Loading

A Novel Hash based Encryption Technique on Video Steganog-Raphy Integrity Verification Against Attacks
V. Annapurna1, S. Nagaraja Rao2, M. N. Giri Prasad3

1V. Annapurna, Research Scholar, JNTUA, Ananthapuram (A.P), India.
2Dr. S. Nagaraja Rao, Professor, Department of ECE, G. Pullareddy Engineering College, Kurnool (A.P), India.
3Dr. M. N. Giri Prasad, Professor & Director of Admissions, JNTUA Ananthapuram (A.P), India.
Manuscript received on 23 March 2019 | Revised Manuscript received on 04 April 2019 | Manuscript Published on 18 April 2019 | PP: 384-392 | Volume-7 Issue-6S March 2019 | Retrieval Number: F02760376S19/2019©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Steganography is an essential task to construct a secure communication among various authorized entities. Video Steganography is one of the essential source of transmitting secret data using data hiding techniques in videos. Securing the embedded data along with video data is an essential task in data hiding techniques. However, this sensitive information is vulnerable to third party attacks such as video content change, copyright change, key change etc. A large number of cryptographic algorithms have been proposed in the literature for integrating the sensitive data into the data hiding techniques. But, as the size of the sensitive data increases these models require high computational memory and time. Also, these cryptographic models are not applicable to large video data for integrity computation and encryption. In order to overcome these issues, a novel integrity verification technique is proposed to find the change bits in the video with high sensitive rate. Also, proposed model use integrity based encryption technique to hide the sensitive information securely in the video. Proposed model use motion vectors to find the integrity of the video for data hiding against the third party attacks. Motion vectors are extracted using the kalman filter in the source video for integrity computation. Proposed integrity computation model use polynomial structures to increase the complexity or sensitive of the hash during the data hiding process. Experimental results proved that the proposed integrity verification based video steganography approach is more sensitive and efficient than the traditional cryptographic approaches in terms of bit rate, runtime and memory are concerned.
Keywords: Video Steganography, Integrity Verification, Kalman Filter, Motion Vectors.
Scope of the Article: Encryption Methods and Tools