Information security model using data embedding technique for enhancing perceptibility and robustness

被引:2
|
作者
Moon, Sunil K. [1 ]
Raut, Rajeshree D. [2 ]
机构
[1] Pune Inst Comp Technol, Dept Elect & Telecommun, Pune, Maharashtra, India
[2] Ramdeobaba Coll Engn & Management, Dept Elect & Commun, Nagpur, Maharashtra, India
关键词
MFEMD; audio video crypto-steganography; information security; CF; attacks; STEGANOGRAPHY;
D O I
10.1504/IJESDF.2019.10016643
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information concealing using steganography is simple, but to maintain its security, perceptibility, robustness, embedding capacity and better recovery of both covers as well as secret data are the major issues. This paper is focused on the improvement in all these major issues. The proposed technique embedded the image and audio as secret data into the randomly selected frames of the video using multi frame exploiting modification direction (MFEMD) algorithm. Hence, it is very difficult to understand in which part of video, data is hidden. At the receiver end, we have used the forensic tool for authentication to improve the data security. Furthermore the obtained simulation results are found to be better than any other existing methods in terms of good visual recovery of both original video and secret data, embedding capacity, security of hidden secret data. Different types of attacks are applied on stego video during transmission like visual, chi-square, histogram, etc. to improve the perceptibility and robustness of secret data.
引用
收藏
页码:70 / 95
页数:26
相关论文
共 50 条
  • [31] A Hybrid Model Encryption for Enhancing Data Security in Cloud Computing
    Zibouh, Ouadia
    Dalli, Anouar
    Drissi, Hilal
    [J]. EDUCATION EXCELLENCE AND INNOVATION MANAGEMENT THROUGH VISION 2020, 2019, : 3840 - 3849
  • [32] Algorithm of Information Embedding into Digital Images Based on the Chinese Remainder Theorem for Data Security
    Evsutin, Oleg
    Dzhanashia, Kristina
    [J]. CRYPTOGRAPHY, 2020, 4 (04) : 1 - 15
  • [33] Data Embedding Technique in Encrypted Image Using Hamming Coding
    Chen, Yi-Hui
    Wu, Hsin-Pei
    Liaw, Wei-Liang
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - TAIWAN (ICCE-TW), 2019,
  • [34] Security Aware Virtual Network Embedding Algorithm Using Information Entropy TOPSIS
    Zhang, Peiying
    Li, Haisheng
    Ni, Yongjing
    Gong, Faming
    Li, Mengnan
    Wang, Fuyan
    [J]. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2020, 28 (01) : 35 - 57
  • [35] Security Aware Virtual Network Embedding Algorithm Using Information Entropy TOPSIS
    Peiying Zhang
    Haisheng Li
    Yongjing Ni
    Faming Gong
    Mengnan Li
    Fuyan Wang
    [J]. Journal of Network and Systems Management, 2020, 28 : 35 - 57
  • [36] Secure Patient Data Transfer Using Information Embedding and Hyperchaos
    Aljuaid, Hanan
    Parah, Shabir A.
    [J]. SENSORS, 2021, 21 (01) : 1 - 20
  • [37] An improved approach for Enhancing Public Cloud Data Security through Steganographic Technique
    Mohis, M.
    Devipriya, V. S.
    [J]. 2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 3, 2015, : 308 - 312
  • [38] Information Security Risk Management Model for Big Data
    Yang, Min
    [J]. ADVANCES IN MULTIMEDIA, 2022, 2022
  • [39] Enhancing the Security and Quality of Image Steganography Using a Novel Hybrid Technique
    Verma, Vaidehi
    Ozha, Trapti
    [J]. SMART TRENDS IN INFORMATION TECHNOLOGY AND COMPUTER COMMUNICATIONS, SMARTCOM 2016, 2016, 628 : 668 - 673
  • [40] Improving the information security model by using TH
    Ahlfeldt, Rose-Mharie
    Spagnoletti, Paolo
    Sindre, Guttorm
    [J]. NEW APPROACHES FOR SECURITY, PRIVACY AND TRUST IN COMPLEX ENVIRONMENTS, 2007, 232 : 73 - +