CFP last date
20 May 2024
Reseach Article

Efficient Steganography on Video File using Discrete Cosine Transform Method (DCTM)

by Ononiwu R. N., Okengwu U. A.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 176 - Number 11
Year of Publication: 2020
Authors: Ononiwu R. N., Okengwu U. A.
10.5120/ijca2020920051

Ononiwu R. N., Okengwu U. A. . Efficient Steganography on Video File using Discrete Cosine Transform Method (DCTM). International Journal of Computer Applications. 176, 11 ( Apr 2020), 22-28. DOI=10.5120/ijca2020920051

@article{ 10.5120/ijca2020920051,
author = { Ononiwu R. N., Okengwu U. A. },
title = { Efficient Steganography on Video File using Discrete Cosine Transform Method (DCTM) },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2020 },
volume = { 176 },
number = { 11 },
month = { Apr },
year = { 2020 },
issn = { 0975-8887 },
pages = { 22-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume176/number11/31246-2020920051/ },
doi = { 10.5120/ijca2020920051 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:42:14.312373+05:30
%A Ononiwu R. N.
%A Okengwu U. A.
%T Efficient Steganography on Video File using Discrete Cosine Transform Method (DCTM)
%J International Journal of Computer Applications
%@ 0975-8887
%V 176
%N 11
%P 22-28
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The desire to keep sensitive information and communications secret for many decades, and potential generations have been paramount. In this era of digital media and internet communications, the needs seem more pressing as lots of information and people’s conversations are been tracked, stolen, manipulated and pirated. Steganography is the art of hiding a message, a covert substance (stego) so that only the sender and the intended recipient know that there is a message contained in the substance or the stego. It can also be stated to be the fine art of hiding information. This means that hiding message in a carrier file enables the deniability of the existence of that message. This work provides an overview of steganography, designs software to illustrate specific steganography methods and recent developments in the field. The methodology used to develop this work was object-oriented analysis and design methodology (OOAD), and the programming language used is Java programming language which is based on classes and objects as it took care of compatibility over multiple operating systems. The work was done by embedding text file in a video frame (video file) in such a manner that the video file does not lose its functionality using Discrete Cosine Transform Method (DCTM). This method strives for high data security to a hacker’s inability to detect the existence of a hidden message or information.

References
  1. Fridrich, J., Goljan, M., and Du R., (2001) “Detecting LSB Steganography in Color and Grayscale Images,” IEEE Trans Multimedia Special Issue on Security, vol 8, Issue 4, pp. 22–28.
  2. Mamta Juneja, Parvinder S. Sandhu, and Ekta Walia, (2009) "Application of LSB Based Steganographic Technique for 8-bit Color Images”, WASET. https://zenodo.org/record/1086191#.Xk_Hf_lKjIU
  3. Mazdak Zamani, Azizah A. Manaf, Rabiah B. Ahmad, Akran M. Zeki and Shahidan Abdullah, (2009) “A Genetic- Algorithm-Based Approach for Audio Steganography” International Journal of Computer, Electrical, Automation, Control and Information Engineering, WASET. vol 3, no 6, https://pdfs.semanticscholar.org/7126/6c91b0806c851238ee328af2806b852a3723.pdf
  4. Neil F. Johnson and Jajodia S., (1998) Exploring Steganography. Seeing the Unseen, IEEE Computer, vol. 31, issue 2, pp 26 - 34. https://ieeexplore.ieee.org/document/4655281/keywords#keywords
  5. Niels Provos and Peter Honeyman, (2003 ), “Hide and Seek: An Introduction to Steganography”, IEEE Security and Privacy Magazine. vol 1, issue 3, pp 32 - 44
  6. Petitcolas, F.A.P., Anderson, R. J., and Kuhn, M. G., (1999) “Information Hiding - A Survey,” Proceedings of the IEEE. Vol 87, issue 7, pp 1062 – 1078.
  7. Shannon, C. E. A (1948) Mathematical Theory of Communication; Bell System Technical Journal, vol. 27, pp 379 - 423
  8. Simmons, G. J., (2010) “The Prisoners’ Problem and The Subliminal Channel, in Advances in Cryptology”; Proceedings of Crypto 83 (D. Chaum, ed.), Plenum Press, vol 12.9, pp 51-67
  9. Sutaone, M.S., Khandare M. V., (2008) "Image based Steganography using LSB insertion technique”, IET. https://ieeexplore.ieee.org/document/4470096/authors#authors
  10. Andreas Westfeld and Andreas Pfitzmann, (2000) “Attacks on Steganographic Systems - Breaking the Steganographic Utilities EzStego, Jsteg, Steganos, and S Tools - and Some Lessons Learned,” Lecture Notes in Computer Science, pp 61-75. https://pdfs.semanticscholar.org/4ffa/35072f8fab9efa7c17905c1735eeb502b1de.pdf?_ga=2.104924611.1927448487.1582298768-1200129864.1582211187
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Cryptography Steganalysis