The Non-Tangible Masking of Confidential Information Using Video Steganography

The Non-Tangible Masking of Confidential Information Using Video Steganography

International Journal of Computer Applications (0975 – 8887) Volume 119 – No.17, June 2015 The Non-Tangible Masking of Confidential Information using Video Steganography Ramandeep Kaur Pooja Varsha Mtech Scholar (CSE) Assistant Professor (CSE) Assistant Professor (CSE) CTIEMT, Shahpur CTIEMT, Shahpur CTIEMT, Shahpur Jalandhar (Punjab) Jalandhar (Punjab) Jalandhar (Punjab) ABSTRACT hidden in such a manner that it should not be visible and there Video Steganography is a new research area which is playing should be no distortion in the secret message [2]. an important role in information hiding criteria. Nowadays Steganography can be divided into two types: security of confidential information is major issue over the a) Fragile: In this type of steganography, we embed internet. To protect the secret information from cyber information into a file which can be destroyed if the file criminals like attackers, hackers and data thefts, a secure and is modified by attackers. I.e. cryptography and standardized methodology is used that is known as encryption. steganography. It is beneficial for society to secure private b) Robust: Its aim is to embed information into a file which data from being misused by unauthorized person. It is used for cannot easily be destroyed by hackers and can’t be easily providing authentication to right users. For example, we can identify to make changes. I.e. digital watermarking and protect our confidential emails from our rivals over network digital steganography. using steganography concept. In this paper, we present a basic review about video steganography. Our aim is to provide a full-fledged knowledge about the basis of video IS Techniques steganography. This paper includes basic information about video steganography, its techniques and steganalysis with all type of attacks and applications of steganography in real life. Cryptography Information Hiding General Terms Information Hiding, Image, Video, Quality, Security, Steganography Copyright Perceptibility, human Visual system (HVS). Protection Keywords Steganography, Watermarking, Cryptography, LSB, DCT, Symmetric/ Biometri cs Watermarking DWT, Steganalysis attacks. Asymmetric Key Based 1. INTRODUCTION In the digitized environment, security and privacy are major Fingerprints, Visible/ Invisible concern while sharing the private information over the Retina matching Watermarking network. Hackers are always be ready to gain access over our etc. confidential information and may harm or misused it for their Fig 1: Classification of Information Security own profits. To protect our data from such type of cyber criminals or thefts, we use the concept of data hiding. Data 2. HISTORY OF STEGANOGRPAHY hiding is a very secure phenomenon to secure confidential From the ascent time, steganography was used to hide secrets information by hiding it from human visual system (HVS) and for invisible communication. In Histories the Greek either by encrypting or behind a physical or logical medium. historian Histaeus write a secret message to his son-in-law, There is various information security techniques are available who wants to secretly communicate with him in Greece. He to protect significant information from active or passive shaved the head of his most trustfully slave and tattooed the attacks such as cryptography, Digital watermarking and message ion his head. When the slave’s hair grew back, he Biometrics. Steganography is a major part of information sent him with the hidden message. In the Second World War security techniques [1]. the Microdot technique was developed by the Germans. 1.1 Steganography Candle and wax or some software’s were used to embed secret information. But nowadays digital media is used to hide Steganography is an art and science of invisible information behind any type of media file (image, text, video, communication, which is used to hide information and audio etc). It is also known as digital steganography. provide secret communication between two parties without Nowadays, Steganography is used for both legal and illegal being noticed by third party member. It is an information purposes. People are using this process for spreading hiding technique that hides the presence of secret information computer viruses, for hacking legal data of an organization, inside a media. The steganography word is originated from which is a very important concern of this field. So before Greek work, which is the combination of two words i.e. procuring from cyber criminals, we must know the ways ‘Steganós’ means covered/secret and ‘Grafis’ means writing. through which hackers are misusing steganography process. Literally, it is known as covered writing in which we conceal the secret message behind a cover. The information