Advertisement

Hardware-based application of data security system using general modified secured diamond encoding embedding approach for enhancing imperceptibility and authentication

  • Sunil K. MoonEmail author
  • Rajshree D. Raut
Article
  • 30 Downloads

Abstract

As today’s world are switching to the digital media through the Internet and multimedia tools like Facebook, YouTube, Twitter and WhatsApp which consists of a number of videos, hence it always better to take urgent problems of such digitally transmitted video in terms of information security. The current video steganography approach is not so effective for imperceptibility, robustness, security of hidden secret data, embedding capacity and very good visual recovery of a secret as well as original data. Hence, to maintain the balance between these issues is another big challenge. This work employs a novel and efficient Field Programmable Gate Array (FPGA) implementation of audio, video crypto steganography using General Modified Secured Diamond Encoding (GMSDE) scheme. The new proposed scheme is based on Diamond Encoding (DE), Exploiting Modification Direction (EMD) and Adaptive Pixel Pairing Matching (APPM) algorithms called as General Modified Secured Diamond Encoding (GMSDE). The DE method is always used for k > 1 which produces distortion, less embedding capacity and security of hidden data. The GMSDE scheme changed the Diamond Characteristic Value (DCV) to conceal more than one secret bit vertically and horizontally to create a modified diamond shape of secret data which is equal to log2(2x2 + 6x + 5) - ary and produces the conceal capacity of 1.16 to 4.82 bpp for the values of x = 0 to 25 where x is the embedding parameter. Experimental results confirm that the conceal capacity measured by bit per pixel (bpp), security of hidden secret data, very good visual recovery of both original and secret data, Cross-Correlation (CC) and Peak Signal to Noise Ratio (PSNR) values are better than existing approaches. Further through many attacks on stego video during transmission using forensic detection approach, the imperceptibility, security of hidden data and robustness is increased for secure communication.

Keywords

Conceal capacity and security GMSDE Audio-crypto video steganography Attacks Reversible forensic detection 

