Hiding audio file in video frames using wavelet technique

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    Steganography derives covering private or enigma sound inside a transporter in impalpable way. In this paper we are wearing out avideo steganography calculation in context of Haar Integer Wavelet Transforms (IWT) and extraction in luminance and chrominance (YCbCr) bits of the video records. In this approach, the cover-video is disconnected into YCbCr charts and the sound perfectly healthy is implanted into the IWT coefficients. The presented sound is expelled from stego-video utilizing the switch method of information disguising. Haar wavelet change is related with get the low rehash sub-band in a photograph to cover information. The rehash sub-packs are (LL, LH, HL and HH).The work of different scientists is talked about video steganography and their strategies for embeddings and extraction of information. With the advance of progression and mixed media data, Videos and electronic pictures is expanding rapidly. A tremendous measure of data can be secured in video documents. It contains number of edges played over some dubious time apportioning. .Data can be secured in any or number of edges. Also, Attacker or Human eye can't see the closeness of message in video since video plot is unmistakable for a little measure of time.

  • Keywords

    Steganography; Haar Integer Wavelet Transform; Lifting Wavelet Technique.

  • References

      [1] N. Wu and M. Hwang. "Information Hiding: Current Status and Key Issues," International Journal of Network Security, Vol.4, No.1, pp. 1-9, Jan.2007.

      [2] C. Chan and L. M. Cheng, "Concealing information in pictures by straightforward LSB substitution," Pattern Recognition, pp. 469-474, Mar. 2004. https://doi.org/10.1016/j.patcog.2003.08.007.

      [3] H. H. Zayed, "A High-Hiding Capacity Technique for Hiding Data in pictures Based on K-Bit LSB Substitution," The 30th International Conference on Artificial Intelligence Applications (ICAIA - 2005) Cairo, Feb. 2005.

      [4] H. W. Tseng and C. C. Chnag, "High limit information covering up in jpegcompressed pictures," Informatica, vol. 15, no. I, pp. 127-142, 2004.

      [5] V. Sathya, K Balasubramaniyam, N Murali "Information covering up in sound flag, video flag content and JPEG Images" IEEICAESM 2012.Mrach 30-3 I 2012, pp74l - 746.

      [6] Che Yen Wen, Wen Chao Yang " Applying an open key watermarking strategies in criminological imaging to protect the genuineness of the proof" ISI 2008 Workshop, LNCE 5075.Springer Verlag Berlin lleidelberg. Pp 278-287.

      [7] Nidal Nasser, Sghaier Guizani "An Audio/Video Crypto Adaptive Optical Steganography Technique "IEEE 20l2, pp. 1057-I062.

      [8] George Abboud, Jeffery Marean, "Steganography and cryptography in PC crime scene investigation." 2010IEEE Fifthinternational workshop on deliberate application to computerized criminological application. pp. 25-30.

      [9] Hung min Sun, Chi Yao Weng, Chin Feug Lee."Anti-Forensics with steganography information implanting in advanced pictures" IEEE diary on chose territories in Communication vol. 29.no.7 pp. 1392-1403. August 2011.

      [10] Lee, Y., Chen, L. "High limit picture steganography display", IEEE Proceedings on Vision, Image and Signal Preparing 2000, 147, 3, 288-294.

      [11] Matthew C Stamm, K.J Ray Liu, "Measurable location of picture control utilizing factual natural fingerprints,'' IEEE exchange on data scientific and security, Vol No.3 September 2010,pp 492-506.

      [12] Hung min Sun, Chi Yao Weng, Chin Feng Lee, "Hostile to Forensics with steganography information installing in computerized pictures,'' IEEE diary on chose territories in correspondence, Vol, 29.No, 7August2011, pp.1392-1403.

      [13] George Abboud, Jeffery Marean, "Steganography and visual cryptography in PC Forensics," 2010 IEEE, Fifth universal workshop on methodical ways to deal with computerized Forensic application pp. 25-30.

      [14] B. Pfitzmann, "Data Hiding Terminology", First International Workshop on Information Hiding, May 30 - June 1, 1996, Cambridge, UK, pp. 3 47-3 50.

      [15] S. Kartalopoulos, "Security of Information and Communication Networks", Wiley-IEEE Press, 2009.

      [16] W. Drinking spree, D. Gruhl, N. Morimoto, A. Lu. "Strategies for Data Hiding", IBM Systems Journal 35, 313-336, 1996.

      [17] F. Petitcolas, "Watermarking plans assessment," IEEE Signal Processing Magazine 17, 58-64, 2000. https://doi.org/10.1109/79.879339.

      [18] K.Sathesh Kumar, K.Shankar, M. Ilayaraja and M. Rajesh,"Sensitive Data Security In Cloud Computing Aid Of DifferentEncryption Techniques" Journal of Advanced Research inDynamical and Control Systems, vol.18, no.23, 2017.




Article ID: 10016
DOI: 10.14419/ijet.v7i1.9.10016

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.