Skip to main content
Top

2018 | OriginalPaper | Chapter

A Secure High-Capacity Video Steganography Using Bit Plane Slicing Through (7, 4) Hamming Code

Authors : Ananya Banerjee, Biswapati Jana

Published in: Advanced Computational and Communication Paradigms

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Achievement of high-capacity data hiding using a digital media is an important research issue in the field of steganography. In this paper, we have introduced a novel scheme of data hiding directly within the video stream using bit plane slicing through (7, 4) Hamming code with the help of shared secret key. In the proposed scheme, a secret logo image is embedded within the cover video stream for authentication and ownership identification through Hamming code based video steganography. Each frame of secret video has been separated into individual three basic color blocks (R, G and B) and then partitioned into (3 × 3) pixel blocks. After that, each color block is sliced up into 4 bit planes starting from LSB plane. The pixels’ positions of cover images are randomly selected by Pseudorandom Number Generator (PRNG) using a shared secret seed value and data embedding performed using (7, 4) Hamming code. As a result, 36 bits secret data can be embedded within a (3 × 3) pixel block which is almost eight times greater than Ramadhan and Khaled’s scheme (Systems, applications and technology conference (LISAT), 2014 IEEE Long Island, 2014) [1]. Here, we achieve a high payload with good visual quality stego video. Furthermore, the video compression is lossless so the video file size is strictly preserved for post-data embedding.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Mstafa, R.J., Elleithy, K.M.: A highly secure video steganography using Hamming code (7, 4). In: Systems, Applications and Technology Conference (LISAT), 2014 IEEE Long Island. IEEE (2014) Mstafa, R.J., Elleithy, K.M.: A highly secure video steganography using Hamming code (7, 4). In: Systems, Applications and Technology Conference (LISAT), 2014 IEEE Long Island. IEEE (2014)
2.
go back to reference Cao, Z., Yin, Z., Hu, H., Gao, X., Wang, L.: High capacity data hiding scheme based on (7, 4) Hamming code. SpringerPlus 5(1), 175 (2016)CrossRef Cao, Z., Yin, Z., Hu, H., Gao, X., Wang, L.: High capacity data hiding scheme based on (7, 4) Hamming code. SpringerPlus 5(1), 175 (2016)CrossRef
3.
go back to reference Hu, S.D.: A novel video steganography based on non-uniform rectangular partition. In: 2011 IEEE 14th International Conference on Computational Science and Engineering (CSE). IEEE (2011) Hu, S.D.: A novel video steganography based on non-uniform rectangular partition. In: 2011 IEEE 14th International Conference on Computational Science and Engineering (CSE). IEEE (2011)
4.
go back to reference Yadav, P., Mishra, N., Sharma, S.: A secure video steganography with encryption based on LSB technique. In: 2013 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC). IEEE (2013) Yadav, P., Mishra, N., Sharma, S.: A secure video steganography with encryption based on LSB technique. In: 2013 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC). IEEE (2013)
5.
go back to reference Dasgupta, K., Mandal, J.K., Dutta, P.: Hash based least significant bit technique for video steganography (HLSB). Int. J. Secur. Priv. Trust Manage. (IJSPTM) 1(2), 1–11 (2012) Dasgupta, K., Mandal, J.K., Dutta, P.: Hash based least significant bit technique for video steganography (HLSB). Int. J. Secur. Priv. Trust Manage. (IJSPTM) 1(2), 1–11 (2012)
6.
go back to reference Banik, B.G., Bandyopadhyay, S.K.: Image Steganography using BitPlane complexity segmentation and hessenberg QR method. In: Proceedings of the First International Conference on Intelligent Computing and Communication (pp. 623–633). Springer Singapore Banik, B.G., Bandyopadhyay, S.K.: Image Steganography using BitPlane complexity segmentation and hessenberg QR method. In: Proceedings of the First International Conference on Intelligent Computing and Communication (pp. 623–633). Springer Singapore
7.
go back to reference Fridrich, J., Du, R., Meng, L. Steganalysis of LSB encoding in color images. In: Proceedings of ICME 2000, Jul.–Aug. 2000, N.Y., USA Fridrich, J., Du, R., Meng, L. Steganalysis of LSB encoding in color images. In: Proceedings of ICME 2000, Jul.–Aug. 2000, N.Y., USA
8.
go back to reference Westfield, A., Pfitzmann, A.: Attacks on steganographic systems. In: Proceedings of 3rd Info. Hiding Workshop, Dresden, Germany, Sept. 28–Oct. 1, pp. 61–75 (1999) Westfield, A., Pfitzmann, A.: Attacks on steganographic systems. In: Proceedings of 3rd Info. Hiding Workshop, Dresden, Germany, Sept. 28–Oct. 1, pp. 61–75 (1999)
10.
go back to reference Xu, W., Wang, R.D., Shi, Y.Q.: Data hiding in encrypted H.264/AVC video streams by codeword substitution. IEEE Trans. Inform. Forens. Secur. 9(4), 596–606 (2014)CrossRef Xu, W., Wang, R.D., Shi, Y.Q.: Data hiding in encrypted H.264/AVC video streams by codeword substitution. IEEE Trans. Inform. Forens. Secur. 9(4), 596–606 (2014)CrossRef
Metadata
Title
A Secure High-Capacity Video Steganography Using Bit Plane Slicing Through (7, 4) Hamming Code
Authors
Ananya Banerjee
Biswapati Jana
Copyright Year
2018
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-8237-5_9