Final Project Part-2!2!52
Final Project Part-2!2!52
INTRODUCTION
This chapter explains in brief about the steganography includes classification of steganography and
also the objective, methodology of the proposed work.
1.3 MOTIVATION
India is the world's second-largest victim of cyber-attacks, with a 40 percent increase expected by
2020.
As a result of the increased use of the internet, security is receiving a lot of attention. As the number
of people using the internet grows, so does the amount of data that is shared each day. Hackers may
target the data that is exchanged on a daily basis. In order to deal with this issue Steganography is
one of the most effective solutions for dealing with this problem.
This motivated for development of video steganography techniques for data hiding with enhanced
security.
1.4 OBJECTIVES
The project mainly focuses on Enhanced security by hiding the data using video steganography
techniques.
To increase the capacity, imperceptibility and robustness of the cover media.
To calculate and also to compare the parameters that is PSNR, MSE and SSIM using
• Neural Networks using hash function and
• Modulo operator based techniques.
Chapter 2: This chapter converse about the history and the related work carried out or proposed
earlier by researchers and engineers.
Chapter 3: This chapter describes the proposed work, its working and a detailed information
about the algorithm used in the work.
Chapter 4: This chapter discuss about the system and software requirements.
Chapter 5: This chapter discuss about the results obtained for each step and also performance
analysis in the project.
Chapter 6: The conclusion, applications and the possible future work of the proposed work is
discussed in this chapter.
This chapter deals with the brief explanation of video steganography techniques in data hiding.
This chapter also gives an introduction about security while hiding the data and improves the
performance level on video code streams without compromising the video quality using video
steganography techniques which are going to be implemented further in this research work.
CHAPTER 2
LITERATURE SURVEY
This chapter describes about the background history of steganography, some of the related research
papers and also the conclusion drawn from the review papers.
Spartans adopted the Steganography technique at the same time as the Greeks. This approach
uses the employed and Demerstus forms. Against Xerxes, the Spartans employed this strategy. A
hidden information was carved on a wood wax tablet and shielded with a new plane layer of wax
because the wax appeared to be blank [11].
Sir Francis Bacaon uses the steganography technology in a face variant encoding in the 1600s.
During World War II, the steganography technology was utilised to conceal the existence of data.
Invisible ink was used to write information on paper, which made the paper appear blank to a
normal human under normal light. Finally, liquids such as water, fruit juices, and vinegar were
used to read out the information. First, the moist paper in liquid was heated due to which they
turned black and information written using invisible ink made visible to eyes [12].
During World War II, Germans created a new steganography technique known as microdots, in
which a secret message was disguised in an innocent message in such a way that the letter at each
certain place in the message indicated the letter of the secret message [13].
Morse code was hidden in a picture in 1945. The coded message is embedded on the grass near
the river's edge. A line was signified by long grass, while a point was denoted by short grass.
“Compliments of CPSA MA to our chief Col Harold R. Shaw on his visit to San Antonio May
11th 1945” [14] read the decoded message.
2.1.1 THE DIGITAL ERA OF STEGANOGRAPHY
Because of developments in computer power, the internet, and the emergence of digital signal
processing, information theory, and coding theory, steganography has gone "digital". Steganography
has generated an atmosphere of corporate vigilance in this digital age, which has fostered a variety
of innovative applications, ensuring its continued progress. This digital revolution is thought to
benefit cybercrime. As a result of a revelation in USA TODAY, there was an immediate outpouring
of worry about criminals' potential use of steganography. It's tough to regulate cyber-planning, or the
"digital scourge," as Lieutenant Colonel Timothy L. Thomas put it. Three million photographs from
popular websites were examined by Provos and Honeyman for any steganographic evidence [15].
They haven't discovered any hidden messages. Despite the fact that they blamed a variety of factors
for the failure, it's worth noting that steganography isn't limited to still images. Hidden messages can
also be embedded in video and audio files.
2.1.2 STEGANALYSIS
Steganalysis is a type of steganography attack. In essence, it is a technique for noticing the presence
of a secret message in text/image [16]. It compares the messages and looks for the concealed message.
When a message is disguised in an image, the intensity may be slightly reduced and the colour may
be slightly faded, as we all know. As a result, this aids in the detection of any hidden messages.
