Abstract
Video Steganography is a method for securing data in a video file and hence it prevents the chance of theft. The proposed scheme uses the Video Steganography technique on the encrypted data (using RSA and AES) for providing maximum security and stability. In this work, a secured Video Steganographic scheme is proposed using Sudoku puzzle. The novelties of the work imply that nobody could be able to see as well as modify data during transmission as the secret message is first encrypted into cipher text twice using RSA and AES cryptographic technique then that cipher text is embedded in video using a Sudoku reference matrix. So, our proposed work combines both Cryptographic and Steganographic technique to enhance the security in maximum level with maintained computational complexity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ginni, E.S., Pushpinder, E.: A review on secure video steganography technique using LSB & MSB. Int. J. Adv. Res. Comput. Commun. Eng. 5(3), 635–639 (2015)
Swetha, V., Prajith, V., Kshema, V.: Data hiding using video steganography-a survey. Int. J. Sci. Eng. Comput. Technol. 5(6), 206–213 (2015)
Dasgupta, K., Mandal, J.K., Dutta, P.: Hash based least significant bit technique for video steganography (HLSB). Int. J. Secur. Priv. Trust Manag. (IJSPTM) 1(2), 1–11 (2012)
Antony, L., Mathew, H.M., Jayakumar, P.: A new steganographic approach using Sudoku with digital signature. Int. J. Comput. Eng. Technol. (IJCET) 5(12), 177–185 (2014)
Sameerunnisa, S.K., Suhasini, K.S., Kommu, S.: Information security of video steganography utilizing RSA algorithm. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 5(4), 284–289 (2015)
Shakeela, S., Arulmozhivarman, P., Chudiwal, R., Pal, S.: Double coding mechanism for robust audio data hiding in videos. In: Proceedings of IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), 20–21st May 2016, Bangalore, India, pp. 997–1001 (2016)
Hu, S.D.: A novel video steganography based on non-uniform rectangular partition. In: Proceedings of 14th International Conference on Computational Science and Engineering (CSE), 24–26th August 2011, Dalian, China, pp. 57–61, August 2011
Kour, J., Verma, D.: Steganography techniques–a review paper. Int. J. Emerg. Res. Manag. Technol. (IJERMT) 3(5), 132–135 (2014)
Vidya, G., Preetha, R.H., Shilpa, G.S., Kalpana, V.: Image steganography using ken ken puzzle for secure data hiding. Indian J. Sci. Technol. (IJST) 7(9), 1403–1413 (2014)
Chakraborty, S., Bandyopadhyay, S.K.: Steganography method based on data embedding by Sudoku solution matrix. Int. J. Eng. Sci. Invent. (IJESI) 2(7), 36–42 (2013)
Pavithra, S.: Performance evaluation of symmetric algorithms. J. Glob. Res. Comput. Sci. (JGRCS) 3(8), 43–45 (2012)
Pancholi, V.R., Patel, B.P.: Enhancement of cloud computing security with secure data storage using AES. Int. J. Innov. Res. Sci. Technol. (IJIRST) 2(09), 67–89 (2016)
Maji, A.K., Pal, K.P., Roy, S.: A novel steganographic scheme using Sudoku. In: 2013 International Conference on Electrical Information and Communication Technology (EICT), pp. 1–6 (2014)
Dey, D., Bandyopadhyay, A., Jana, S., Maji, A.K., Pal, R.K.: A novel image steganographic scheme using 8 × 8 Sudoku puzzle. In: Chaki, R., Saeed, K., Cortesi, A., Chaki, N. (eds.) Advanced Computing and Systems for Security. AISC, vol. 567, pp. 85–100. Springer, Singapore (2017). https://doi.org/10.1007/978-981-10-3409-1_6
Chang, C.C., Chou, Y.C., Kieu, T.D.: An information hiding scheme using Sdoku. In: 2008 Proceedings of Third International Conference on Innovative Computing, Information and Control (ICICIC), vol. 83, no. 12, pp. 2528–2535 (2008)
Hong, W., Chen, T.S.: A novel data embedding method using adaptive pixel pair matching. IEEE Trans. Inf. Forensics Secur. (IJETTCS) 7(1), 176–184 (2012)
Khan, M., Ahmad, J., Sajjad, M., Zubair, M.: Secure Image Steganography using Cryptography and Image Transposition. CoRR abs/1510.04413 (2015)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Jana, S., Maji, A.K., Pal, R.K. (2018). A Robust Video Steganographic Scheme Using Sudoku Puzzle for Secured Data Hiding. In: Mandal, J., Sinha, D. (eds) Social Transformation – Digital Way. CSI 2018. Communications in Computer and Information Science, vol 836. Springer, Singapore. https://doi.org/10.1007/978-981-13-1343-1_45
Download citation
DOI: https://doi.org/10.1007/978-981-13-1343-1_45
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1342-4
Online ISBN: 978-981-13-1343-1
eBook Packages: Computer ScienceComputer Science (R0)