Skip to main content

A Robust Video Steganographic Scheme Using Sudoku Puzzle for Secured Data Hiding

  • Conference paper
  • First Online:
Book cover Social Transformation – Digital Way (CSI 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 836))

Included in the following conference series:

  • 833 Accesses

Abstract

Video Steganography is a method for securing data in a video file and hence it prevents the chance of theft. The proposed scheme uses the Video Steganography technique on the encrypted data (using RSA and AES) for providing maximum security and stability. In this work, a secured Video Steganographic scheme is proposed using Sudoku puzzle. The novelties of the work imply that nobody could be able to see as well as modify data during transmission as the secret message is first encrypted into cipher text twice using RSA and AES cryptographic technique then that cipher text is embedded in video using a Sudoku reference matrix. So, our proposed work combines both Cryptographic and Steganographic technique to enhance the security in maximum level with maintained computational complexity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ginni, E.S., Pushpinder, E.: A review on secure video steganography technique using LSB & MSB. Int. J. Adv. Res. Comput. Commun. Eng. 5(3), 635–639 (2015)

    Google Scholar 

  2. Swetha, V., Prajith, V., Kshema, V.: Data hiding using video steganography-a survey. Int. J. Sci. Eng. Comput. Technol. 5(6), 206–213 (2015)

    Google Scholar 

  3. Dasgupta, K., Mandal, J.K., Dutta, P.: Hash based least significant bit technique for video steganography (HLSB). Int. J. Secur. Priv. Trust Manag. (IJSPTM) 1(2), 1–11 (2012)

    Google Scholar 

  4. Antony, L., Mathew, H.M., Jayakumar, P.: A new steganographic approach using Sudoku with digital signature. Int. J. Comput. Eng. Technol. (IJCET) 5(12), 177–185 (2014)

    Google Scholar 

  5. Sameerunnisa, S.K., Suhasini, K.S., Kommu, S.: Information security of video steganography utilizing RSA algorithm. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 5(4), 284–289 (2015)

    Google Scholar 

  6. Shakeela, S., Arulmozhivarman, P., Chudiwal, R., Pal, S.: Double coding mechanism for robust audio data hiding in videos. In: Proceedings of IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), 20–21st May 2016, Bangalore, India, pp. 997–1001 (2016)

    Google Scholar 

  7. Hu, S.D.: A novel video steganography based on non-uniform rectangular partition. In: Proceedings of 14th International Conference on Computational Science and Engineering (CSE), 24–26th August 2011, Dalian, China, pp. 57–61, August 2011

    Google Scholar 

  8. Kour, J., Verma, D.: Steganography techniques–a review paper. Int. J. Emerg. Res. Manag. Technol. (IJERMT) 3(5), 132–135 (2014)

    Google Scholar 

  9. Vidya, G., Preetha, R.H., Shilpa, G.S., Kalpana, V.: Image steganography using ken ken puzzle for secure data hiding. Indian J. Sci. Technol. (IJST) 7(9), 1403–1413 (2014)

    Google Scholar 

  10. Chakraborty, S., Bandyopadhyay, S.K.: Steganography method based on data embedding by Sudoku solution matrix. Int. J. Eng. Sci. Invent. (IJESI) 2(7), 36–42 (2013)

    Google Scholar 

  11. Pavithra, S.: Performance evaluation of symmetric algorithms. J. Glob. Res. Comput. Sci. (JGRCS) 3(8), 43–45 (2012)

    Google Scholar 

  12. Pancholi, V.R., Patel, B.P.: Enhancement of cloud computing security with secure data storage using AES. Int. J. Innov. Res. Sci. Technol. (IJIRST) 2(09), 67–89 (2016)

    Google Scholar 

  13. Maji, A.K., Pal, K.P., Roy, S.: A novel steganographic scheme using Sudoku. In: 2013 International Conference on Electrical Information and Communication Technology (EICT), pp. 1–6 (2014)

    Google Scholar 

  14. Dey, D., Bandyopadhyay, A., Jana, S., Maji, A.K., Pal, R.K.: A novel image steganographic scheme using 8 × 8 Sudoku puzzle. In: Chaki, R., Saeed, K., Cortesi, A., Chaki, N. (eds.) Advanced Computing and Systems for Security. AISC, vol. 567, pp. 85–100. Springer, Singapore (2017). https://doi.org/10.1007/978-981-10-3409-1_6

    Chapter  Google Scholar 

  15. Chang, C.C., Chou, Y.C., Kieu, T.D.: An information hiding scheme using Sdoku. In: 2008 Proceedings of Third International Conference on Innovative Computing, Information and Control (ICICIC), vol. 83, no. 12, pp. 2528–2535 (2008)

    Google Scholar 

  16. Hong, W., Chen, T.S.: A novel data embedding method using adaptive pixel pair matching. IEEE Trans. Inf. Forensics Secur. (IJETTCS) 7(1), 176–184 (2012)

    Article  Google Scholar 

  17. Khan, M., Ahmad, J., Sajjad, M., Zubair, M.: Secure Image Steganography using Cryptography and Image Transposition. CoRR abs/1510.04413 (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Sunanda Jana or Arnab Kumar Maji .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jana, S., Maji, A.K., Pal, R.K. (2018). A Robust Video Steganographic Scheme Using Sudoku Puzzle for Secured Data Hiding. In: Mandal, J., Sinha, D. (eds) Social Transformation – Digital Way. CSI 2018. Communications in Computer and Information Science, vol 836. Springer, Singapore. https://doi.org/10.1007/978-981-13-1343-1_45

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-1343-1_45

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-1342-4

  • Online ISBN: 978-981-13-1343-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics