Information security model using data embedding technique for enhancing perceptibility and robustness

被引:2
|
作者
Moon, Sunil K. [1 ]
Raut, Rajeshree D. [2 ]
机构
[1] Pune Inst Comp Technol, Dept Elect & Telecommun, Pune, Maharashtra, India
[2] Ramdeobaba Coll Engn & Management, Dept Elect & Commun, Nagpur, Maharashtra, India
关键词
MFEMD; audio video crypto-steganography; information security; CF; attacks; STEGANOGRAPHY;
D O I
10.1504/IJESDF.2019.10016643
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information concealing using steganography is simple, but to maintain its security, perceptibility, robustness, embedding capacity and better recovery of both covers as well as secret data are the major issues. This paper is focused on the improvement in all these major issues. The proposed technique embedded the image and audio as secret data into the randomly selected frames of the video using multi frame exploiting modification direction (MFEMD) algorithm. Hence, it is very difficult to understand in which part of video, data is hidden. At the receiver end, we have used the forensic tool for authentication to improve the data security. Furthermore the obtained simulation results are found to be better than any other existing methods in terms of good visual recovery of both original video and secret data, embedding capacity, security of hidden secret data. Different types of attacks are applied on stego video during transmission like visual, chi-square, histogram, etc. to improve the perceptibility and robustness of secret data.
引用
收藏
页码:70 / 95
页数:26
相关论文
共 50 条
  • [21] Embedding indexing information in audio signal using watermarking technique
    Lancini, R
    Mapelli, F
    Tubaro, S
    [J]. PROCEEDINGS VIPROMCOM-2002, 2002, : 257 - 261
  • [22] Exploring fMRI RDMs: enhancing model robustness through neurobiological data
    Pickard, William
    Sikes, Kelsey
    Jamil, Huma
    Chaffee, Nicholas
    Blanchard, Nathaniel
    Kirby, Michael
    Peterson, Chris
    [J]. FRONTIERS IN COMPUTER SCIENCE, 2023, 5
  • [23] Enhancing Security Of Electronic Patient Record Using Watermarking Technique
    Vidya, M. J.
    Padmaja, K., V
    [J]. MATERIALS TODAY-PROCEEDINGS, 2018, 5 (04) : 10660 - 10664
  • [24] Increase of Awareness of the Importance of Information Security Using Simulation Experiment Technique Model as Ransomware
    Lee, Jun Hak
    Jeong, Jaewoong
    [J]. ADVANCED SCIENCE LETTERS, 2017, 23 (10) : 10246 - 10249
  • [25] Enhancing Data Security in ERP Projects Using XML
    Chandrakumar, T.
    Parthasarathy, S.
    [J]. INTERNATIONAL JOURNAL OF ENTERPRISE INFORMATION SYSTEMS, 2012, 8 (01) : 51 - 65
  • [26] An Approach for Enhancing Security of Cloud Data using Cryptography and Steganography with E-LSB Encoding Technique
    Rahman, Mohammad Obaidur
    Hossen, Muhammad Kamal
    Morsad, Md. Golam
    Roy, Animesh Chandra
    Chowdhury, Md. Shahnur Azad
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2018, 18 (09): : 85 - 93
  • [27] Enhancing Information Sharing and Visualization Capabilities in Security Data Analytic Platforms
    Gonzalez-Granadillo, Gustavo
    Faiella, Mario
    Medeiros, Iberia
    Azevedo, Rui
    Gonzalez-Zarzosa, Susana
    [J]. 2019 49TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS (DSN-W), 2019, : 1 - 8
  • [28] Intelligent acoustic data fusion technique for information security analysis
    Jiang, Ying
    Tang, Yize
    Lu, Wenda
    Wang, Zhongfeng
    Wang, Zepeng
    Zhang, Luming
    [J]. 2ND ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI2017), 2017, 887
  • [29] Authenticate audio video-crypto invisible watermarking approach for enhancing hidden information security and robustness
    Gangarde, Mahesh
    Oza, Shruti
    Chitode, Janardhan
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2020, 12 (01) : 16 - 42
  • [30] Enhancing video error resilience by using data-embedding techniques
    Lie, WN
    Lin, CI
    Lin, CW
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2006, 16 (02) : 300 - 308