should be 19 International Journal of Computer Applications (0975 – 8887) Volume 119 – No.17, June 2015 2.1 Recent Advances in Steganography Steganographic system (watermarking systems). Both cases 9/11 Case are explained as follow: The terrorists are said to have been using popular web • In cryptographic system, attackers can easily break the locations to share crafted files containing hidden information. encrypted code by applying various attacks & can read Technical Magazine the secrete message by using words transposition and A technical magazine jahid was reported as a stego file that line shifting methods. contained instructions on crafting Steganographic message. Printer Steganography • A Steganographic/watermarking system can be broken In 2004, a report emerged; revealing that certain printer in to two stages: either the attacker can visually detect manufactures enriched their products with the capacity to hide that steganography/watermarking has been used; or the tracking information in printouts using yellow tracking dots attacker can read, modify or remove the hidden message coded machine ID number. by applying various attacks. Photo Sharing websites (Picasa and Flicker) Steganography methods do not deal with robustness because In 2010, scientists at Georgia Tech had created a method of they have no need to provide more security against the communication by means of popular photo-sharing sites like attempts of removing hidden message. But, Watermarking Picasa and flicker to hide short text message in multiple methods must have high robustness to provide resistance pictures and from which data can retrieved by means of against the attempt of removing and modification of a hidden combining pictures using collage programs. message. Watermarking is used to protect media file from Hidden message in printed arrays of microbes being pirated whereas steganography is used to protect the Tufts University has showed in 2011 that information can be secret message behind media file. hidden within the aid of bacteria processing by changing color values of glowing pixels. Table1. Differences between Crypto, Stegno, and Malware and worms spreading Watermark systems Computer worms can be used to transfer hijacked data. Android malware (recent report on 30 Jan 2012) was created Parameters Crypto Stegno Watermark in which images are used to hide information on sending Modification Protect and Protect SMS. Goal of data for hide secret carrier from Computer Games security information being pirated Multiplayer games may be good cover for covert communication. Digital Files(Text, Type of Multimedia Text image, carrier Files 3. COMPERISSION OF audio, STEGANOGRAPHY WITH video) CRYPTOGRAPHY & DIGITAL Imperceptible No Yes Yes WATERMARKING As steganography, cryptography and watermarking are information hiding tools. But still they have some difference Robustness No May be Yes which is described as below: Detection is Resist to Complex 3.1 Steganography vs. Cryptography Attacks Both are information security techniques but both have easy attacks detection different perceptive. Cryptography scrambles/move a message bits in an unreadable format using encryption algorithm. But 4. CATEGORIES OF attackers can easily sniff the packets by applying various STEGANOGRAPHY attacks. Whereas steganography hides the presence of secret On the basis of digital media, steganography is categorized message using covert channel and can’t be seen by human into four categories as shown below: [4] eye. To provide more security to our data, we can use both techniques together to provide one layer more protection to Digital Steganography data. Cryptography hides the original information of message by modifying the content into unreadable format and steganography hides existence of secret message. 3.2 Steganography vs. Digital Text Image Audio Network /Video Watermarking Steganography is a concept of one - to – one communication because it is the communication between sender and receiver FORMATS only and supports to uncasting mechanisms. Whereas watermarking is a concept of one - to - many IMAGE AUDIO VIDEO communications, in which we broadcast the watermarked data to multiple users at a time [16]. Generally, cryptography is BMP, PNG, WAVE, MP4, about protecting the content of secret messages; JPEG, TIF, AVI steganography is about concealing the presence of secret GIF MP3 etc message behind cover media file. The breaking concept of both systems is different i.e. cryptographic and Fig 2: Categories of Steganography 20 International Journal of Computer Applications (0975 – 8887) Volume 119 – No.17, June 2015 4.1 Text Steganography image file in this format which supports 8- bit gray scale In text steganography a text file is used to embed a secret data or 24 bit color images.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    8 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us