Secure video steganographic model using framelet transform and elliptic curve cryptography

被引:0
|
作者
Rout, Sonali [1 ]
Mohapatra, Ramesh Kumar [1 ]
机构
[1] Natl Inst Technol, Dept Comp Sci & Engn, Rourkela 769008, Orissa, India
关键词
Video steganography; Stego key; Framelet transform; Elliptic curve cryptography;
D O I
10.1007/s11042-023-16531-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information security holds a quintessential role in the era of digital communication. Nowadays, social media has become the new platform to share a massive length of digitally transmitted multimedia files without being suspected. Hence, it can hide data, enabling the security providers to add an extra layer to the existing traditional framework. Videos are the most shared digital content and carry the maximum payload, which is best suitable for steganography. This paper suggests a secured stego key-based video steganographic method that uses Framelet Transform to embed secret data in the cover media. Here the main focus is to reduce the computational cost by introducing the stego key, which reserves the information regarding the location of the secret data. For an additional layer of security, the stego key is encrypted using Elliptic Curve Cryptography (ECC) based encryption scheme. The robustness of the scheme is enhanced by introducing a large prime number for the stego key sharing using the Elliptic Curve Diffie Hellman Key Exchange Protocol. Performance measures, including PSNR, MSE, SSIM, and BER, are compared with the traditional state-of-the-art methods, which produce significant results without tampering with the visual quality and perceptual characteristics of the stego video.
引用
下载
收藏
页码:25191 / 25212
页数:22
相关论文
共 50 条
  • [1] Secure video steganographic model using framelet transform and elliptic curve cryptography
    Sonali Rout
    Ramesh Kumar Mohapatra
    Multimedia Tools and Applications, 2024, 83 : 25191 - 25212
  • [2] Steganographic manipulations with elliptic curve cryptography
    Shankar, T. N.
    Sahoo, G.
    Niranjan, S.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2012, 4 (04) : 280 - 297
  • [3] A secure protocol for Bluetooth piconets using elliptic curve cryptography
    Hwang, MS
    Lee, CC
    Lee, JZ
    Yang, CC
    TELECOMMUNICATION SYSTEMS, 2005, 29 (03) : 165 - 180
  • [4] Secure Data Access in Hadoop Using Elliptic Curve Cryptography
    Diaz, Antonio F.
    Blokhin, Ilia
    Ortega, Julio
    Palacios, Raul H.
    Rodriguez-Quintana, Cristina
    Diaz-Garcia, Juan
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2016 COLLOCATED WORKSHOPS, 2016, 10049 : 136 - 145
  • [5] A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography
    Min-Shiang Hwang
    Cheng-Chi Lee
    Ji-Zhe Lee
    Chao-Chen Yang
    Telecommunication Systems, 2005, 29 : 165 - 180
  • [6] A secure user authentication protocol using elliptic curve cryptography
    Kumari, Adesh
    Abbasi, M. Yahya
    Kumar, Vinod
    Khan, Akber Ali
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (04): : 521 - 530
  • [7] Efficient and secure business model for content centric network using elliptic curve cryptography
    Adhikari, Sharmistha
    Ray, Sangram
    Biswas, Gosta P.
    Obaidat, Mohammad S.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (01)
  • [8] An efficient and secure RFID authentication protocol using elliptic curve cryptography
    Dinarvand, Negin
    Barati, Hamid
    WIRELESS NETWORKS, 2019, 25 (01) : 415 - 428
  • [9] An Improved Secure RFID Authentication Protocol Using Elliptic Curve Cryptography
    Liu, Wan-Rong
    Ji, Zhi-Yong
    Chu, Cheng-Chen
    International Journal of Network Security, 2024, 26 (01) : 106 - 115
  • [10] Competing secure text encryption in intranet using elliptic curve cryptography
    Kumari, Arpana
    Kapoor, Vivek
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2020, 23 (02): : 631 - 641