Progress Report on Ph.D work, as on 6.1.2014 Design and Implementation of Steganographic Engine for Secret Data Sharing and Authentication of Videos: An Overture

نویسنده

  • Kousik Dasgupta
چکیده

Steganography is the act of hiding a message inside a container in such a way that can only be detected by its intended recipient. The container can be of different types text, image, audio and video. With the explosion of Internet and reach multimedia content, use of video as a container has become topic of interest for the research fraternity. Though, with the use of internet it has become more vulnerable to interception by unauthorized people over the world. One of the solutions to overcome these issues is cryptography, but the information secrecy does not exist any more. As hiding data is for confidentiality, the work focuses on the utilization of digital video as cover to hide data and maintaining confidentiality. Digital video used as cover can be said to be collection of frames and audio. Frames obtained can be of different types, I, B and P frames, each of them containing varied range of information. The message can be hidden in both frames and audio parts. In the present context frames are used as container, further each frame can be said to a collection of pixels or information. The techniques used for video steganography can be differentiated as Spatial domain, Transform Domain, Linear Motion estimation etc. In the present work some spatial domain techniques are discussed. Further in spatial domain the information can be embedded in Least Significant Bit (LSB) or Most Significant Bit (MSB) of the pixel of each frame. LSB based techniques for embedding has been reported, as LSB techniques are prone to Steganalysis attack. This issue is taken care by applying a hashing function over the base LSB technique. Any steganographic scheme can be said to be govern by mainly two factors imperceptibility and embedding capacity. Genetic Algorithm (GA) as an optimization tool for providing imperceptibility is reported. Use of GA also allows embedding in higher order bits thus in a way improving the embedding capacity. The reported works are compared with some existing schemes and results reported.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Reconfigurable Steganographic System with Hidden Double Laered Authentication

This work proposes a reconfigurable steganographic system offering mechanisms for secret sharing, reception of new and restoration of lost parts of the secret data, validity test for the parts of divided secret data, restoration of divided data employing a certain number of divided parts which provides long-term data storage. Finally this work introduces a mechanism for hidden double layered au...

متن کامل

An Efficient Secret Sharing-based Storage System for Cloud-based Internet of Things

Internet of things (IoTs) is the newfound information architecture based on the internet that develops interactions between objects and services in a secure and reliable environment. As the availability of many smart devices rises, secure and scalable mass storage systems for aggregate data is required in IoTs applications. In this paper, we propose a new method for storing aggregate data in Io...

متن کامل

On the design and security of a lattice-based threshold secret sharing scheme

In this paper, we introduce a method of threshold secret sharing scheme (TSSS) in which secret reconstruction is based on Babai's nearest plane algorithm. In order to supply secure public channels for transmitting shares to parties, we need to ensure that there are no quantum threats to these channels. A solution to this problem can be utilization of lattice-based cryptosystems for these channe...

متن کامل

A New Authenticable Steganographic Method via the Use of Numeric Data on Public Websites

A new steganographic method via the use of numeric data on public websites with a self-authentication capability is proposed. The proposed technique transforms a secret message into partial shares by Shamir’s (k, n)-threshold secret sharing scheme with n = k + 1. The generated k+1 partial shares then are embedded into the numeric items to be disguised as part of the website’s numeric content, y...

متن کامل

Computationally secure multiple secret sharing: models, schemes, and formal security analysis

A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014