CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Hiding Data in video Sequences using LSB with Elliptic Curve Cryptography

by Ravneet Kaur, Tanupreet Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 117 - Number 18
Year of Publication: 2015
Authors: Ravneet Kaur, Tanupreet Singh
10.5120/20658-3296

Ravneet Kaur, Tanupreet Singh . Hiding Data in video Sequences using LSB with Elliptic Curve Cryptography. International Journal of Computer Applications. 117, 18 ( May 2015), 36-40. DOI=10.5120/20658-3296

@article{ 10.5120/20658-3296,
author = { Ravneet Kaur, Tanupreet Singh },
title = { Hiding Data in video Sequences using LSB with Elliptic Curve Cryptography },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 117 },
number = { 18 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 36-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume117/number18/20658-3296/ },
doi = { 10.5120/20658-3296 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:59:46.492479+05:30
%A Ravneet Kaur
%A Tanupreet Singh
%T Hiding Data in video Sequences using LSB with Elliptic Curve Cryptography
%J International Journal of Computer Applications
%@ 0975-8887
%V 117
%N 18
%P 36-40
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Multimedia data security is becoming important with the continuous increase of digital communication on the internet. Without having privacy of data there is no meaning of doing communication using extremely high end technologies. Data encryption is suitable method to protect data, where as steganography is the process of hiding secret information inside some carrier. This paper focus on utilization of digital video/images as a cover to hide data and for insisting more security encryption is done with steganography. In the proposed method encrypting message image with ECC and hiding encrypted image using LSB within cover video. It gives a high level of authentication, security and resistance against extraction by attacker. As ECC offer better security with smaller key sizes, results in faster computation , lower power consumption as well as memory and bandwidth saving.