Steganalysis, as we all know, aids in the attack on steganography. The following are some of the most
common forms of attacks:
In the spycraft family, steganography and cryptography are cousins. Cryptography scrambles a
message by turning secret data into incomprehensible form using cryptographic methods [16].
Steganography, on the other hand, hides the message and makes it unreadable. Steganography, to put
it another way, is science of concealing secret information. Cryptography's aim is to keep information
unreadable by an unauthorized person, whereas steganography's objective is to keep data hidden from
an unintended spectator.
2.1.3 CRYPTOGRAPHY
Cryptography is made up of two Greek words: crypto (meaning "secret") and graphy (meaning
"writing"). So, cryptography is a process of converting a message/information from one form to
another secret form that is different from the original with the use of a secret key [17]. We, on the
other hand, using a term Cryptography to describe science and art of changing signals to make them
more secure and resistant to assault. Cryptography is the process of changing the value of a secret
message, while decryption is the process of recovering the original message from the cipher.
Figure 2.3 indicates that media TV networks frequently have their logos watermarked for their
broadcasting. Table 2.1 outlines variations and similarities between steganography, watermarking,
and cryptography. Throughout this dissertation, the phrase "cover image" refers to the image that will
convey the embedded bits. The term "stego-video" refers to a video with embedded data (payload),
whereas "steganalysis" or "attacks" refers to various image processing and statistical analysis
methodologies aimed at breaking steganography algorithms.
Figure 2. 3: Media TV channels usually have their logos watermark
Anamika Saini, Kamaldeep Joshi and Kirti Sharma [21] described a review and analysis of video
steganography technique is applied to an AVI (Audio Video Interleaved) file using the LSB (Least
Significant Bit) technique, and frames are compared, analyzed using metrics like PSNR and MSE.
The major limitation of this approach is that the LSB technique is easy to decode, making it vulnerable
to attacks.
Ramadhan J. Mstafa and Khaled M. Elleithy [22] describes a comprehensive research study and
exploration of different cutting-edge video steganography techniques, as well as their implementation
evaluation. This evaluation offered a flow inquiry into bearings and actions to improve existing video
steganography systems.
Sushmita MC, Suresh HN & Manikandan J [23] using an ideas of discrete wavelet transform and
steganography, a novel attempt to hide one or two secret videos in the single cover video was
developed. The PSNR values of the stego-video and recovered concealed videos are acceptable for
visualisation with human naked eyes, with no reduction in video quality.
Hemant Gupta and Dr Setu Chaturvedi [24] provides a sophisticated data hiding approach based
on LSB substitution and analyses the correlation between the original and embedded image for 1bit,
2bit, and 3bit LSB Substitution. If there is no modification in an original image, hence correlation
coefficient has the value r=1. When a number of LSB Substitutes increases, correlation factor
decreases. The PSNR (peak signal-to-noise ratio) between an original image and an encrypted
(received) image was also calculated in this paper. As a result, the number of LSB Substitutes
increases, hence PSNR decreases, and also data security increases at the same time.
Mritha Ramalingam and Nor Ashidi Mat Isa [25] in the IWT domain, a method was created to
conceal data in a grey scale frame of a video. The data are concealed in all frequency bands using this
method. For data concealment and extraction in Red Green Blue (RGB) components of video files,
this work provides a video steganography technique based on Haar Integer Wavelet Transforms
(IWT) and Least Significant Bits (LSB) replacement. The cover-video is separated into RGB frames
in this method, and text is inserted in binary form in LSBs of IWT coefficients. Using a reverse
technique of data concealing, the embedded text is recovered from stego-video. Audio Video
Interleave (AVI) files were used to implement the proposed system.
Sachin Jangid, Somesh Sharma [26] proposes a video Steganography Algorithm based on MLC
(Multi Level Clustering). For clustering the Cover Frame, the Multi-Clustering Algorithm employs
K-Mean clustering. LBP will insert a secret message into selected clusters (Local Binary Pattern).
The performance of Video Steganography is evaluated in terms of PSNR (Peak Signal to Noise Ratio)
and MSE (Mean Square Error) (Mean Square Error).
