A Critical and Comparative Study of Data Immersing in Video Steganography

A Critical and Comparative Study of Data Immersing in Video Steganography

  IJETT-book-cover           
  
© 2022 by IJETT Journal
Volume-70 Issue-2
Year of Publication : 2022
Authors : Alaknanda S. Patil, G. Sundari
DOI :  10.14445/22315381/IJETT-V70I2P222

How to Cite?

Alaknanda S. Patil, G. Sundari, "A Critical and Comparative Study of Data Immersing in Video Steganography," International Journal of Engineering Trends and Technology, vol. 70, no. 3, pp. 195-200, 2022. Crossref, https://doi.org/10.14445/22315381/IJETT-V70I2P222

Abstract
Because of the rapid expansion of video data on the Internet, video steganography has grown in-demand options. Messages are increasingly being communicated on information superhighway platforms such as YouTube and Facebook, placing a greater real-time impact on the steganography of video. There are various methods for concealing data in video, each with its own set of advantages and disadvantages. Spatial domain methods, transform domain methods, and other methods are some of the several categorizations of current techniques depending on the embedding domain. Because pixel intensity determines how much data is preserved in the Spatial Domain approach, a significant quantity of data may be stored without being seen. However, the grade of video files may degrade after embedding particular sections. It is determined by the authentic multimedia files` colour depth, and the bit`s amount injected. The little deterioration is due to the high quality of the pixels and the use of fewer bits. This article`s goal is to provide an updated exhaustive review of the multiples of multimedia steganographic methods. When developing a decent steganographic algorithm, security, resilience, embedding payload, embedding efficiency and robustness against attackers are critical considerations. The concept of video steganography can be implemented with Matlab, Java and Python software.

Keywords
DNA, Data security, Data embedding, Imperceptibility, Steganography.

Reference
[1] A. Swathi and S. Jilani, Video steganography by LSB substitution using different polynomial equations, International Journal of Computational Engineering Research, 2(5) (2012) 1620-1623.
[2] B. Gupta, A MODIFIED APPROACH OF VIDEO STEGANOGRAPHY FOR INFORMATION HIDING, Compusoft, 7(8) (2018) 2803-2806.
[3] T. Idbeaa, S. Abdul Samad, and H. Husain, A secure and robust compressed domain video steganography for intra-and inter-frames using embedding-based byte differencing (EBBD) scheme, PLoS One, 11(3) (2016) p. e0150732.
[4] Z. S. Younus and G. T. Younus, Video steganography using Knight tour algorithm and LSB method for encrypted data, Journal of Intelligent Systems, 29(1) (2020) 1216-1225.
[5] G. S. Issac and J. Jose, Secured Transmission Of Image/Video By Performing Reversible Color Transformation, Procedia Technology, 24 (2016) 1032-1038.
[6] M. M. Sadek, A. S. Khalifa, and M. G. Mostafa, Video steganography: a comprehensive review, Multimedia tools and applications, 74(17) (2015) 7063-7094.
[7] Y. Wang, M. Tang, and Z. Wang, High-capacity adaptive steganography based on LSB and Hamming code, Optik, 213 (2020) 164685.
[8] M. Hashemzadeh, Hiding information in videos using motion clues of feature points, Computers & Electrical Engineering, 68 (2018) 14-25.
[9] P. Dixit, M. Trivedi, A. Gupta, V. Yadav, and V. Singh, Video Steganography using Concept of DNA Sequence and Index Compression Technique, 5 (2019) 408-417.
[10] K. Dasgupta, J. K. Mondal, and P. Dutta, Optimized video steganography using genetic algorithm (GA), Procedia Technology, 10 (2013) 131-137.
[11] A. Fatnassi, H. Gharsellaoui, and S. Bouamama, Towards Novel Video Steganography Approach for Information Security, Procedia Computer Science, 159 (2019) 953-962.
[12] K. Dasgupta, J. Mandal, and P. Dutta, Hash-based least significant bit technique for video steganography (HLSB), International Journal of Security, Privacy and Trust Management (IJSPTM), 1(2) (2012) 1-11, 2012.
[13] V. Bodhak and L. Gunjal, Improved protection in video Steganography using DCT & LSB" international journal of engineering and innovative technology (IJEIT) , 1(4) (2012).
[14] D. Gaikwad, T. Jagdale, S. Dhanokar, A. Moghe, and A. Pathak, Hiding the Text and Image Message of Variable Size Using Encryption and Compression Algorithms in Video Steganography, International Journal of Engineering Research and Applications (IJERA), 1(2) (2014) 102-108.
[15] P. Bhautmage, A. Jeyakumar, and A. Dahatonde, Advanced video steganography algorithm, International Journal of Engineering Research and Applications, 3(1) (2013) 1641-1644.
[16] H. Gupta and S. Chaturvedi, Video steganography through LSB based hybrid approach, International Journal of Computer Science and Network Security (IJCSNS), 14(3) (2014) 99.
[17] R. Banupriya, J. Deepa, and S. Suganthi, Video steganography using LSB algorithm for security application, International Journal of Mechanical Engineering and Technology, 10(1) (2019) 203-211.
[18] V. Kapoor and A. Mirza, An enhanced LSB based video steganographic system for secure and efficient data transmission, International Journal of Computer Applications, 121(10) (2015).
[19] R. J. Mstafa and K. M. Elleithy, A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error- correcting codes, Multimedia Tools and Applications, 75(17) (2013) (2016) 10311-10333.
[20] A. M. Aaref, Video steganography using LSB substitution and Sobel edge detection, Diyala Journal of Engineering Sciences, 11(2) (2018) 67-73.
[21] S. e. Abed, M. Al-Mutairi, A. Al-Watyan, O. Al-Mutairi, W. AlEnizy, and A. Al-Noori, An Automated Security Approach of Video Steganography–Based LSB Using FPGA Implementation, Journal of Circuits, Systems and Computers, 28(5) (2019) 1950083.
[22] Y. Cao, H. Zhang, X. Zhao, and H. Yu, Video steganography based on optimized motion estimation perturbation, in Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, (2015) 25-31.
[23] N. Kar, K. Mandal, and B. Bhattacharya, Improved chaos-based video steganography using DNA alphabets,ICT Express, 4(1) (2018) 6-13.
[24] A. S. Patil and G. Sundari, Pixel Value Difference based Face Recognition for Mitigation of Secret Message Detection.