Abstract
Steganography is the art to conceal any type of secret data into digital media. Its main aim is to maintain data security and authentication. Existing data embedding approaches does not provide information security, authentication and its robustness of secret data. To avoids these limitations this paper uses the Forensic Exploiting Modification Direction (FEMD) algorithm for audio video steganography to increase data security, authentication and its robustness. It uses 3m2 + 3m + 3 ary notation to embed three pixels at a time for enhancing embedding capacity and security of secret data. The different types of image processing attacks have been verified on stego video which produces the very good recovery of original and secret data without any distortion. The observed and verified software results confirm that the implemented security model provides better authentication, imperceptibility, robustness, CC (Concealed Capacity), and CR (Concealed Rate) as compared to any existing EMD methods.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Mustafa, R.J., Elleithy, K.M., Abdelfattah E.: Video-steganography techniques: taxonomy, challenges, and future directions. In: IEEE Long Island Systems, Applications, and Technology Conference (LISAT), pp. 1–6. https://doi.org/10.1109/LISAT.2017.8001965,2017
Moon, S.K., Raut, R.D.: Innovative data security model using forensic audio-video steganography for improving hidden data security and robustness. Indersci. Int. J. Inf. Comput. Secur. 10(4), pp. 374–395 (2018)
Zhang, X., Wang, S.: Efficient steganographic embedding by exploiting modification direction. IEEE Commun. Lett. 10, 781–783 (2006)
Niu, X., Ma, M., Tang, R., Yin, Z.: ‘Image steganography via fully exploiting modification direction. Int. J. Secur. Appl. 9(5), 243–254 (2015). https://doi.org/10.14257/ijsia.2015.9.5.24
Cheddad, A., Condell, J., Curran, K., Kevitt, P.M.: Digital image steganography survey and analysis of current methods. Elsevier J. Sig. Process. 90(3), 727–752 (2010)
Subhedar, M., Mankar, V.H.: Current status and key issues in image steganography: a survey. Elsevier Sci. Direct Comput. Sci. Rev. J. 13–14, 95–113 (2015)
Sadek, M.M., Khalifa, A.S., Mostafa, M.G.M.: Video-steganography: a comprehensive review. Springer J. Multimedia Tools Appl. Sci. J. 74(17), 7063–7094 (2015)
Dalal, M., Juneja, M.: A robust and imperceptible steganography technique for SD and HD videos. Multimedia Tools Appl. 78(5), 5769–5789 (2018). https://doi.org/10.1007/s11042-018-6093-3
Saha, S., Ghosal, S.K., Chakraborty, A., Dhargupta, S., Sarkar, R., Mandal, J.K.: Improved exploiting modification direction-based steganography using dynamic weightage array. Electron. Lett. (2018). https://doi.org/10.1049/el.2017.3336
Leng, H.-S., Tseng, H.-W.: Generalize the EMD scheme on an n-dimensional hypercube with maximum payload. Multimedia Tools Appl. 78(13), 18363–18377 (2019). https://doi.org/10.1007/s11042-019-7228-x
Liu, Y., Chang, C.-C., Huang, P.-C.: Extended exploiting-modification-direction data hiding with high capacity. IEEE ICVIP 2017. http://dx.doi.org/https://doi.org/10.1145/3177404.3177452
Liu, Y., Yang, C., Sun, Q.: Enhance embedding capacity of generalized exploiting modification directions in data hiding. IEEE Access, Digital Object Identifier (2018). https://doi.org/10.1109/ACCESS.2017.2787803
Younus, Z.S., Hussain, M.K.: Image steganography using exploiting modification direction for compressed encrypted data. J. King Saud Univ. Comput. Inf. Sci. https://doi.org/10.1016/j.jksuci.2019.04.008,2019
Saha, S., Chakraborty, A., Chatterjee, A., Dhargupta, S., Ghosal, S.K., Sarkar, R.: Extended exploiting modification direction based steganography using hashed-weightage Array. Multimedia Tools Appl. 79(29–30), 20973–20993 (2020). https://doi.org/10.1007/s11042-020-08951-1
Moon, S.K., Raut, R.D.: Anti-forensic reversible multi frame block to block pixel mapping information concealing approach to increase the robustness and perceptibility. Indersc. Int. J. Spec. Issue Multimedia Inf. Secur. Solu. Soc. Networks 14(3/4), 304–339 (2021)
Arab, F., Shahidan, M., Abdullah, S.: A robust video watermarking technique for the tamper detection of surveillance system. Springer J. Multimedia Tools Appl. https://doi.org/10.1007/s11042-015-2800-5.2016
Leng, H.-S., Tseng, H.-W.: Generalize the EMD scheme on an n-dimensional hypercube with maximum payload. Springer J. Multimedia Tools Appl. 78, 18363–18377 (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 Springer Nature Switzerland AG
About this paper
Cite this paper
Moon, S.K. (2022). Application of Forensic Audio-Video Steganography Technique to Improve Security, Robustness, and Authentication of Secret Data. In: Chaubey, N., Thampi, S.M., Jhanjhi, N.Z. (eds) Computing Science, Communication and Security. COMS2 2022. Communications in Computer and Information Science, vol 1604. Springer, Cham. https://doi.org/10.1007/978-3-031-10551-7_2
Download citation
DOI: https://doi.org/10.1007/978-3-031-10551-7_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-10550-0
Online ISBN: 978-3-031-10551-7
eBook Packages: Computer ScienceComputer Science (R0)