Open Access   Article Go Back

Hiding data in video using maximum motion detection and intensity technique

Shaminder Kaur1 , Paramjeet Singh2 , Shaveta Rani3

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-7 , Page no. 664-667, Jul-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i7.664667

Online published on Jul 31, 2018

Copyright © Shaminder Kaur, Paramjeet Singh, Shaveta Rani . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Shaminder Kaur, Paramjeet Singh, Shaveta Rani, “Hiding data in video using maximum motion detection and intensity technique,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.664-667, 2018.

MLA Style Citation: Shaminder Kaur, Paramjeet Singh, Shaveta Rani "Hiding data in video using maximum motion detection and intensity technique." International Journal of Computer Sciences and Engineering 6.7 (2018): 664-667.

APA Style Citation: Shaminder Kaur, Paramjeet Singh, Shaveta Rani, (2018). Hiding data in video using maximum motion detection and intensity technique. International Journal of Computer Sciences and Engineering, 6(7), 664-667.

BibTex Style Citation:
@article{Kaur_2018,
author = {Shaminder Kaur, Paramjeet Singh, Shaveta Rani},
title = {Hiding data in video using maximum motion detection and intensity technique},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2018},
volume = {6},
Issue = {7},
month = {7},
year = {2018},
issn = {2347-2693},
pages = {664-667},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2489},
doi = {https://doi.org/10.26438/ijcse/v6i7.664667}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i7.664667}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2489
TI - Hiding data in video using maximum motion detection and intensity technique
T2 - International Journal of Computer Sciences and Engineering
AU - Shaminder Kaur, Paramjeet Singh, Shaveta Rani
PY - 2018
DA - 2018/07/31
PB - IJCSE, Indore, INDIA
SP - 664-667
IS - 7
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
299 187 downloads 169 downloads
  
  
           

Abstract

steganography is becoming popular, especially for adding undetectable identifying marks, such as author or copyright information. Existing stegography systems for video stegnography used simple techniques to hide the images into videos which can be easily decoded by using some decoding algorithms. Hence a novel video stegnography system must be made that can hide the image in the video in the more secure way so that attacker cannot decode the hidden message from the video. In the proposed work, Least Significant Bit (LSB) will be used to hide the image message into a video. Proposed system hide the image into each of the LSB of each color of each pixel of the input video frame. In the proposed system, from the input video a fame with maximum motion and intensity is extracted which is treated as the target frame for hiding message. In this target frame image will be hide using Least Significant approach. The resultant video becomes the stegno video. Reverse process is performed on the stegno video to extract the image file from that video file. The proposed system is tested on various input videos and various input images are used as message to hide in these videos. It is evaluated that the results of the proposed system are very satisfactory. Performance of the proposed system is also compared with the performance of the existing system and it is evaluated that the proposed system generates the better results in terms of PSNR and MSE than that of existing system.

Key-Words / Index Term

Steganography, LSB, Image Hiding, Message Security, Video Stegnography.

References

[1] K.Thangadurai and G.Sudha Devi, "An analysis of LSB Based Image Steganography Techniques", International Conference on Computer Communication and Informatics, 2014
[2] Rashi Singh,Gaurav Chawl, "A Review on Image Steganography", International Journal of Advanced Research in Computer Science and Software Engineering,Vol. 4, Issue 5, 2014
[3] S. Sharda, S. Budhiraja, "Performance Analysis of Image Steganography based on DWT and Arnold Transform",International Journal of Computer Applications (0975 – 8887) Vol. 69– No.21, 2013
[4] S. Khosla,P. Kaur, "Secure Data Hiding Technique Using Video Steganography and Watermarking", International Journal of Computer Applications (0975 – 8887) Volume 95– No.20, 2014
[5] Jayaram P,Ranganatha H R,Anupama H S, "Information hiding using audio steganography – a survey", The International Journal of Multimedia & Its Applications (IJMA) Vol.3, No.3, 2011
[6] K. Pradhan, C. Bhoi,"Robust Audio Steganography Technique using AES algorithm and MD5 hash",International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 10, 2014.
[7] F.A.P.Petitcolas, R.J.Anderson, M.G.Kuhn:”Information Hiding- A Survey”, Process of IEEE, vol.87,no.7, pp.1062-1078, 1999.
[8] M. Wu, B. Liu. “Multimedia Data Hiding”, Springer- Verlag New York, 2003.
[9] N. Taraghi-Delgarm, “Speech Watermarking”, M.Sc. Thesis, Comptuer Engineering Department, Sharif University of Technology, Tehran, IRAN, 2006.
[10] M. Pooyan, A. Delforouzi, “LSB-based Audio Steganography Method Based on Lifting WaveletTransform”, in Proc. 7th IEEE International Symposium on Signal Processing and Information Technology (ISSPIT`07), 2007.
[11] R.A. Santosa and P. Bao, “Audio-to-image wavelet transform based audio steganography,” Proc. of 47th Int. Symposium ELMAR, pp. 209- 212, 2005.
[12] X. Huang, R. Kawashima, N. Segawa, Y. Abe. “The Real-Time Steganography Based on Audio-to-Audio Data Bit Stream”,Technical report of IEICE, ISEC, vol.106 pp.15-22, 2006.