Professional Documents
Culture Documents
Video Steganography Schema Based On AES Algorithm and 2D Compressive Sensing
Video Steganography Schema Based On AES Algorithm and 2D Compressive Sensing
ABSTRACT
This paper proposes a novel reversible image data hiding (RIDH) scheme over encrypted domain. The data embedding is
achieved through a public key modulation mechanism, in which access to the secret encryption key is not needed. At the
decoder side, a powerful two-class SVM classifier is designed to distinguish encrypted and non encrypted image patches,
allowing us to jointly decode the embedded message and the original image signal. Compared with the state-of-the-arts, the
proposed approach provides higher embedding capacity, and is able to perfectly reconstruct the original image as well as the
embedded message. Extensive experimental results are provided to validate the superior performance of our scheme.
Keywords : AES, Video Steganography, 2D, Compressive Sensing, RIDH, SVM, 3D, Digital watermarks
CSEIT172232 | Received: 05 March 2017 | Accepted: 16 March 2017 | March-April-2017 [(2)2: 172-175 ] 172
A double-image Steganography scheme was existing
system based on logistic map and discrete fractional
random transform. Where the image was compressed
using the lossless image compression scheme as well as
VisibleSteganography
it was Watermarked using the chaotic algorithm which
was mostly used by so many system currently.
The main goal of steganography is to hide a message m The problem mostly contain the steganography
in some audio or video (cover) data d, to obtain new algorithms did not consider image compression or data
data d', practically indistinguishable from d, by people, compression, thus they cannot realize compression and
in such a way that an eavesdropper cannot detect the steganography simultaneously. The high end to end
presence of m in d'.Almost all digital file used for delay for overall compression process.
steganography but that are not suitable with a high
degree of redundancy. The object of those bits can be Advanced Encryption Standard (AES):
altered without alteration detected easily. Video and
image can be used for information hiding [8]. The AES algorithm is used in the proposed system of
the video Steganography process and it is used for
Cryptography Vs Steganography securing sensitive data. It has been adopted by the
United States government as an Advanced
Cryptography is the most common method of Steganography Standard, a standard algorithm used to
protecting digital content and is one of the best Watermark and decrypt sensitive information. AES is a
developed science. The main goal of Cryptography is symmetric block cipher with a block size of 128 bits. It
to hide a message m in some audio or video (cover) allows for three different key lengths which can be 128
data d, to obtain new data d', practically bits, 192 bits, or 256 bits; referred to as AES- 128,
indistinguishable from d, by people, in such a way that AES-192, and AES-256, respectively. The number of
an eavesdropper cannot remove or replace m in d' rounds in the Steganography process for AES-128 is
However, Steganography cannot help the seller monitor 10, for AES-192 it is 12, and for AES-256 it is 14.
how a legitimate customer handles the content after
decryption. Digital Steganography can protect content
even after it is decrypted.
Steg ? Dec
ano
Related Work:
Volume 2 | Issue 2 | | March-April-2017 | www.ijsrcseit.com 173
Proposed Algorithm for the process: