Application of Data Hiding in Audio-Video Using Anti Forensics Technique for Authentication and Data Security

被引:0
|
作者
Moon, Sunil K. [1 ]
Raut, Rajeshree D. [2 ]
机构
[1] Pune Inst Comp Technol, Dept Elect & Telecommun, Pune, Maharashtra, India
[2] Ramdeobaba Coll Engg & Mgmt, Dept Elect & Commun, Nagpur, India
关键词
4LSB; Data Hiding; Steganography; Computer Forensics; Histogram; PSNR; Authentication;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Steganography is the method of hiding any secret information like password, text, and image, audio behind original cover file. In this pap er we proposed the au dio-video cryptosteganography which is the combination of image steganography and audio steganography using computer forensics technique as a tool for authentication. Our aim is to hide secret information behind image and audio of video file. As video is the application of many still frames of images and audio, we can select any frame of video and audio for hiding our secret data. Suitable algorithm such as 4LSB is used for image steganography and phase coding algorithm for audio steganography. Suitable parameter of sccu rity and authentication like PSNR, histogram arc obtained at receiver and transmitter side which are exactly identical, hence data security can he increased. This paper focus the idea of computer forensics technique and its use of video steganography in both investigative and security manner.
引用
收藏
页码:1110 / 1115
页数:6
相关论文
共 50 条
  • [21] Binary nonogram puzzle based data hiding technique for data security
    Kamil, Samar
    Abdullah, Siti Norul Huda Sheikh
    Hasan, Mohammad Kamrul
    Alomari, Yazan M.
    Alyasseri, Zaid
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (2) : 4951 - 4992
  • [22] Particle filter algorithm for single speaker tracking with audio-video data fusion
    Lim, Yoon Seob
    Choi, Jong-Suk
    Kim, Munsang
    2007 RO-MAN: 16TH IEEE INTERNATIONAL SYMPOSIUM ON ROBOT AND HUMAN INTERACTIVE COMMUNICATION, VOLS 1-3, 2007, : 362 - 366
  • [23] Hiding in encrypted images: a three tier security data hiding technique
    Shabir A. Parah
    Javaid A. Sheikh
    Umer I. Assad
    Ghulam M. Bhat
    Multidimensional Systems and Signal Processing, 2017, 28 : 549 - 572
  • [24] Binary nonogram puzzle based data hiding technique for data security
    Samar Kamil
    Siti Norul Huda Sheikh Abdullah
    Mohammad Kamrul Hasan
    Yazan M. Alomari
    Zaid Alyasseri
    Multimedia Tools and Applications, 2024, 83 : 4951 - 4992
  • [25] Hiding in encrypted images: a three tier security data hiding technique
    Parah, Shabir A.
    Sheikh, Javaid A.
    Assad, Umer I.
    Bhat, Ghulam M.
    MULTIDIMENSIONAL SYSTEMS AND SIGNAL PROCESSING, 2017, 28 (02) : 549 - 572
  • [26] Masking based Data Hiding and Image Authentication Technique (MDHIAT)
    Ghoshal, Nabin
    Sarkar, A.
    Chakraborty, D.
    Ghosh, S.
    Mandal, J. K.
    ADCOM: 2008 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS, 2008, : 119 - +
  • [27] Authentication Framework for Augmented Reality with Data-Hiding Technique
    Lin, Chia-Chen
    Nshimiyimana, Aristophane
    SaberiKamarposhti, Morteza
    Elbasi, Ersin
    SYMMETRY-BASEL, 2024, 16 (10):
  • [28] A Novel Technique for Data Hiding in Audio Carrier by Using Sample Comparison in DWT Domain
    Verma, Satish Singh
    Gupta, Ravindra
    Shrivastava, Gaurav
    2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 639 - 643
  • [29] Semantic media analysis for parallel hiding of data in video and audio track
    Badura, Stanislaw
    Rymaszewski, Slawomir
    SIGMAP 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND MULTIMEDIA APPLICATIONS, 2007, : 462 - +
  • [30] Data Hiding in Audio Using Random Orthogonal Matrices
    Singh, Jyotsna
    Garg, Parul
    Nath De, Alok
    INFORMATION SECURITY JOURNAL, 2010, 19 (05): : 273 - 281