CFP last date
22 April 2024
Reseach Article

Data Hiding using Lazy Wavelet Transform Strategy

Published on March 2014 by Ekansh Agarwal, Shaili Gupta, Mayank Arya Chandra
International Conference on Advances in Computer Engineering and Applications
Foundation of Computer Science USA
ICACEA - Number 5
March 2014
Authors: Ekansh Agarwal, Shaili Gupta, Mayank Arya Chandra
0d3192ec-0582-4baa-be7d-3169cd38dfc6

Ekansh Agarwal, Shaili Gupta, Mayank Arya Chandra . Data Hiding using Lazy Wavelet Transform Strategy. International Conference on Advances in Computer Engineering and Applications. ICACEA, 5 (March 2014), 5-8.

@article{
author = { Ekansh Agarwal, Shaili Gupta, Mayank Arya Chandra },
title = { Data Hiding using Lazy Wavelet Transform Strategy },
journal = { International Conference on Advances in Computer Engineering and Applications },
issue_date = { March 2014 },
volume = { ICACEA },
number = { 5 },
month = { March },
year = { 2014 },
issn = 0975-8887,
pages = { 5-8 },
numpages = 4,
url = { /proceedings/icacea/number5/15639-1450/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Advances in Computer Engineering and Applications
%A Ekansh Agarwal
%A Shaili Gupta
%A Mayank Arya Chandra
%T Data Hiding using Lazy Wavelet Transform Strategy
%J International Conference on Advances in Computer Engineering and Applications
%@ 0975-8887
%V ICACEA
%N 5
%P 5-8
%D 2014
%I International Journal of Computer Applications
Abstract

Steganography is an art of hiding the secret information inside digitally covered information. The hidden message can be text, image, speech or even video and accordingly the cover can be chosen from either an image or a video. The message is concealed in lowest bits of cover. We shall perform steganography on videos and hide message in encrypted form, by this security is increased by two times. The mostly used technique is LSB (Least Significant Bit)[1] steganography. But instead of simple LSB technique, we will use Lazy Lifting Wavelet transform [2] and then apply LSB in the sub-bands of the video that has been obtained. The proposed approach will utilize the video as well as audio component to hide message, in video component we will hide the encrypted message and in audio we hide the length, up to which the message is hide in video, using LSB technique. Experimental results show that the proposed technique has a high payload capacity and low computational requirement.

References
  1. H S Manjunatha Reddy. Wavelet based Non LSB Steganography. Department of ECE, Global Academy of Technology, Bangalore-98, India
  2. Khushman Patel, Kul Kauwid Rora, Kamini Singh, Shekhar Verma. Lazy Wavelet Transform Based Steganography in Video. Dept of CSE, IIIT Allahabad, Allahabad (U. P. )
  3. Cryptography. From Wikipedia http://en. wikipedia. org/ wiki / Cryptography
  4. G. Doerr and J. L. Dugelay, "Security pitfalls of frame-byframe approaches to video," IEEE Trans. Sig. Proc. , vol. Supplement on Secure Media, no. 52, pp. 2955-2964, 2004.
  5. Symmetric key cryptography. From Wikipedia http://en. wikipedia. org/wiki/Symmetric_key_cryptography
  6. Public key cryptography. From Wikipedia http://en. wikipedia. org /wiki/Public-key_cryptography
  7. AES from http://en. wikipedia. org/wiki/ Advanced_ Encryption_ Standard
  8. Ashish T. Bhole, Rachna Patel. Steganography over Video File using Random Byte Hiding and LSB Technique Department of Computer Engineering, SSBT's COE & T, Bambhori, Jalgaon, India
  9. T. Natramizhnangai and R. SenthilRajan A Novel Steganography Method based on Integer Wavelet Transform and Genetic Algorithm.
  10. Ming Chen, "Analysis of Current Steganography Tools: Classifications & Features," in International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2006, pp. 384 – 387, 2006
  11. D. Artz, "Digital Steganography: Hiding Data within Data," IEEE Internet Computing Journal, June 2001.
  12. Mayank Arya Chandra Ravindra Purwar, Navin Rajpal "A Novel Approach of Digital Video Encryption" International Journal of Computer Applications (0975 – 8887) Volume 49– No. 4, July 2012
  13. Alligood, K. T. , Sauer, T. , Yorke, J. A. : Chaos: an introduction to dynamical systems. Springer, Heidelberg (1997).
  14. Devaney, R. L. :An introduction to chaotic dynamical systems, 2nd edn. West- view Press, San Francisco (2003).
  15. Yang, T. , Wu, C. W. , Chua, L. O. : Cryptography based on chaotic systems. IEEE Transactionson Circuits and Systems-I : Fundamental Theory and Applications 44, 469…472 (1997).
  16. Solak, E. : Cryptanalysis of observer based discrete-time chaotic encryption schemes. International Journal of Bifurcation and Chaos 15 (2), 653…658 (2005).
  17. He, J. , Qian, H. , Zhou, Y. , Li, Z. : Cryptanalysis and improvement of a block cipher based on multiple chaotic systems. Mathematical Problems in Engineering 2010,1…14 (2010).
  18. Mohd. Arif Siddique, Mayank Arya Chandra, Kunwar Babar Ali. "Improved Graphical Password Authentication using Dynamic Grid and Image Zoom" IJAER Volume 6, Number 18 (2011)
  19. Zeghid, M. , Machhout, M. , Khriji, L. , Baganne, A. , et al. : A modified AES based algorithm for image encryption. International Journal of Computer Science and Engineering 1 (1), 70…75(2007).
  20. Hongmei Tang, Gaochan Jin, Cuixia Wu and Peijiao Song, A New Image Encryption and Steganography Scheme, IEEE International Conference on Computer and Communications Security,2009, 60-63.
  21. R O El Safy, H H Zayed and A El Dessouki, An Adaptive Steganographic Technique Based on Integer Wavelet Transform, IEEE International Conference on Networking and Media Convergence, 2009, 111-117.
  22. Wang Z, Chang C, Lin C, Li M (2009) A reversible information hiding scheme using left-right and updown Chinese character representation. J Syst Softw 82:1362–1369
  23. Por, L. Y. , Wong, K. , Chee, K. O. , 2012. UniSpaCh: a text based data hiding method using unicode space characters. Journal of Systems and Software, http:// dx. doi. org/10. 1016/ j. jss. 2011. 12. 023.
Index Terms

Computer Science
Information Sciences

Keywords

Sub Bands Rgb Component Lazy Wavelet Lsb.