S. D. Hu and U. K. Tak [27] presents a unique Video Steganography technique for concealing an
uncompressed secret video stream within a host video stream of nearly equal size. Non-uniform
rectangular partitioning will be used to divide each frame of secret video, and partitioned codes
acquired can be an encrypted version of the original frame. These codes will be encoded in the host
video's Least 4 Significant Bits of each frame. Experiments revealed that technique can covert a video
of the same size in host video without causing noticeable distortion.
There are numerous embedding algorithms in the spatial and transform domains, as evidenced by
existing techniques. When compared to transform approaches, spatial domain techniques had
greater PSNR values but were less resistant to attacks.
Many different approaches to embedding were used in this spatial domain technique, such as LSB
or histogram, however these strategies were unable to preserve the secrecy over time in stego-
media.
Transform domain approaches are more secure since it is difficult to determine the embedded
pixels in the cover material.
These approaches have different bands, and the embedding capacity is high. However, the PSNR
of these approaches is modest.
As a result, we require a different spatial domain approach that is difficult for the attacker to
exploit while maintaining a high PSNR value.
By considering all the conclusions the proposed Neural network with hash function algorithm can
help in increasing the robustness to attacks as the embedded pixels will be scattered among the frame
which makes it difficult for the attacker to decode. Here another Modulo operator technique is also
proposed and compared with neural network using hash function technique.
CHAPTER 3
METHODOLOGY
This chapter describes about the methodology of two video steganography techniques proposed and
also how it was implemented in the project. In the proposed methodology, two different video
steganography techniques are used and both are compared based on the results obtained.
A. Embedding: Embedding, also known as the Encryption method, is a procedure in which the
cover video is combined with the secret input to produce a stego-object.
1. Preprocessing: For embedding the secret data inside a cover video, it has to be preprocessed into
cipher form to embed it with the cover frame.
For secret text preprocessing, each character of the target string is converted to their
corresponding ASCII values, which are then converted to binary representation.
For preprocessing of secret image, resize the image that will be lesser than cover frame size and
reshape it into a single row matrix form.
2. Embedding using modulo operator: In embedding process, the cipher text obtained by
preprocessing that is binary digit values will be embedded into cover video using modulo
operation. After embedding stego video file is obtained that will be send to the receiver.
In modulo operation, consider three variables p, h and r
Where, p = 2^𝑏 (bit value where secret data bits has to hide)
h= 2^(𝑏−1) (previous bit value)
r = remainder
• The pixel values are divisible by p, then if the remainder (r) >= h then the pixel value is subtracted
by h.
• For eg, consider pixel value of cover frame I(k) = 184. If the secret bit is hiding in high LSB bit
that is 4th bit, then p=16, h=8.
184 = 10111000 (here 4th bit is high)
• For embedding secret data bit in 4th bit it should be ‘0’. Hence modulo operation is applied,
if (I(k)/p >= h), then
I(k) = I(k)-h
i.e, 184/16 = 8, then I(k) = 184-8 = 176 (pixel value becomes 176)
176 = 10110000 (4th bit becomes 0)
B. Extraction: Extraction, often known as decryption, is the process of obtaining the hidden image
from a stego video.
1. Extraction using modulo operator: At the receiver side, from the stego video file obtained by
the sender secret data will be extracted using modulo operation. The secret message is in cipher form.
This is now sent to the post-processing approach in order to obtain the original target data.
2. Post-processing:
The generated binary digits are translated to their decimal equivalent for post-processing of
secret text. To acquire the original text, the characters of these ASCII values are concatenated
according to the string length.
For post-processing of secret image that is in matrix form will be reshaped to image, then the
original image will be obtained.
After extraction, parameters are calculated that is PSNR, MSE and SSIM by the result obtained.
Figure 3. 3: Flow chart of proposed neural network using hash function based
steganography
Hybrid Neural Networks are a combination of Convolutional and Recurrent Neural Networks that
are used to classify pixels in less sensitive areas from pixels in more sensitive parts in order to embed
hidden data.
The two main stages of the procedure: Encryption or Embedding process and Decryption or
Extraction process.
B. Extraction process: Extraction, often known as decryption, is the process of obtaining the hidden
image from the stego video.
