Video Steganography Using LSB Substitution and Sobel Edge Detection

https://doi.org/10.24237/djes.2018.11209

Authors

  • Ashty M. Aaref Department of Software Engineering, Technical College of Kirkuk, Northern Technical University, Iraq

Keywords:

EdgeDetection, Video, Edges, mask, threshold, Sobel Operator, Frames

Abstract

The procedure that involves the in closure of information without altering its intuitive standard is called data embedding. In this paper the secret message (English text) is hidden in the edge of the frames of the .AVI video without changing the details of frames. MATLAB R2013a is utilized to execute this algorithm. The secret message was embedded in the frames 38,39,40,41 and 42 and the reason of selecting those frames is that these frames have sufficient edge point details in them. High embedding and superior quality of encoded secret messages have been accomplished by this design. Additionally, in this project the cover frame image is represented by a 120 frames size 120* 160, and the secret message has been represented with a message comprised of 300 characters Both Peak Signal to Noise Ratio (PSNR) and the Mean Square Error (MSE) have been taken into consideration while analyzing the suggested method as we calculated both PSNR and MSE between the cover frames and the embedded ones. The results obtained were objectively good as the PSNR value ranges from 74.5293dB to 75.9123 dB

Downloads

Download data is not yet available.

References

E. Cole and R.D. Krutz, (2003), Hiding in Plain Sight: Steganography and the Art of Covert Communication, Wiley Publishing, Inc., ISBN 0-471-44449-9.

S.K. beisser and A. P.F. Petitcolas, (1999), Information Hiding Techniques for Steganography and Digital Watermarking, Artech House Books, ISBN 1-58053-035-41999.

D. Stanescu, M. Stratulat, B. Ciubotaru, D.Chiciudean, R. Cioarga and M. Micea, (2007), Embedding Data inVideo Stream using Steganography, in 4th International Symposium on Applied Computational Intelligence and Informatics, SACI-2001, pp. 241-244, IEEE.

. Kousik Dasgupta, J.K. Mandal and Paramartha Dutta, Hash Based Least Significant Bit Technique For Video Steganography(HLSB), International Journal of Security, Privacy and Trust Management ( IJSPTM), Vol. 1, No 2, April 2012.

. Raid R. Omar Al-Nima and Sarah B. Ali Al-Nima, Design and Implementation of Steganographic Algorithm on Video File (Mov), third scientific in information technology, 29-30 Nov, 2010.

. Uma Sahu and Saurabh Mitra, A Secure Data Hiding Technique Using Video Steganography, International Journal of Computer Science & Communication Networks, Vol. 5, pp. -357.

. P. R. Deshmukh and Bhagyashri Rahangdale, (2014), Data Hiding using Video Steganography, International Journal of Engineering Research & Technology (IJERT), Vol. 3, pp. 856-860.

.Rafael C. Gonzalez, R.E. Woods, Digital Image Processing, third edition,ISBN :013168728X Publisher: Prentice Hall; 3 edition (August 31, 2007).

Abdulsattar M. Khidhir and Nawal Younis Abdullah, (2013), FPGA Based Edge Detection Using Modified Sobel Filter, International Journal for Research and Development in Engineering (IJRDE), Vol.2: Issue.1, pp. 22-32.

. Rajesh Mehra and Rupinder Verma , (2012), Area Efficient FPGA Implementation of Sobel Edge Detector for Image Processing Applications, International Journal of Computer Applications, Vol.5 (16) , pp. 7 –11.

. Dhanabal R,Bharathi V And S.Kartika , (2013), Digital Image Processing Using Sobel Edge Detection Algorithm In FPGA, Journal of Theoretical and Applied Information Technology, Vol. 58 No.1.

. James Clerk Maxwell, (2005), Digital Image Processing Mathematical and Computational Methods, Horwood Publishing, vol: ISBN:1-898563-49-7.

.Nasseer M. Basheer, Ashty M. Aaref, Dhafer J. Ayyed, (2015), Digital Image Sobel Edge Detection Using FPGA, International Journal of Advanced Research in Computer Science and Software Engineering, Vol 5, Issue 7.

Published

2018-06-01

How to Cite

[1]
A. M. Aaref, “Video Steganography Using LSB Substitution and Sobel Edge Detection”, DJES, vol. 11, no. 2, pp. 67–73, Jun. 2018.