Optimized Data Hiding in Complemented or Non-Complemented Form in Video Steganography
Autor: | Samar Kamil, Siti Norul Huda Sheikh Abdullah, Zulkifli Ahmad, Masri Ayob |
---|---|
Rok vydání: | 2018 |
Předmět: |
Steganography
Computer science Frame (networking) Data security Particle swarm optimization 020207 software engineering 02 engineering and technology Peak signal-to-noise ratio Least significant bit Information hiding Genetic algorithm 0202 electrical engineering electronic engineering information engineering 020201 artificial intelligence & image processing Algorithm |
Zdroj: | 2018 Cyber Resilience Conference (CRC). |
Popis: | Optimal match in the cover media was found to be effective for accurate data hiding and improving the visual quality of steganography algorithms. Lately, several optimized steganography algorithms including least significant bit (LSB) match, genetic algorithm (GA), particle swarm optimization (PSO) were developed for cloud data security against possible attacks. Although these algorithms can search optimal bits match in the cover media to hide the secret data precisely with less variability, the techniques consume computational time. Therefore, this paper proposed a steganography technique which can achieve almost zero variability and very low computational time. The data hiding of secret data bits in complemented or non-complemented forms were achieved and optimized by using video steganography. Furthermore, the indexes for the complemented or non-complemented form were hidden in the covered frame. This allowed information to be conveyed efficiently to the receiver when extracting the secret messages. The performance of the proposed algorithm was assessed using various parameters such as peak signal to noise ratio (PSNR), embedding capacity, normalized cross-correlation, average difference and normalized absolute error. The Results revealed that the proposed steganography system is superior compared to the existing state of the art techniques. The developed algorithm was established to be greatly effective for video data security management in cloud computing. |
Databáze: | OpenAIRE |
Externí odkaz: |