Let k = 1, 2, 3 for R using hash function be the position of insertion k returned for certain iteration. k
= 4, 1, 2 in the case of G, and 3, 4 in the case of B.
Based on the above insertion points, the bits from message are inserted in four LSB locations, yielding
the RGB pixel value shown below. R: 10111001 G: 10011000 B: 11001001.
As a result, the message's eight bits are encoded in three bytes, with just five of the twenty-four bits
actually changed. Furthermore, these five bits are spread randomly, increasing the scheme's
robustness.
The valid user decodes the message by going backwards in time. The hash function calculates the k
values to determine the insertion place because it is known to the intended user. R: 10111001 G:
10011000 B: 11001001 (using the same embedded RGB value as above).
The following k values will be returned by the hash function for this iteration.
k = 1, 2, 3 for R. k = 4, 1, 2 for G. k = 3, 4 for B. For these k values, which represent four LSB places,
can be used to extract the secret message data as follows: 10001001 which is the same as the secret
message mentioned earlier.
These levels are in charge of actions that include the exchange of information teaching features based
on data. There are three primary strata Layers of convolution, activation, or ReLU, and pooling layer.
Convolution layer: The convolutional layer places entering photos using a set of customer-
friendly filters, each of which activates a different feature of the image.
Rectified linear unit (ReLU): By reducing negative qualities to null and keeping positive scores,
the Rectified linear unit (ReLU) speeds up and simplifies training. Because only enabled qualities
are conveyed to the next level, it is sometimes referred to as activation.
Pooling layer: Pooling increases production efficiency by reducing the number of variables that
the network must understand.
These procedures are repeated over tens or hundreds of layers, learning to discern various properties
with each coating.
An example of a multi-layered network is shown in Figure 3.7. Each training image has different
filters applied at different sizes, and the output of each converted image can be utilised as the input
for the next layer.
Advantages of CNN:
Convolutional neural networks are so termed because of a data processing phase called
convolution.
Convolution is beneficial in collecting information characteristics, and even more so in
aggregating and filtering those qualities, hence minimising the number of characteristics (i.e.
pooling).
This built-in feature reduction is what allows such networks to analyse data with a lot of
features.
Depending on the type of RNN node utilized, the length of this "memory" can be changed. The longer
the memory, the longer the RNN can learn long-term dependencies. RNNs can now handle problems
that require long-term memories thanks to the introduction of long short-term memory (LSTM) units.
A memory cell is a structure in LSTM units that stores information and relates it to itself in the
following time step. New input is added to the memory cell's values, and a forget gate is used to
weight newer and older information differently. The gated recurrent unit (GRU) is another RNN unit
built for long memory. GRUs are comparable to LSTM units, however they have fewer parameters
and are therefore easier to train.
PSNR: The Peak Signal-to-Noise Ratio is a normal ratio used to establish the distinction among
transporter and stego information. PSNR is the proportion between the utmost conceivable
intensity of a flag and the intensity of debasing clamour that influences the constancy of its
representation.
𝐿^2
PSNR = 10 log 𝑀𝑆𝐸 ………..................................................... (2)
MSE: By comparing stego and cover files with each of the bytes, the Mean Squared Error is
calculated. The normal squared contrast between the assessed qualities and what is evaluated is
measured by MSE.
1
MSE = 𝐻∗𝑊 ∑ℎ𝑖=0(𝑃(𝑖, 𝑗) − 𝑆(𝑖. 𝑗))2..................................... (3)
SSIM: The Structural Similarity Index (SSIM) is a perceptive metric that assesses picture quality
degradation as a result of processing such as data compression or data transmission losses.
To conclude with this chapter gives detailed explanation about the methodology of two video
steganography techniques proposed in this project and also how it was implemented to get expected
outcomes.
CHAPTER 4
SYSTEM REQUIREMENTS
This chapter describes about the hardware and software requirements used in our proposed work and
also the brief explanation about MATLAB software.
MATLAB is an acronym that stands for MATrix LABoratory. The matrix tools in the LINPACK
(linear system package) and EISPACK (eigen system package) programmes were created in
MATLAB to make them more accessible.
