Secure video steganographic model using framelet transform and elliptic curve cryptography

被引:0
|
作者
Rout, Sonali [1 ]
Mohapatra, Ramesh Kumar [1 ]
机构
[1] Natl Inst Technol, Dept Comp Sci & Engn, Rourkela 769008, Orissa, India
关键词
Video steganography; Stego key; Framelet transform; Elliptic curve cryptography;
D O I
10.1007/s11042-023-16531-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information security holds a quintessential role in the era of digital communication. Nowadays, social media has become the new platform to share a massive length of digitally transmitted multimedia files without being suspected. Hence, it can hide data, enabling the security providers to add an extra layer to the existing traditional framework. Videos are the most shared digital content and carry the maximum payload, which is best suitable for steganography. This paper suggests a secured stego key-based video steganographic method that uses Framelet Transform to embed secret data in the cover media. Here the main focus is to reduce the computational cost by introducing the stego key, which reserves the information regarding the location of the secret data. For an additional layer of security, the stego key is encrypted using Elliptic Curve Cryptography (ECC) based encryption scheme. The robustness of the scheme is enhanced by introducing a large prime number for the stego key sharing using the Elliptic Curve Diffie Hellman Key Exchange Protocol. Performance measures, including PSNR, MSE, SSIM, and BER, are compared with the traditional state-of-the-art methods, which produce significant results without tampering with the visual quality and perceptual characteristics of the stego video.
引用
收藏
页码:25191 / 25212
页数:22
相关论文
共 50 条
  • [31] Secure Multi-Purpose Mobile-Banking Using Elliptic Curve Cryptography
    Sangram Ray
    G. P. Biswas
    Mou Dasgupta
    Wireless Personal Communications, 2016, 90 : 1331 - 1354
  • [32] Secure Ambient Assisted Living System using Elliptic Curve Cryptography based CPABE
    Sowjanya, K.
    Dasgupta, Mou
    2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,
  • [33] Secure Message Communication Among Vehicles Using Elliptic Curve Cryptography in Smart Cities
    Dua, Amit
    Kumar, Neeraj
    Singh, Mukesh
    Obaidat, M. S.
    Hsiao, Kuei-Fang
    2016 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (CITS), 2016, : 52 - 57
  • [34] Secure sharing of data in cloud using MA-CPABE with elliptic curve cryptography
    G. K. Sandhia
    S. V. K. Raja
    Journal of Ambient Intelligence and Humanized Computing, 2022, 13 : 3893 - 3902
  • [35] A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography
    Chaudhry, Shehzad Ashraf
    Farash, Mohammad Sabzinejad
    Naqvi, Husnain
    Sher, Muhammad
    ELECTRONIC COMMERCE RESEARCH, 2016, 16 (01) : 113 - 139
  • [36] A Secure RFID Mutual Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptography
    Chunhua Jin
    Chunxiang Xu
    Xiaojun Zhang
    Jining Zhao
    Journal of Medical Systems, 2015, 39
  • [37] A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography
    Zhang, Zezhong
    Qi, Qingqing
    Kumar, Neeraj
    Chilamkurti, Naveen
    Jeong, Hwa-Young
    MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (10) : 3477 - 3488
  • [38] A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography
    Zezhong Zhang
    Qingqing Qi
    Neeraj Kumar
    Naveen Chilamkurti
    Hwa-Young Jeong
    Multimedia Tools and Applications, 2015, 74 : 3477 - 3488
  • [39] A Secure RFID Mutual Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptography
    Jin, Chunhua
    Xu, Chunxiang
    Zhang, Xiaojun
    Zhao, Jining
    JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (03)
  • [40] Secure sharing of data in cloud using MA-CPABE with elliptic curve cryptography
    Sandhia, G. K.
    Raja, S. V. K.
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 13 (8) : 3893 - 3902