Lightweight and Optimized Multi-Layer Data Hiding using Video Steganography Paper
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 12
Abstract
The ever-escalating attacks on the internet network are due to rapid technological growth. In order to surmount such challenges, multi-layer security algorithms were developed by hybridizing cryptography and steganography techniques. Consequently, the overall memory size became enormous while hybridizing these techniques. On the other side, the least significant bit (LSB) and modified LSB replacing approaches could provide the variability as detected by steganalysis technique, most found to be susceptible to attack too due to numerous reasons. To overcome these issues, in this paper a lightweight and optimized data hiding algorithm is proposed which consume less memory, provide less variability, and robust against histogram attacks. The proposed steganography system was achieved in two stages. First, data was encrypted using lightweight BORON cipher that only consumed less memory as compared to conventional algorithm such as 3DES, AES. Second, the encrypted data was hidden in the complemented or non-complemented form to obtain minimal variability. The performance of the proposed technique was evaluated in terms of avalanche effect, visual quality, embedding capacity and peak signal to noise ratio (PSNR). The results revealed that the lightweight BORON cipher could produce approximate same avalanche effect as the AES algorithm produced. Furthermore, the value of PSNR had shown much improvement in comparison to optimization algorithm GA.
Authors and Affiliations
Samar kamil, Masri Ayob Authors, Siti Norul Huda Sheikh Abdullah, Zulkifli Ahmad
A Secured Interoperable Data Exchange Model
Interoperability enables peer systems to communicate with each other and use the functionality of peer systems effectively. It improves ability for different systems to exchange information between cooperative systems. I...
Multivariate Copula Modeling with Application in Software Project Management and Information Systems
This paper discusses application of copulas in software project management and information systems. Successful software projects depend on accurate estimation of software development schedule. In this research, three maj...
Proposal for Scrambled Method based on NTRU
Scrambling is widely used to protect the security of data files such as text, image, video or audio files; however, it is not the most efficient method to protect the security of the data files. This article uses NTRU pu...
On the Probability of Detection Ability in Observing Dynamic Environmental Phenomena using Wireless Sensor Networks
Wireless Sensor Network (WSN) is being utilised for several purposes in military and civil domains, including surveillance, monitoring, and management, where networked sensors monitor and detect an event of interest and...
A Framework to Improve Communication and Reliability Between Cloud Consumer and Provider in the Cloud
Cloud services consumers demand reliable methods for choosing appropriate cloud service provider for their requirements. Number of cloud consumer is increasing day by day and so cloud providers, hence requirement for a c...