When it comes to tackling technical difficulties, MATLAB has numerous advantagesover traditional
computer languages (e.g., C, FORTRAN). MATLAB is a computer programme that uses an array as
its main data element and does not require dimensioning. The software programme has become a
fundamental tool in most colleges and businesses throughout the world since its initial release in
1984.
It has a set of sophisticated built-in algorithms that can do a variety of calculations. Simple graphics
commands are also included, allowing for quick results viewing. Toolbox packages contain a
collection of specific programmes. Toolboxes span a wide range of areas in applied science and
engineering.
To run MATLAB, double-click the MATLAB shortcut icon on your Windows desktop after login.
When you run MATLAB, a new window called the MATLAB desktop appears. Other windows are
contained on the desktop. The following are main tools found on or accessible from the desktop
which is shown in the Table 4.1.
After you first start MATLAB, you'll see a screen similar to the one shown in Figure 4.1. The default
setting of the MATLAB desktop is also shown in this picture. You can rearrange the tools and
documents to suit your requirements.
CHAPTER 5
RESULTS AND DISCUSSION
This chapter describes about results obtained by implementing two video steganography techniques
proposed and also the comparison of results between them.
Using Neural Networks with Hash function and modulo operator in a MATLAB environment, the
steganographic methods provided here effectively hide the secret data in the cover clip. Original cover
clip and embedding data are included in the database. Robustness, imperceptibility, and capacity are
the three basic characteristics of any Steganographic approach.
After selection of input video that video will be converted into frames. The amount of frames
obtained depends on the video which is been selected for this process. Here the video of 30 sec
is converted into 101 frames as shown in figure 5.4.
Figure 5. 4: Cover video stored as Frames
For the implementation, the secret key that is frame number has to be entered in which secret data
has to be hidden that will be the cover frame as shown in figure 5.5 is being shared personally, so
sender and the receiver have the frame number with them.
Figure 5. 5: Cover frame
After selection of cover frame, for hiding secret text enter ‘2’ and the text that has to be hidden is
entered by the sender. Then the text is encoded in the selected frame and saved in the encoded video
file.
The first “Secret text 1” that consist of 50 characters and “Secret text 2” consists of 150 characters
has been successfully embedded inside the choosen frame using modulo technique and saved in the
encoded video file as shown in figure 5.6 and 5.7.
Using Neural network with hash function technique “Secret text 1” and “Secret text 2” has been
successfully embedded inside the choosen frame and saved in the encoded video file as shown in
figure 5.8 and 5.9.
Figure 5. 8: Embedding secret text 1 using Neural network using hash function technique
Figure 5. 9: Embedding secret text 2 using Neural network using hash function technique
Enter ‘1' to hide a secret image, then choose the image that the sender needs to hide. Then the image
is encoded in the selected frame and saved in the encoded video file as depicted in figure 5.10.
Figure 5. 10: Embedding secret image
After embedding secret data using both modulo technique and neural network with hash function
technique in a cover frame, stego frame is obtained as shown in figure 5.11 and 5.12. Then the
parameter values PSNR,SSIM AND MSE is obtained by comparing stego frame and cover frame.
The parameter values will differs for secret image and secret text, as size of the data increases then
there will be increase in the parameter values also. The parameter values is calculated by including
the respective formulas that is discussed in the next section.
Figure 5.11: Stego frame and parameter values obtained using modulo technique
Figure 5. 12: Stego frame and parameter values obtained using neural network technique
5.2 RECEIVER SIDE
For decryption at receiver side, the stego-video created on the sender side is selected as input as
shown in figure 5.13 and used to extract the secret data.
At receiver side, to decrypt the hidden text enter the secret frame number shared by the sender as
shown in figure 5.14.
If the secret data that has to be decrypted is text, then enter ‘2’.
If the secret data that has to be decrypted is image, then enter ‘1’.
Figure 5. 14: Secret key entered by receiver at decryption
After the secret key is entered by the receiver, if we choose to decrypt a secret text then hidden secret
text 1 and secret text 2 will be decrypted and original data is obtained as depicted in the figure 5.15
and figure 5.16.
If we choose to decrypt a secret image then hidden secret image will be decrypted and original data
is obtained as depicted in the figure 5.17 at the receiver side.
