Secure Data Transmission Techniques over the Networks by using Steganography

Abstract

In recent years, Information Security in the field of digital communication is a relevant part newlinebecause the advancement hiked the fear of receiving the data snooped at the time of sending newlineit from the sender to the receiver. So, a secure technique is designed by amalgamate both newlineCryptography and Steganography. Initially, user s confidential details are encrypted using the newlinemore secure Multi curve Elliptic Curve Cryptography (ECC) technique. Next, the encrypted newlinecipher is embedded into the H.264 Video using a novel proposed Optimized Modified Matrix newlineEncoding (OMME) steganography technique to embed the secret data. While embedding the newlineencrypted confidential details into the video, pixels from the frames can be selected using an newlineoptimization algorithm called Artificial Bee Colony (ABC) in order to reduce distortion of newlinestego video. Finally, the user s secret data embedded in the H.264 Video is extracted and it is newlinede-ciphered. This proposed technique increases the level of security and robustness against newlineattacks in terms of carrier capacity and embedding efficiency when compared to existing newlinemethodologies. newlineThis work also introduced a novel, principled concept to detect LSB steganography in digital newlinevideo. It is exposed that the hidden message s length is embedded within least significant bits newlineof image data and it could be accessed through comparatively maximum accuracy. This novel newlinesteganalysis approach is based some edge based classifier like Fuzzy Random Forest (FRF) newlineclassifier. Here the edge detection is carried out with the improved canny edge detector. Edge newlinedetected and non-edge detected pixels are used for the embedding process and in which X newlineand Y secret bits from the Modified Caesar cipher is hidden in the corresponding edge and newlinenon-edge pixels. The resulting methodology is simple and fast. To examine the robustness of newlinethe proposed methodology, result is compared with the two recent techniques. The result newlineshows our proposed work is secured in case of high embedding efficiency. newlineTo increase the abil

Description

Keywords

Citation

item.page.endorsement

item.page.review

item.page.supplemented

item.page.referenced