Information security model using data embedding technique for enhancing perceptibility and robustness

被引:2
|
作者
Moon, Sunil K. [1 ]
Raut, Rajeshree D. [2 ]
机构
[1] Pune Inst Comp Technol, Dept Elect & Telecommun, Pune, Maharashtra, India
[2] Ramdeobaba Coll Engn & Management, Dept Elect & Commun, Nagpur, Maharashtra, India
关键词
MFEMD; audio video crypto-steganography; information security; CF; attacks; STEGANOGRAPHY;
D O I
10.1504/IJESDF.2019.10016643
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information concealing using steganography is simple, but to maintain its security, perceptibility, robustness, embedding capacity and better recovery of both covers as well as secret data are the major issues. This paper is focused on the improvement in all these major issues. The proposed technique embedded the image and audio as secret data into the randomly selected frames of the video using multi frame exploiting modification direction (MFEMD) algorithm. Hence, it is very difficult to understand in which part of video, data is hidden. At the receiver end, we have used the forensic tool for authentication to improve the data security. Furthermore the obtained simulation results are found to be better than any other existing methods in terms of good visual recovery of both original video and secret data, embedding capacity, security of hidden secret data. Different types of attacks are applied on stego video during transmission like visual, chi-square, histogram, etc. to improve the perceptibility and robustness of secret data.
引用
收藏
页码:70 / 95
页数:26
相关论文
共 50 条
  • [31] Enhancing video error resilience by using data-embedding techniques
    Lie, WN
    Lin, CI
    Lin, CW
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2006, 16 (02) : 300 - 308
  • [32] A Hybrid Model Encryption for Enhancing Data Security in Cloud Computing
    Zibouh, Ouadia
    Dalli, Anouar
    Drissi, Hilal
    EDUCATION EXCELLENCE AND INNOVATION MANAGEMENT THROUGH VISION 2020, 2019, : 3840 - 3849
  • [33] Algorithm of Information Embedding into Digital Images Based on the Chinese Remainder Theorem for Data Security
    Evsutin, Oleg
    Dzhanashia, Kristina
    CRYPTOGRAPHY, 2020, 4 (04) : 1 - 15
  • [34] Data Embedding Technique in Encrypted Image Using Hamming Coding
    Chen, Yi-Hui
    Wu, Hsin-Pei
    Liaw, Wei-Liang
    2019 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - TAIWAN (ICCE-TW), 2019,
  • [35] Security Aware Virtual Network Embedding Algorithm Using Information Entropy TOPSIS
    Zhang, Peiying
    Li, Haisheng
    Ni, Yongjing
    Gong, Faming
    Li, Mengnan
    Wang, Fuyan
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2020, 28 (01) : 35 - 57
  • [36] Security Aware Virtual Network Embedding Algorithm Using Information Entropy TOPSIS
    Peiying Zhang
    Haisheng Li
    Yongjing Ni
    Faming Gong
    Mengnan Li
    Fuyan Wang
    Journal of Network and Systems Management, 2020, 28 : 35 - 57
  • [37] Secure Patient Data Transfer Using Information Embedding and Hyperchaos
    Aljuaid, Hanan
    Parah, Shabir A.
    SENSORS, 2021, 21 (01) : 1 - 20
  • [38] Information Security Risk Management Model for Big Data
    Yang, Min
    ADVANCES IN MULTIMEDIA, 2022, 2022
  • [39] An improved approach for Enhancing Public Cloud Data Security through Steganographic Technique
    Mohis, M.
    Devipriya, V. S.
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 3, 2015, : 308 - 312
  • [40] Improving the information security model by using TH
    Ahlfeldt, Rose-Mharie
    Spagnoletti, Paolo
    Sindre, Guttorm
    NEW APPROACHES FOR SECURITY, PRIVACY AND TRUST IN COMPLEX ENVIRONMENTS, 2007, 232 : 73 - +