Table 5. 1: Comparison of PSNR, MSE and SSIM between Modulo and Neural network using
hash function method
To conclude with this chapter, it describes about the brief explanation of results obtained by
implementing the methodology of two video steganography techniques proposed and also compared
results of both the techniques.
CHAPTER 6
CONCLUSIONS AND FUTURE SCOPE
Two people can converse privately using video steganography. The proposed method can be used to
securely communicate sensitive data without the risk of being intercepted by a third party. In
steganography, the use of a neural network with a hash function technique provides more security
because it is more difficult for an attacker to find the encrypted pixels. The key benefit of utilizing a
neural network is that decoding the stego-object is extremely difficult, and Hybrid neural networks
handle both kinds of neural networks' shortcomings. For the same message and cover-media, the
Neural network utilizing the hash function algorithm has a higher PSNR value than the Modulo
algorithm.
6.1 APPLICATIONS
1. Military: Secure information transmission is a fundamental goal of good communication in
the military and defense domains. Steganography has long been used by military personnel
for surreptitious communication, as a common transmission channels can attest. Authorized
communication is the foundation of military and defense communication networks.
Additional multiple layered security is offered in the military and defense by applying
numerous encryption algorithms before embedding the sensitive data.
2. Intelligent agencies: The majority of communication in intelligence services is also secret,
and steganography is frequently used for concealment. Steganography has been utilized by
the National Security Agency (NSA) to send secret messages both inside and outside the
agency.
3. Medical: In the sphere of medical sciences, image steganography has been used in diagnostic
scans like as CT, MRI, and others. It's utilized to conceal the patient's sensitive personal
information in the medical imaging itself. Furthermore, a DNA sequence has been employed
to conceal confidential information in medical sciences. This is frequently done to protect the
patient's details and prevent confidential information from being leaked by an unauthorised
person or party.
4. Multimedia: It is frequently used in multimedia applications for copyright information
watermarking. This is done to protect media such as photographs, videos, and other types of
media from unauthorized copying and infringement.
5. Smart IDs: It is now being utilized in smart IDs to hide people's personal information in their
photos.
6. Corporate: Data leakage is the most dangerous aspect of corporate and industry communication.
As a result, steganography-enabled secure communication is always valued for its protection and
authenticity, as risky communication can occasionally result in massive data breaches.
1) Johri, P., Mishra, A., Das, S., and Kumar, A. Survey on steganography methods (text, image,
audio, video, protocol and network steganography). In 2016 3rd International Conference on
Computing for Sustainable Global Development (INDIACom) (March 2016), pp. 2906–2909.
2) Joseph, P., and Vishnukumar, S. A study on steganographic techniques. In 2015 Global
Conference on Communication Technologies (GCCT) (April 2015), pp. 206–210.
3) Eman Abdelfattah, R. J. M., and Elleithy, K. M. Video steganography techniques: Taxonomy,
challenges, and future directions. Systems, Applications and Technology Conference (LISAT),
2017 IEEE Long Island (May 2017).
4) Prashant Johri, A. M., and Das, S. Survey on steganography methods, Computing for Sustainable
Global Development (INDIACom) (February 2016).
5) Sharma, S., Gupta, A., Trivedi, M. C., and Yadav, V. K. Analysis of different text steganography
techniques: A survey. In 2016 Second International Conference on Computational Intelligence
Communication Technology (CICT) (Feb 2016), pp. 130–133.
6) Zaheer, R., Gaur, R. S., and Dixit, V. A literature survey on various approaches of data hiding in
images. In 2017 International Conference on Innovations in Information, Embedded and
Communication Systems (ICIIECS) (March 2017), pp. 1–5.
7) Gupta, H., and Chaturvedi, D. S. Video data hiding through lsb substitution technique.
International Journal Of Engineering And Science 2 (April 2013), 32–39.
8) M.Mary Shanthi Rani, G. M., and Euphrasia, K. Video- steganography based on integer haar
wavelet transforms for secured data transfer. Advances in Intelligent systems and Computing,
Springer series 412, 403–412.
9) Sharma, N., and Batra, D. U. A review on spatial domain technique based on image
steganography. : Computing and Communication Technologies for Smart Nation (IC3TSN)
(2017).
