Secure Data Transmission Techniques over the Networks by using Steganography
Loading...
Date
item.page.authors
Journal Title
Journal ISSN
Volume Title
Publisher
Abstract
In recent years, Information Security in the field of digital communication is a relevant part
newlinebecause the advancement hiked the fear of receiving the data snooped at the time of sending
newlineit from the sender to the receiver. So, a secure technique is designed by amalgamate both
newlineCryptography and Steganography. Initially, user s confidential details are encrypted using the
newlinemore secure Multi curve Elliptic Curve Cryptography (ECC) technique. Next, the encrypted
newlinecipher is embedded into the H.264 Video using a novel proposed Optimized Modified Matrix
newlineEncoding (OMME) steganography technique to embed the secret data. While embedding the
newlineencrypted confidential details into the video, pixels from the frames can be selected using an
newlineoptimization algorithm called Artificial Bee Colony (ABC) in order to reduce distortion of
newlinestego video. Finally, the user s secret data embedded in the H.264 Video is extracted and it is
newlinede-ciphered. This proposed technique increases the level of security and robustness against
newlineattacks in terms of carrier capacity and embedding efficiency when compared to existing
newlinemethodologies.
newlineThis work also introduced a novel, principled concept to detect LSB steganography in digital
newlinevideo. It is exposed that the hidden message s length is embedded within least significant bits
newlineof image data and it could be accessed through comparatively maximum accuracy. This novel
newlinesteganalysis approach is based some edge based classifier like Fuzzy Random Forest (FRF)
newlineclassifier. Here the edge detection is carried out with the improved canny edge detector. Edge
newlinedetected and non-edge detected pixels are used for the embedding process and in which X
newlineand Y secret bits from the Modified Caesar cipher is hidden in the corresponding edge and
newlinenon-edge pixels. The resulting methodology is simple and fast. To examine the robustness of
newlinethe proposed methodology, result is compared with the two recent techniques. The result
newlineshows our proposed work is secured in case of high embedding efficiency.
newlineTo increase the abil