Random Pattern based sequential bit (RaP-SeB) Steganography with Cryptography for Video Embedding

Full Text (PDF, 598KB), PP.51-59

Views: 0 Downloads: 0


Ravpreet Kaur 1,* Manish Mahajan 1

1. CGC-COE, Landran, Department of Computer Science & Engineering, Mohali, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijmecs.2016.09.07

Received: 1 Jun. 2016 / Revised: 6 Jul. 2016 / Accepted: 1 Aug. 2016 / Published: 8 Sep. 2016

Index Terms

Video embedding, sequential embedding, random pattern, secure cryptography


Due to an aggressive development and covert transmission of the computer users over the web, the steganography is acquiring its vogue day by day. It is the method to encode the covert data in a transmission medium in a fashion that the actuality of data must remain hidden. To protect the integrity of the data over the internet becomes necessary for the high sensitivity communications or the data transfers. The steganography carries a number of options for the embedding of the secret data into the cover data. In this manuscript, we have proposed the hybrid representation for the embedding of the data, which utilizes the random pattern embedding along with the cryptography for the higher steganography security levels. The proposed model has been designed to enhance the security level by utilizing the sequential data encoding and decoding in the video data. The video embedding creates the higher level of security for the embedded data. The experimental results have been obtained in the form of the embedding capacity, mean squared error (MSE) and Bits per Pixel (BPP). The proposed model has been found to be efficient enough for the video steganography.

Cite This Paper

Ravpreet Kaur, Manish Mahajan, "Random Pattern based sequential bit (RaP-SeB) Steganography with Cryptography for Video Embedding", International Journal of Modern Education and Computer Science(IJMECS), Vol.8, No.9, pp.51-59, 2016. DOI:10.5815/ijmecs.2016.09.07


[1]Thakara, S. S., Bhale, N.L. (2014),”A Review of Digital Image Steganography Techniques,” International Journal of Advanced Research in Computer Science and Software Engineering,4(6), pp. 465-471
[2]Sharma, S., & Kumar, U. (2015),”Review of Transform Domain Techniques for Image Steganography,” International Journal of Science and Research, 2(2), 1, pp. 194-197
[3]Gaikwad, D. P., et al. "Hiding the Text and Image Message of Variable Size Using Encryption and Compression Algorithms in Video Steganography," International Journal of Engineering Research and Applications (IJERA), 1(2), pp. 102-108
[4]Ramalingam, M., and Isa, N. A. M. (2014, October),”A steganography approach for sequential data encoding and decoding in video images,” Proc. IEEE International Conference on Computer, Control, Informatics, and Its Applications, 2014, pp. 120-125.
[5]Penchalaiah, N., & Seshadri, R. (2010),”Effective Comparison and evaluation of DES and Rijndael Algorithm (AES).,” International Journal of Computer Science and Engineering, 2(05), pp. 1641-1645.
[6]Bhaumik, Arup Kumar, et al. (2009), "Data hiding in a video." International Journal of Database Theory and Application 2.2, pp. 9-16.
[7]Varghese, B. B., & Haroon, R. P. (2014),”Reversible Encrypted Data Hiding In Encrypted Video”, IOSR Journal of Computer Engineering (IOSR-JCE), 16(1), pp. 71-82.
[8]Kumar, M. S., & Latha, G. M. (2014),”DCT Based Secret Image Hiding In Video Sequence,” International Journal of Engineering Research and Applications ISSN, 2248-9622, 4(8), pp. 05-09
[9]Laskar, S. A., & Hemachandran, K. (2013),” Steganography based on Random Pixel Selection for Efficient Data Hiding.,” International Journal of Computer Engineering and Technology, 4(2), 31-44
[10]Singh, Saurabh, and Gaurav Agarwal, (2010), "Hiding an image to a video: A new approach to LSB replacement." International Journal of Engineering Science and Technology 2.12, pp. 6999-7003
[11]Meghanathan, N., & Nayak, L. (2010),“Steganalysis algorithms for detecting the hidden information in image, audio and video cover media,” International journal of Network Security & Its application (IJNSA), 2(1), pp 43-55.
[12]Sharma, M. H., MithleshArya, M., & Goyal, M. D. (2013),”Secure Image Hiding Algorithm using Cryptography and Steganography,” IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN, 2278-0661.
[13]Savitha, N. , Srinath N. K.,Usha B. A., (2015),” Fuzzy Logic Based Parallel Data Embedding Technique for Image Steganography,” International Journal Of Current Engineering And Scientific Research (IJCESR), 2(9), pp.109-113
[14]Richer, P. (2003),”Steganalysis: Detecting hidden information with computer forensic analysis,” SANS/GIAC Practical Assignment for GSEC Certification, SANS Institute, 6.
[15]Jain, Anil K., M. Narasimha Murty, and Patrick J. Flynn, (2006),"Data clustering: a review." ACM computing surveys (CSUR) 31.3: 264-323
[16]Vyas, K., Pal, B. L. (2014),” A Proposed Method in Image Steganography to improve Image Quality with LSB technique,” International Journal of Advanced Research in Computer and Communication Engineering 3(2),5246-5251
[17]Khosla, S., & Kaur, P. (2014),”Secure Data Hiding Technique using Video Steganography and Watermarking,” International Journal of Computer Applications, 95(20), pp. 7-12.
[18]Pujari, S., & Mukhopadhyay, S. (2012),”An Image based Steganography Scheme Implying Pseudo-Random Mapping of Text Segments to Logical Region of Cover Image using a New Block Mapping Function and Randomization Technique,” International Journal of Computer Applications, 50(2).
[19]Sheelu, & Ahuja, B. (2013),” An overview of Steganography IOSR Journal of Computer Engineering,” 11(1), pp.15-19.
[20]Seth, S. M., & Mishra, R. (2011),”Comparative Analysis Of Encryption Algorithms For Data Communication 1, 4(2)
[21]Panjabi, P. K., & Singh, P. (2013),”An Enhanced Data Hiding Approach using Pixel Mapping Method with Optimal Substitution Approach,” .International Journal of Computer Applications, 74(10), pp. 36-43
[22]Kumar, P. M., & Shunmuganathan, K. L. (2012). Developing a secure image steganographic system using TPVD adaptive LSB matching revisited algorithm for maximizing the embedding rate. Information Security Journal: A Global Perspective, 21(2), 65-70.
[23]Jain, A., & Gupta, I. S. (2007, October),”A JPEG compression resistant steganography scheme for raster graphics images,” IEEE Region 10 Conference (pp. 1-4). IEEE.
[24]Hamid, N., Yahya, A., Ahmad, R. B., and Al-Qershi, O. M. (2012),”Image steganography techniques: an overview”, International Journal of Computer Science and Security (IJCSS), 6(3), pp.168-187.
[25]Por, L. Y., and Delina, B. (2008, April), “Information hiding: A new approach in text steganography,” Proc. International Conference on Mathematics and Computers in Science and Engineering, vol. 7, World Scientific and Engineering Academy and Society.
[26]Jayaram, P., Ranganatha, H. R., and Anupama, H. S. (2011) “Information hiding using audio steganography–a survey,” International Journal of Multimedia & Its Applications (IJMA), vol. 3, 86-96.
[27]Dickman, S. D. (2007), “An Overview of Steganography,” Department of Computer Science, James Madison University Infosec Techreport, vol. 2, pp. 305-315.