4 - 34.pdf (Europe) .
  11. S.D. Lin and C.F. Chen, A Robust DCT - based Watermarking for Copyright Protection, IEEE Transactions on Consumer Electron, vol. 46, no. 3, pp. 415 - 421, 2000.
  12. Navneet Kaur, Sunny Behal “A Survey on various types of Steganography and Analysis of Hiding Techniques”,International Journal of Engineering Trends and Technology (IJETT) – Volume 11 Number 8 - May 20 14.

The Rubik's Cube is not just a forgotten toy from the 80's. The fact is that it's even more popular than ever before.

Downloads

Published

2018-04-25

Issue

Section

Research Articles

How to Cite

[1]
Khalil Ahmad, Taseem Nazir, Junaid Farooq War, " A Novel Approach for Video Steganography using LSB Technique, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 1, pp.253-257, March-April-2018.