10) Shirali-Shahreza, S. and Shirali-Shahreza M., “Steganography in Textiles”, 4th International
Conference on Information Assurance and Security, pp.56- 61, 2008.
11) Singh, K. M., Singh, L. S., Singh, A. B. and Devi, K. S., ”Hiding Secret Message in Edges of the
Image”, International Conference on Information and Communication Technology (ICICT),
pp.238-241, 2007.
12) Rahate, N. D. and Rothe, P. R., “Data Hiding Technique for Security by using Image
Steganography”, International Conference on Industrial Automation and Computing (ICIAC),pp
33-36, 2014.
13) Caldwell, J., “Steganography using the technique of orderly changing pixel componenet”,
International Journal of Computer Applications, Vol.58, No.6, 2014.
14) Delahaye, J. P., “Embeddeed Information, Information Hiding”, Scientific American, pp.142-46,
1996.
15) Provos, N. & Honeyman, P., “Hide and Seek: An introduction to steganography”, Security and
Privacy, Vol.1, pp.32-44, 2003.
16) Avcibas, I., Memon, N., and Sankur, B., “Steganalysis Using Image Quality Metrics”, IEEE
Transactions on Image Processing, Vol. 12, No. 2, pp 221- 229, 2003.
17) Sethi, N. and Sharma D., ; “A New Cryptology Approach for Image Encryption”, 2nd IEEE
International Conference on Parallel, Distributed and Grid Computing, pp.905-908, 2012.
18) Johnson, N.F. and Katzenbeisser, S.C., “A survey of steganographic techniques”, International
Journal of Computer Applications, 2004.
19) Wayner, P., “Disappearing cryptography”, 2nd ed. Morgan Kaufmann Publishers, 2002.
20) Karanjit Kaur & Baldip Kaur (2018). “DWT-LSB Approach for Video Steganography using
Artificial Neural Network”. In International Advanced Research Journal in Science, Engineering
and Technology, IARJSET.
21) Anamika Saini, Kamaldeep Joshi, Kirti Sharma & Rainu Nandal (2017). “An Analysis of LSB
Technique in Video Steganography using PSNR and MSE”. In International Journal of Advanced
Research in Computer Science. IJARCS.
22) Ramadhan J. Mstafa and Khaled M. Elleithy & Eman Abdelfattah (2017). “Video Steganography
Techniques: Taxonomy, Challenges and Future Directions. 2017 IEEE.
23) Sushmita MC, Suresh HN & Manikandan J (2017). “An Approach Towards Novel Video
Steganography for Consumer Electronics”. In 2017 IEEE International Conference on Consumer
Electronics- Asia (ICCE-Asia).
24) Hemant Gupta and Dr Setu Chaturvedi,”Video Data Hiding Through LSB Substitution
Technique,” International Journal Of Engineering And Science, vol.2, no. 10 , Issn(e): 2278-
4721, Issn(p):2319-6483, pp. 32-39, April 2013.
25) Mritha Ramalingam and Nor Ashidi Mat Isa, ”VideoSteganography based on Integer Haar
Wavelet Transforms for Secured Data Transfer,” Indian Journal of Science and Technology, vol.
7(7), ISSN (Online) : 0974-5645,pp. 897– 904, July 2014.
26) Sachin Jangid, Somesh Sharma (2017) International Conference on Intelligent Computing and
Control Systems ICICCS, IEEE.
27) S. D. Hu and U. K. Tak, “A Novel Video Steganography based on Non-uniform Rectangular
Partition”, IEEE international conference on computational science and engineering, pp. 57-61,
Aug. 2011.
28) K. Dasgupta, J. K. Mondal and P. Dutta, “Optimized Video Steganography using Genetic
Algorithm (GA)”, International Conference on Computational Intelligence: Modeling,
Techniques and Applications- Elsevier, vol. 10, pp. 131-137, Dec. 2013.
29) S. Bhattacharyya, A. Khan, A. Nandi, A. Dasmalakar, S. Roy and G. Sanyal, “Pixel Mapping
Method (PMM) Based Bit Plane Complexity Segmentation (BPCS) Steganography”, IEEE
World Congress on Information and Communication Technologies (WICT), pp. 36 – 41, 2011.