CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Secure Video Steganography based on Discrete Wavelet Transform and Arnold Transform

by Abhinav Thakur, Harbinder Singh, Shikha Sharda
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 123 - Number 11
Year of Publication: 2015
Authors: Abhinav Thakur, Harbinder Singh, Shikha Sharda
10.5120/ijca2015905596

Abhinav Thakur, Harbinder Singh, Shikha Sharda . Secure Video Steganography based on Discrete Wavelet Transform and Arnold Transform. International Journal of Computer Applications. 123, 11 ( August 2015), 25-29. DOI=10.5120/ijca2015905596

@article{ 10.5120/ijca2015905596,
author = { Abhinav Thakur, Harbinder Singh, Shikha Sharda },
title = { Secure Video Steganography based on Discrete Wavelet Transform and Arnold Transform },
journal = { International Journal of Computer Applications },
issue_date = { August 2015 },
volume = { 123 },
number = { 11 },
month = { August },
year = { 2015 },
issn = { 0975-8887 },
pages = { 25-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume123/number11/22004-2015905596/ },
doi = { 10.5120/ijca2015905596 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:12:26.944339+05:30
%A Abhinav Thakur
%A Harbinder Singh
%A Shikha Sharda
%T Secure Video Steganography based on Discrete Wavelet Transform and Arnold Transform
%J International Journal of Computer Applications
%@ 0975-8887
%V 123
%N 11
%P 25-29
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Internet has made so easy to transfer the large amount of data in different parts of the world. So, the security and safety of information has become the major concern. This problem has led to the development of steganography techniques. This paper deals with data hiding technique in which the secret data is embedded into the cover video. Firstly, cover video is decomposed into different frames. A single level Discrete Wavelet transform is applied on selected frame and on secret image. A private key is used during the process of encoding and decoding to provide high security. Then the Inverse Discrete Wavelet Transformation (IDWT) is applied to get the stego-video. The performance parameters like Peak Signal to Noise Ratio (PSNR) and Mean Square Error (MSE) can be calculated to determine the quality of stego video. The results show that the proposed algorithm for steganography is highly secured with good perceptual invisibility.

References
  1. C.S. Lu, “Multimedia security: steganography and digital watermarking techniques for protection of intellectual property”. Artech House, Inc. (2003).
  2. J.J. Chae and B.S. Manjunath, “Data hiding in Video” Proceedings of the 6th IEEE International Conference on Image Processing, Kobe, Japan (1999).
  3. Provos, N., Honeyman, P., “Hide and Seek: An Introduction to Steganography” IEEE Security & Privacy Magazine 1 (2003).
  4. Y. Wang, E. Izquierdo, “High-Capacity Data Hiding in MPEG-2 Compressed Video”, 9th International Workshop on Systems, Signals and Image Processing, UK, 2002.
  5. Mrudul Dixit, “Video Steganography” International Conference on Pervasive Computing (ICPC) 2015.
  6. Balaji R., “Secure Data Transmission Using Video Steganography”, IEEE international conference on Electro/Information Technology (EIT) 2011
  7. Richa K., “Video Steganography by LSB Technique using Neural Network”, Sixth International Conference on Computational Intelligence and Communication Networks 2014.
  8. Patel, K., “Lazy Wavelet Transform Based Steganography in Video”, International conference on communication systems and network technologies (CSNT) 2013.
  9. Qingzhong Liu,”Video Steganalysis Based on the Expanded Markov and Joint Distribution on the Transform Domains Detecting MSU Stego video” ICMLA '08. Seventh International Conference on Machine Learning and Applications2008.
  10. Noda, H., “Application of BPCS steganography to wavelet compressed video”, Image Processing, 2004. ICIP '04. 2004 International Conference on  (Volume:4)
  11. Lingling Wu et al., “Arnold Transformation Algorithm and Anti-Arnold Transformation algorithm”, the 1stInternational conference on information Science and Engineering (ICISE2009).
  12. Prabakaran. G and Bhavani .R, “A Modified Secure Digital Image Steganography Based on Discrete Wavelet Transform”, 2012 International Conference on Computing, Electronics and Electrical Technologies [ICCEET].
Index Terms

Computer Science
Information Sciences

Keywords

Alpha Blending Arnold Transform DWT PSNR Video Steganography.