Secure video steganographic model using framelet transform and elliptic curve cryptography

被引:0
|
作者
Rout, Sonali [1 ]
Mohapatra, Ramesh Kumar [1 ]
机构
[1] Natl Inst Technol, Dept Comp Sci & Engn, Rourkela 769008, Orissa, India
关键词
Video steganography; Stego key; Framelet transform; Elliptic curve cryptography;
D O I
10.1007/s11042-023-16531-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information security holds a quintessential role in the era of digital communication. Nowadays, social media has become the new platform to share a massive length of digitally transmitted multimedia files without being suspected. Hence, it can hide data, enabling the security providers to add an extra layer to the existing traditional framework. Videos are the most shared digital content and carry the maximum payload, which is best suitable for steganography. This paper suggests a secured stego key-based video steganographic method that uses Framelet Transform to embed secret data in the cover media. Here the main focus is to reduce the computational cost by introducing the stego key, which reserves the information regarding the location of the secret data. For an additional layer of security, the stego key is encrypted using Elliptic Curve Cryptography (ECC) based encryption scheme. The robustness of the scheme is enhanced by introducing a large prime number for the stego key sharing using the Elliptic Curve Diffie Hellman Key Exchange Protocol. Performance measures, including PSNR, MSE, SSIM, and BER, are compared with the traditional state-of-the-art methods, which produce significant results without tampering with the visual quality and perceptual characteristics of the stego video.
引用
下载
收藏
页码:25191 / 25212
页数:22
相关论文
共 50 条
  • [21] Secure and Efficient RNS software implementation for Elliptic Curve Cryptography
    Fournaris, Apostolos P.
    Papachristodoulou, Louiza
    Sklavos, Nicolas
    2017 2ND IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW), 2017, : 86 - 93
  • [22] A SECURE COMMUNICATION FOR HEALTHCARE SYSTEM USING WEARABLE DEVICES BASED ON ELLIPTIC CURVE CRYPTOGRAPHY
    Pandiaraja, P.
    Subha, S.
    INTERNATIONAL JOURNAL OF LIFE SCIENCE AND PHARMA RESEARCH, 2019, : 3 - 9
  • [23] A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography
    Shehzad Ashraf Chaudhry
    Mohammad Sabzinejad Farash
    Husnain Naqvi
    Muhammad Sher
    Electronic Commerce Research, 2016, 16 : 113 - 139
  • [24] A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography
    He, Debiao
    Chen, Jianhua
    Chen, Yitao
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (12) : 1423 - 1429
  • [25] Secure Communication in Smart Meters using Elliptic Curve Cryptography and Digital Signature Algorithm
    Shukla, Saurabh
    Thakur, Subhasis
    Breslin, John G.
    PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 261 - 266
  • [26] A Biometeric Based Secure Session Key Agreement using Modified Elliptic Curve Cryptography
    Subramaniam, Usha
    Subbaraya, Kuppuswami
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2015, 12 (02) : 155 - 162
  • [27] SE-Enc: A Secure and Efficient Encoding Scheme Using Elliptic Curve Cryptography
    Almajed, Hisham N.
    Almogren, Ahmad S.
    IEEE ACCESS, 2019, 7 : 175865 - 175878
  • [28] Secure Multiparty Computation and Privacy Preserving scheme using Homomorphic Elliptic Curve Cryptography
    Chouhan, Ankit
    Kumari, Anupam
    Saiyad, Makhduma
    PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS), 2019, : 776 - 780
  • [29] A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption
    Elhoseny, Mohamed
    Elminir, Hamdy
    Riad, Alaa
    Yuan, Xiaohui
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2016, 28 (03) : 262 - 275
  • [30] Implementation of Bluetooth Secure Simple Pairing (SSP) using Elliptic Curve Cryptography (ECC)
    Alfarjat, Ahmad Hweishel A.
    Hanumanthappa, J.
    Hamatta, Hatem S. A.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (03): : 60 - 70