Lightweight and Optimized Multi-Layer Data Hiding using Video Steganography Paper
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 12
Abstract
The ever-escalating attacks on the internet network are due to rapid technological growth. In order to surmount such challenges, multi-layer security algorithms were developed by hybridizing cryptography and steganography techniques. Consequently, the overall memory size became enormous while hybridizing these techniques. On the other side, the least significant bit (LSB) and modified LSB replacing approaches could provide the variability as detected by steganalysis technique, most found to be susceptible to attack too due to numerous reasons. To overcome these issues, in this paper a lightweight and optimized data hiding algorithm is proposed which consume less memory, provide less variability, and robust against histogram attacks. The proposed steganography system was achieved in two stages. First, data was encrypted using lightweight BORON cipher that only consumed less memory as compared to conventional algorithm such as 3DES, AES. Second, the encrypted data was hidden in the complemented or non-complemented form to obtain minimal variability. The performance of the proposed technique was evaluated in terms of avalanche effect, visual quality, embedding capacity and peak signal to noise ratio (PSNR). The results revealed that the lightweight BORON cipher could produce approximate same avalanche effect as the AES algorithm produced. Furthermore, the value of PSNR had shown much improvement in comparison to optimization algorithm GA.
Authors and Affiliations
Samar kamil, Masri Ayob Authors, Siti Norul Huda Sheikh Abdullah, Zulkifli Ahmad
Impediments of Activating E-Learning in Higher Education Institutions in Saudi Arabia
This paper presents the real reasons which constraint the application of the E-learning in higher education institutions in Saudi Arabia (Case study: Qassim University)and some suggested solutions. A questionnaire has be...
A Decision Tree Approach for Predicting Student Grades in Research Project using Weka
Data mining in education is an emerging multidiscipline research field especially with the upsurge of new technologies used in educational systems that led to the storage of massive student data. This study used classifi...
An Anti-Pattern-based Runtime Business Process Compliance Monitoring Framework
Today's dynamically changing business and com-pliance environment demand enterprises to continuously ensure their compliance with various laws, regulations and standards. Several business studies have concluded that comp...
Extracting Code Resource from OWL by Matching Method Signatures using UML Design Document
Software companies develop projects in various domains, but hardly archive the programs for future use. The method signatures are stored in the OWL and the source code components are stored in HDFS. The OWL minimizes the...
E-shape Multiband Patch Antenna for 4G, C-band and S-band Applications
In this study, a new E shape mounted on minowaki island patch antenna on FR4 substrate is presented for communication systems applications. With insertion of shortening pin between patch and ground plane, the proposed st...