Stego Machine – Video Steganography using Modified LSB Algorithm
Computer technology and the Internet have made a
breakthrough in the existence of data communication. This has
opened a whole new way of implementing steganography to ensure
secure data transfer. Steganography is the fine art of hiding the
information. Hiding the message in the carrier file enables the
deniability of the existence of any message at all. This paper designs
a stego machine to develop a steganographic application to hide data
containing text in a computer video file and to retrieve the hidden
information. This can be designed by embedding text file in a video
file in such away that the video does not loose its functionality using
Least Significant Bit (LSB) modification method. This method
applies imperceptible modifications. This proposed method strives
for high security to an eavesdropper-s inability to detect hidden
information.
[1] F.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn, "Information
HidingÔÇöA Survey," Proc. IEEE, 1999
[2] Niels Provos and Peter Honeyman, "Hide and Seek: An Introduction to
Steganography", University of Michigan, IEEE 2003
[3] Mamta Juneja, Parvinder S. Sandhu, and Ekta Walia,"Application of
LSB Based Steganographic Technique for 8-bit Color Images", WASET
2009
[4] Sutaone, M.S.; Khandare, "Image based Steganography using LSB
insertion technique", IET, 2008.
[5] Mazdak Zamani, Azizah A. Manaf, and Shahidan Abdullah, "A Genetic-
Algorithm-Based Approach for Audio Steganography" WASET 2009
[6] Neeta Deshpande, Kamalapur Sneha, Daisy Jacobs, ÔÇòImplementation
of LSB Steganography and Its Evaluation for various Bits Digital
Information Management, 2006 1st International Conference on.
06/01/2007; DOI: 10.1109/ICDIM.2007.369349
[7] Kharrazi, M., Sencar, H. T., and Memon, N. (2004). Image
steganography: Concepts and practice. In WSPC Lecture Notes
Series.
[8] Mobasseri, B.: Direct sequence watermarking of digital video using mframes,
Proc. International Conference on Image Processing, Chicago,
IL, pp 399- 403, 1998.
[1] F.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn, "Information
HidingÔÇöA Survey," Proc. IEEE, 1999
[2] Niels Provos and Peter Honeyman, "Hide and Seek: An Introduction to
Steganography", University of Michigan, IEEE 2003
[3] Mamta Juneja, Parvinder S. Sandhu, and Ekta Walia,"Application of
LSB Based Steganographic Technique for 8-bit Color Images", WASET
2009
[4] Sutaone, M.S.; Khandare, "Image based Steganography using LSB
insertion technique", IET, 2008.
[5] Mazdak Zamani, Azizah A. Manaf, and Shahidan Abdullah, "A Genetic-
Algorithm-Based Approach for Audio Steganography" WASET 2009
[6] Neeta Deshpande, Kamalapur Sneha, Daisy Jacobs, ÔÇòImplementation
of LSB Steganography and Its Evaluation for various Bits Digital
Information Management, 2006 1st International Conference on.
06/01/2007; DOI: 10.1109/ICDIM.2007.369349
[7] Kharrazi, M., Sencar, H. T., and Memon, N. (2004). Image
steganography: Concepts and practice. In WSPC Lecture Notes
Series.
[8] Mobasseri, B.: Direct sequence watermarking of digital video using mframes,
Proc. International Conference on Image Processing, Chicago,
IL, pp 399- 403, 1998.
@article{"International Journal of Information, Control and Computer Sciences:57225", author = "Mritha Ramalingam", title = "Stego Machine – Video Steganography using Modified LSB Algorithm", abstract = "Computer technology and the Internet have made a
breakthrough in the existence of data communication. This has
opened a whole new way of implementing steganography to ensure
secure data transfer. Steganography is the fine art of hiding the
information. Hiding the message in the carrier file enables the
deniability of the existence of any message at all. This paper designs
a stego machine to develop a steganographic application to hide data
containing text in a computer video file and to retrieve the hidden
information. This can be designed by embedding text file in a video
file in such away that the video does not loose its functionality using
Least Significant Bit (LSB) modification method. This method
applies imperceptible modifications. This proposed method strives
for high security to an eavesdropper-s inability to detect hidden
information.", keywords = "Data hiding, LSB, Stego machine, VideoSteganography", volume = "5", number = "2", pages = "169-4", }