Notes

References

  1. 1.
    Abed S’e, Al-Mutairi M, Al-Watyan A, Al-Mutairi O, AlEnizy W, Al-Noori A (2018) An Automated Security Approach of Video Steganography Based LSB Using FPGA Implementation. Journal of Circuits, Systems, and Computers.  https://doi.org/10.1142/S021812661950083X
  2. 2.
    Arab F, Abdullah SM (2017) A Robust Video Watermarking Technique for the Tamper Detection of Surveillance System. Springer Journal of Multimedia Tools and Application.  https://doi.org/10.1007/s11042-015-2800-5 CrossRefGoogle Scholar
  3. 3.
    Atawneh S, Almomani A, Al Bazar H, Sumari P, Gupta B (2016) Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain. Springer Journal of Multimedia Tools and Application.  https://doi.org/10.1007/s11042-016-3930-0 CrossRefGoogle Scholar
  4. 4.
    Atawneh S, Al Bazar H, Usman I, Sumari P (2017) Information embedding algorithm based on Diamond Encoding Scheme with Different-base Digits. IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS), ISSN: 2249-9555 7(1):25–32Google Scholar
  5. 5.
    Bhatnagar G, Jonathan Wu QM, Raman B (2013) Discrete fractional wavelet transform and its application to multiple encryptions. Inf Sci 223:297–316MathSciNetCrossRefGoogle Scholar
  6. 6.
    Chao R-M, Wu HC, Lee C-C, Chu Y-P (2009) A Novel Image Data Hiding Scheme with Diamond Encoding, Hindawi Publishing Corporation EURASIP Journal on Information SecurityGoogle Scholar
  7. 7.
    Cheddad A, Condell J, Curran K, Kevitt PM (2013) Digital Image Steganography Survey and Analysis of Current Methods. Elsevier Journal of Signal Processing:727–752CrossRefGoogle Scholar
  8. 8.
    Chung Kao W, Yulai P, Wang CC, Wuu LC (2015) A Formula Diamond Encoding Data Hiding Scheme. Ubiquitous International Journal of Information Hiding and Multimedia Signal Processing 6(6):1165–1176Google Scholar
  9. 9.
    Curran K, Bailey K (2003) An Evaluation of Image-Based Steganography Methods. International Journal of Digital Evidence 2(2):1–38Google Scholar
  10. 10.
    Dalal M, Juneja M (2018) A Robust and Imperceptible Steganography Technique for SD and HD Videos. Springer Journal of Multimedia Tools Application.  https://doi.org/10.1007/s11042-018-6093-3
  11. 11.
    Dalal M, Juneja M (2018) Video steganography techniques in spatial domain—a survey. In: Proceedings of the International Conference on Computing and Communication Systems. Springer, Singapore, pp. 705–711.  https://doi.org/10.1007/978-981-10-6890-4_67 CrossRefGoogle Scholar
  12. 12.
    Das S, Sharma S, Bakshi S, Mukherjee I (2018) A framework for pixel intensity modulation based image steganography. In: Progress in advanced computing and intelligent engineering. Springer, Singapore, pp 3–14.  https://doi.org/10.1007/978-981-10-6872-0_1 Google Scholar
  13. 13.
    Dasgupta K, Mondal JK, Dutta P (2013) Optimized video steganography using genetic algorithm (GA). Proceeding of Technology 10:131–137.  https://doi.org/10.1016/j.protcy.2013.12.345 CrossRefGoogle Scholar
  14. 14.
    Elshazly EA, Abdelwahab SAS, Fikry RM, Elaraby SM, Zahran O, Kordy ME (2016) FPGA Implementation of Robust Image Steganography Technique based on Least Significant Bit (LSB) in Spatial Domain. Int J Comput Appl 145(12):43–51Google Scholar
  15. 15.
    Gupta BB, Agrawal DP, Yamaguchi S (2016) Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security. IGI Global Publisher, Available at http://www.igi-global.com/book/handbook-researchmodern- cryptographic-solutions/142132
  16. 16.
    Ho LH, Lai SL, Chung YK (2012) Adaptive Local Complexity Controlled Data Hiding Method Considering the Human Visual Sensitivity. Springer Journal on Opto Electronics Review 20(4):367–374Google Scholar
  17. 17.
    Hong W, Chen T-S (2012) A Novel Data Embedding Method Using Adaptive Pixel Pair Matching. IEEE Transaction on Information Forensics and Security 7(1):176–184CrossRefGoogle Scholar
  18. 18.
    Hussain M, Wahab AWA, Idris YIB, Ho AT, Jung KH (2018) Image steganography in spatial domain: a survey. Signal Process Image Commun 65:46–66.  https://doi.org/10.1016/j.image.2018.03.012 CrossRefGoogle Scholar
  19. 19.
    Kasana G, Singh K, Bhatia SS (2016) Data Hiding Algorithm for Images Using Discrete Wavelet Transform and Arnold Transform. Journal of Information Processing System (JIPS) 2015:1–14.  https://doi.org/10.3745/JIPS.03.0042 CrossRefGoogle Scholar
  20. 20.
    Mustafa RJ, Elleithy KM (2016) A Video Steganography Algorithm Based on Kanade-Lucas-Tomasi Tracking Algorithm and Error Correcting Codes. Multimed Tools Appl 75(17):10311–10333.  https://doi.org/10.1007/s11042-015-3060-0 CrossRefGoogle Scholar
  21. 21.
    Mustafa RJ, Elleithy KM (2016) Compressed and Raw Video Steganography Techniques: A Comprehensive Survey and Analysis. Springer Journal of Multimedia Tools Application.  https://doi.org/10.1007/s11042-016-4055-1 CrossRefGoogle Scholar
  22. 22.
    Mustafa RJ, Elleithy KM, Abdelfattah E (2017) Video-Steganography Techniques: Taxonomy, Challenges, and Future Directions”, In: IEEE Long Island Systems, Applications, and Technology Conference (LISAT), pp 1–6. 10.1109/LISAT.2017.8001965Google Scholar
  23. 23.
    Premalatha P, Amsaveni A, (2016) Data hiding in a digital image with FPGA implementation. IEEE Online International Conference on Green Engineering and Technologies (IC-GET), IndiaGoogle Scholar
  24. 24.
    Ramalingam M (2011) Stego machine–video steganography using modified LSB algorithm. World Acad Sci Eng Technol 5(2):170–173Google Scholar
  25. 25.
    Sadek MM, Khalifa AS, Mostafa GM (2014) Video-Steganography: a Comprehensive Review", Multimedia Tools Application, Springer Science Journal 1–32Google Scholar
  26. 26.
    Sakthivel SM, Ravi Sankar A (2015) FPGA Implementation of Data Hiding in Grayscale Images using Neighbor Mean Interpolation. IEEE 2ND International Conference on Electronics and Communication System (ICECS), IndiaGoogle Scholar
  27. 27.
    Su Q, Chen B (2017) Robust Color Image Watermarking Technique in the Spatial Domain. Springer Journal of Soft Computing.  https://doi.org/10.1007/s00500-017-2489-7 MathSciNetCrossRefGoogle Scholar
  28. 28.
    Subhedar M, Mankar VH (2015) Current Status and Key Issues in Image Steganography: A survey. Elsevier Science Review-Journal:95–113CrossRefGoogle Scholar
  29. 29.
    Tewari A, Gupta BB (2017) A Lightweight Mutual Authentication Protocol Based on Elliptic Curve Cryptography for IoT Devices. Inderscience Int J Advanced Intelligence Paradigms 9(2/3):111–121CrossRefGoogle Scholar
  30. 30.
    You X, Liang D, Cheung Y-m, Chen Q (2010) A Blind Watermarking Scheme Using New Nontensor Product Wavelet Filter Banks. IEEE Trans Image Process 19(12):3271–3284MathSciNetCrossRefGoogle Scholar
  31. 31.
    Zhang X, Wang S (2006) Efficient Steganographic Embedding by Exploiting Modification Direction. IEEE Communication Letters 10:781–783CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Department of Electronics and TelecommunicationPune Institute of Computer Technology (P.I.C.T, Pune)PuneIndia
  2. 2.Department of Electronics and CommunicationGoverment College of EngineeringNagpurIndia

Personalised recommendations