CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

A Proposed Technique for Hiding Encrypted Data in Video Files

by Mohamed El-bayoumy, Mohamed El-mogy, Ahmed Abou El-fetouh, Rasha El-hadary
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 79 - Number 10
Year of Publication: 2013
Authors: Mohamed El-bayoumy, Mohamed El-mogy, Ahmed Abou El-fetouh, Rasha El-hadary
10.5120/13780-1653

Mohamed El-bayoumy, Mohamed El-mogy, Ahmed Abou El-fetouh, Rasha El-hadary . A Proposed Technique for Hiding Encrypted Data in Video Files. International Journal of Computer Applications. 79, 10 ( October 2013), 38-42. DOI=10.5120/13780-1653

@article{ 10.5120/13780-1653,
author = { Mohamed El-bayoumy, Mohamed El-mogy, Ahmed Abou El-fetouh, Rasha El-hadary },
title = { A Proposed Technique for Hiding Encrypted Data in Video Files },
journal = { International Journal of Computer Applications },
issue_date = { October 2013 },
volume = { 79 },
number = { 10 },
month = { October },
year = { 2013 },
issn = { 0975-8887 },
pages = { 38-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume79/number10/13780-1653/ },
doi = { 10.5120/13780-1653 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:52:41.560685+05:30
%A Mohamed El-bayoumy
%A Mohamed El-mogy
%A Ahmed Abou El-fetouh
%A Rasha El-hadary
%T A Proposed Technique for Hiding Encrypted Data in Video Files
%J International Journal of Computer Applications
%@ 0975-8887
%V 79
%N 10
%P 38-42
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Computer technology and the Internet have made a breakthrough in the existence of data communication. Securing the data transfer over a transmission media has become of great importance. This has opened a new way of implementing steganography to ensure secure data transfer. Steganography is the fine art of hiding the information. Hiding a message in a carrier file enables the deniability of the existence of any message at all. This paper proposes a steganographic technique to hide text data in a computer video file. The proposed data hiding system's objectives are: storage capacity, perceptual invisibility, strength against detection attacks and distortion resistance.

References
  1. O. Goldreich, 2004. "Foundations of Cryptography: Volume 2, Basic Applications". Vol. 2. Cambridge university press.
  2. Debnath Bhattacharyya, P. Das, S. Mukherjee, D. Ganguly, S. K. Bandyopadhyay, Tai-hoon Kim,2009. "A Secured Technique for Image Data Hiding", Communications in Computer and Information Science, Springer, Vol. 29, pp. 151-159.
  3. BablooSaha and Shuchi Sharma, 2012. Defence Science Journal, Vol. 62, No. 1, pp. 11-18.
  4. The steganography basics (http://www. infosyssec. com/infosyssec/Steganography/basics. htm), last accessed 12-02-2013.
  5. AlohaSinha, Kehar Singh, 2003. "A technique for image encryption using digital signature", Optics Communications, Vol-2, pp 229-234.
  6. Panduranga H. T, Naveen Kumar S. K,"Hybrid approach for Image Encryption Using SCAN Patterns and Carrier Images", International Journal on Computer Science and Engineering Vol. 02, pp. 297-300, 2010.
  7. Chin-Chen Chang, Min-Shian Hwang, Tung-Shou Chen, "A new encryption algorithm for image cryptosystems", The Journal of Systems and Software, pp 83-91, 2001.
  8. Mohammad Ali BaniYounes and AmanJantan, 2008. "Image Encryption Using Block-Based Transformation Algorithm", IAENG International Journal of Computer Science, 35.
  9. FrankHartung, Martin Kutter, 1999. "Multimedia Watermarking Techniques", Proceedings of the IEEE, Vol. 87, No. 7, pp. 1085 – 1103.
  10. C. K. Chan, L. M. Chen, 2004. " Hiding data in images by simple LSB substitution", Pattern Recognition, Vol. 3, pp. 469-474.
  11. Fridrich, J. ,''A new steganographic method for palette-based images1999 ''. IS&T PICS, Savannah, Georgia, pp. 285–289.
  12. R. Amirtharajan, Sandeep K. Beher, Motamarri A. Swarup, Mohamed Ashfaaq, John Bosco and Balaguru Rayappan. 2010. "Colour Guided Colour Image Steganography", Universal Journal of Computer Science and Engineering Technology, Volume 1, pp. 16 – 23.
  13. C. M. Wang, N. I. Wu, C. S. Tsai, M. S. Hwang, 2008. "A high quality steganography method with pixel-value differencing and modulus function", J. Syst. Software 81, pp. 150–158.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Encryption Least Significant Bit Optimal Pixel adjustment Procedure.