References
  1. Lifang Yu,Yao Zhao,"Improved Adaptive LSB Steganography Based on Chaos and Genetic algorithm",EURASIP Journal on Advances in Signal Processing 2010,2010:876946 doi:10. 1155/2010/876946
  2. Samta Gajbhiye ,Dr. sanjeev Karmakar"Application of Elliptic curve Method in cryptography:A Literature Review", (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 3 (3) , 2012,4499 – 4503
  3. Tarun Narayan Shankar, G. Sahoo," Cryptography by Karatsuba Multiplier with ASCII Codes" ©2010 International Journal of Computer Applications (0975 – 8887) Volume 1 – No. 12
  4. B. N Jagdale ,R. K Bedi"Securing MMS with high performance Elliptic curve cryptography",International journal of computer applications (0975-8887)volume 8-No. 7,October 2010
  5. Dr. ParmaNand Astya, Ms. Bhairvee Singh," IMAGE ENCRYPTION AND DECRYPTION USING ELLIPTIC CURVE CRYPTOGRAPHY" IJARSE, Vol. No. 3, Issue No. 10, October 2014 ISSN-2319-8354(E)
  6. S. Maria Celestin Vigila , K. Muneeswaran," Implementation of Text based Cryptosystem using Elliptic Curve Cryptography". 978-1-4244-4787-9/09/$25. 00 ©2009 IEEE
  7. Hailiza Kamarulhaili and Liew Khang Jie," Elliptic Curve Cryptography and Point Counting Algorithms" www. intechopen. com
  8. Shery Elizabeth Thomas, Sumod Tom Philip," Advanced Cryptographic Steganography Using Multimedia Files", International Conference on Electrical Engineering and Computer Science (ICEECS-2012), May 12th, 2012, Trivendum, ISBN Number : 978-93-81693-58-2
  9. Elliptic curve cryptography,an implementation Guide,Anoop MS
  10. Rosziati Ibrahim and Teoh Suk Kuan," Steganography Algorithm to Hide Secret Message inside an Image" Computer Technology and Application 2 (2011) 102-108
  11. C Abikoye Oluwakemi "Efficient Data Hiding System using Cryptography and Steganography "International Journal of Applied Information Systems (IJAIS) ISSN: 2249-0868 Foundation of Computer Science FCS, New York, USA Volume 4 – No. 11, December 2012 –www. ijais. org
  12. Jolly shah and Dr. Vikas Saxena," Video Encryption: A Survey", IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 2, March 2011 ISSN (Online): 1694-0814,www. IJCSI. org
  13. Saraswati Singh, Nilmani Verma," A Survey Report on Video Encryption and Decryption Techniques" International Journal of Computer Science and Mobile Computing, Vol. 3 Issue. 12, December- 2014, pg. 270-274.
  14. Unik Lokhande,"An Effective Way of using LSB Steganography in images along with Cryptography" International Journal of Computer Applications (0975 – 8887) Volume 88 – No. 12, February 2014
  15. Shamim Ahmed Laskar1 and Kattamanchi Hemachandran," High Capacity data hiding using LSB Steganography and Encryption", International Journal of Database Management Systems ( IJDMS ) Vol. 4, No. 6, December 2012
  16. Sujay, N. and Gaurav, P. 2010. "Two New Approaches for Secured Image Steganography Using Cryptographic Techniques and Type Conversions". Signal & Image Processing: An International Journal (SIPIJ), 1(2), pp 60-73.
  17. Pranab Garg ,Jaswinder singh Dilawari"A Review paper on cryptography and significance of key lengh" International journal of computer science and communication Engineering. IJCSCE Special issue on "Emerging Trends in Engineering" ICETIE 2012
  18. Li, S. , Chen, G. , Zheng, X. : Multimedia security handbook. Internet and Communications Series, vol. 4, chap. Chaos-Based Encryption for Digital Images and Videos, pp. 133–167. CRC Press, West Palm Beach (2004)
  19. C. -K. Chan and L. -M. Cheng,"Hiding data in images by simple lsb substitution," Pattern Recognition, vol. 37, no. 3, pp. 469–474, 2004.
  20. Y. Zhang, F. Zuo, Z. Zhai, and C. Xiao bin, "A new image encryption algorithm based on multiple chaos system," in Proceedings of the International Symposium on Electronic Commerce and Security (ISECS '08), pp. 347–350, August 2008.
  21. O. CETIIN and A. OZCERIT, "A new Steganography Algorithm Based on Color Histograms for Data Embedding into Raw Video Streams", Elsevier Ltd ,Computers & Security, Sakarya University, Turkey,Vol. 28, pp. 670-682 , 2009.
  22. S. Suma Christal Mary, "Improved Protection in Video Steganopgraphy Used Compressed Video Bit stream," International Journal on Computer Science and Engineering Vol. 02, No. 03, 2010, 764-766, ISSN: 0975-3397
  23. A. Vashistha, R. Nallusamy, A. Das, S. Paul, "Watermarking video content using visual cryptography and scene averaged image", 2010 IEEE International Conference on Multimedia and Expo, pg. 1641-1646, September 2010
  24. J. Shah, V. Saxena, "Video Encryption: A Survey" International Journal of Computer Science Issues, Vol. 8, No. 2, pg. 525-534, March 2011
  25. M. Abomhara,, Omar Zakaria, Othman O. Khalifa "An Overview of Video Encryption Techniques", International Journal of Computer Theory and Engineering, Vol. 2, No. 1 February, 2010 1793-8201.
  26. Vismita Nagrale, Ganesh Zambre and Aamir Agwani, "Image Stegano-Cryptography Based on LSB Insertion & Symmetric Key Encryption", International Journal of Electronics and Communication Engineering & Technology (IJECET), Volume 2, Issue 1, 2011, pp. 35 - 42, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472.
  27. Sharma V. K. , Shrivastava V. ,"A steganography algorithm for hiding image in image by improved LBS substitution by minimize detection", Journal of Theoretical and Applied Information Technology, Vol. 36, No. 1,pp. 1-8, 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Cover Video Steganography Elliptic curve cryptography (ECC) PSNR(Peak signal to noise ratio) MSE (Mean square error)